Alex Pinto, profile picture

Alex Pinto

Sort by
Determining the Fit and Impact of CTI Indicators on Your Monitoring Pipeline (TIQ-Test 2.0)
Towards a Threat Hunting Automation Maturity Model
Biting into the Jawbreaker: Pushing the Boundaries of Threat Hunting Automation
Beyond Matching: Applying Data Science Techniques to IOC-based Detection
Sharing is Caring: Understanding and Measuring Threat Intelligence Sharing Effectiveness
SANS CTI Summit 2016 - Data-Driven Threat Intelligence: Sharing
Data-Driven Threat Intelligence: Metrics on Indicator Dissemination and Sharing
Data-Driven Threat Intelligence: Useful Methods and Measurements for Handling Indicators
From Threat Intelligence to Defense Cleverness: A Data Science Approach (#tidatasci)
Secure Because Math: A Deep-Dive on Machine Learning-Based Monitoring (#SecureBecauseMath)
Measuring the IQ of your Threat Intelligence Feeds (#tiqtest)
Applying Machine Learning to Network Security Monitoring - BayThreat 2013
BSidesLV 2013 - Using Machine Learning to Support Information Security