As cyber threats facing enterprises become increasingly complex and diverse, ASUS has developed a robust approach to enhance visibility and real-time responsiveness through External Attack Surface Management (EASM) combined with threat intelligence resources. This article delves into how ASUS integrates various threat intelligence sources, collects relevant information from a multitude of data streams, and employs automation to bolster cybersecurity defenses.
We will explore how EASM can be leveraged to meet enterprise needs by integrating threat intelligence, including the use of both commercial and free methods to observe EASM, manage digital assets, and threat intelligence platforms. The process of gathering different threat intelligence sources and filtering intelligence content will also be discussed. Subsequently, we will examine how to utilize data from threat intelligence platforms to integrate enterprise Open Source security risks, focus on high-risk vulnerabilities, and enhance overall security.
Additionally, we will introduce the use of the AIL Project for intelligence gathering, particularly extracting, crawling, mining, and analyzing unstructured data from private channels and the dark web to obtain valuable threat intelligence. These insights will be automatically converted into critical notifications to establish an efficient alert mechanism, ensuring enterprises can respond to potential threats in real-time.
Finally, we will share ASUS future plans, including more comprehensive data collection and the future integration of CTI with LLM (Language Learning Models), to further enhance the enterprise’s security defense capabilities.
This comprehensive approach demonstrates ASUS commitment to providing robust cybersecurity measures through the intelligent integration of diverse data sources and automated threat intelligence processes.
TOPIC / TRACK
Exposure Management Forum
LOCATION
Taipei Nangang Exhibition Center, Hall 2
7F 701D
LEVEL
Intermediate Intermediate sessions focus on
cybersecurity
architecture, tools, and practical applications, ideal for
professionals with a basic understanding of
cybersecurity.
SESSION TYPE
Breakout Session
LANGUAGE
Chinese
SUBTOPIC
Threat Intelligence
Enterprise Security
CSIRT
CYBERSEC 2025 uses cookies to provide you with the best user experience possible. By continuing to use this site, you agree to the terms in our Privacy Policy 。