Главная
Study mode:
on
1
Intro
2
Background
3
Red Team Test
4
Ad Reports
5
Vulnerability
6
Threat
7
Methodology
8
Attacker Perspective
9
RedTeaming
10
Mapping
11
Gathering Intelligence
12
People are breakable
13
Correlation is hard
14
Hadoop
15
Act defensively
16
Validate your assumptions
17
Adapt your security strategy
18
Set traps
19
Examples
20
First example
21
Download binaries
22
snort
23
Legal discussion
24
Keepo
25
Artillery
26
Tools
27
Honey Pots
28
Play nice
29
Call for action
30
Take the initiative
31
Lower the thing down
Description:
Explore defensive cybersecurity strategies in this 44CON Information Security Conference talk. Learn how to maximize your organization's "home-field advantage" by adopting a proactive approach to security. Discover techniques for intelligence gathering on potential attackers, effective modeling for focused defense, and methods to expand your defensive spectrum beyond reactive measures. Gain insights into validating assumptions, adapting security strategies, and setting traps for adversaries. Examine practical examples, including the use of tools like Snort, Keepo, Artillery, and Honey Pots. Understand the importance of taking initiative in cybersecurity and how to effectively implement lessons learned from red team exercises. This presentation emphasizes utilizing existing resources and knowledge to improve your security posture without relying solely on new purchases.

SexyDefense - Maximizing the Home-Field Advantage

44CON Information Security Conference
Add to list
0:00 / 0:00