Obsidian CTI: Generating Threat Intelligence from an Incident
08-12, 11:30–12:30 (US/Pacific), Project Obsidian: Track 0x42 (In-person)

This session presents an overview of how threat intelligence can be generated from an incident and shared with various stakeholders. We'll run through an incident and demonstrate how the CTI team plays a critical role by performing research and providing insights based on stakeholder requirements.

Blue Team Village’s Project Obsidian is an immersive, defensive cybersecurity learning experience that provides attendees with the opportunity to gain knowledge of Incident Response (IR), Digital Forensics (DF), Reverse Engineering Malware (REM), Cyber Threat Intelligence (CTI), and Cyber Threat Hunting (CTH).


This module covers:

  • Direction & Planning: Overview of CTI stakeholders and intelligence requirements
  • Collection: CTI analysts role during an incident
  • Processing: Intrusion data & information
  • Analysis & Production: Elements to include in a report
  • Dissemination: Sharing the report with stakeholders
  • Feedback & Evaluation: Methods for receiving feedback

The objective is to demonstrate the critical role CTI plays both during and after an incident.

Blue Team Village’s Project Obsidian is an immersive, defensive cybersecurity learning experience that provides attendees with the opportunity to gain knowledge of Incident Response (IR), Digital Forensics (DF), Reverse Engineering Malware (REM), Cyber Threat Intelligence (CTI), and Cyber Threat Hunting (CTH).

Mentor, Hacker, Cyber Threat Intelligence, Reverse Engineering Malware, OSINT, 70757a7a6c6573, Blue Team Village Director, Consultant

This speaker also appears in:

l00sid just started a career as a blue teamer. He loves the kinds of puzzles he gets to solve in the process of stopping attackers.

This speaker also appears in:

Stephanie is a security software engineer in the product security space. She is a volunteer on BTV's CTI team for Project Obsidian at DEF CON 30.

This speaker also appears in: