Workshop

Seasides 2025 Edition

Securing the Perimeter: Modern Approaches to External Threat Management

Definition and importance of actionable threat intelligence.
Types of threat data: Indicators of Compromise (IoCs), behavioral patterns, and emerging trends.
Integrating threat intel into security operations.
Supply Chain and Vendor Intelligence

Risks posed by third-party vendors and supply chains.
Assessing and monitoring vendor risk profiles.
Best practices for securing the extended ecosystem.
Attack Surface Intelligence

Identifying and managing an organization’s digital footprint.
Tools and techniques for continuous monitoring of exposed assets.
Mitigation strategies for reducing the attack surface.
Dark Web Intelligence

Overview of the dark web and its relevance to external threat management.
Methods for monitoring and gathering insights from dark web forums, marketplaces, and leaks.
Understanding stolen data, credentials, and indicators of imminent threats.
Threat Actor Intelligence

Profiling threat actors and understanding their motives, tactics, and tools.
Differentiating between cybercriminals, hacktivists, nation-states, and insider threats.
Leveraging threat actor insights to enhance defensive strategies.
Brand Intelligence

Monitoring the organization’s brand presence online.
Identifying reputation risks such as phishing campaigns, impersonation, or defamation.
Proactive steps to protect the brand from external threats.

Welcome and Overview

Module 1: Understanding the External Threat Landscape

Module 2: Core Intelligence Types for External Threat Management

Module 3: Hands-On Exercise

Module 4: Operationalizing External Threat Intelligence

Conclusion and Next Steps

Develop a clear understanding of the modern threat landscape and external threat vectors.

Learn to integrate and operationalize diverse intelligence sources into existing security frameworks.

Gain hands-on knowledge of tools and methodologies for external threat detection and mitigation.

Understand the value of collaboration between internal teams and external partners in securing the organization’s perimeter.