Episode 58 — Drive detection engineering with intel requirements

Intelligence requirements should be the primary driver for the detection engineering process, ensuring that the organization’s monitoring rules are specifically tuned to the behaviors of the most relevant adversaries. This episode explores how to use observed TTPs from recent campaigns to define the logic for new security alerts, moving beyond static signatures to focus on attacker "habits." We discuss the "Pyramid of Pain" as a framework for prioritizing the development of rules that are difficult for an adversary to bypass, such as process-level anomalies or non-standard protocol usage. For the GCTI exam, you should understand how to identify the specific "logging requirements" needed to support a new detection query in a SIEM or EDR platform. Troubleshooting involves "back-testing" new rules against historical data to ensure they would have caught previous intrusions while maintaining a low false-positive rate. By driving detection engineering with intelligence, you ensure that your security sensors are perfectly aligned with the technical reality of the current threat landscape. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.
Episode 58 — Drive detection engineering with intel requirements
Broadcast by