Главная
Study mode:
on
1
Introduction
2
Welcome
3
Personal Background
4
Metasploit
5
Wannacry
6
Awareness
7
Who would hack your network
8
Prevention capabilities are not good
9
Know whats in your network
10
We can all do this
11
Lab to test
12
Lack of measurement
13
Maturity levels
14
Vulnerability assessment
15
The solution of security
16
Breach attack simulation tools
17
Where to practice
18
Hacking Yourself
19
Example
20
Sandboxing
21
Testing
22
Kali Linux
23
Powershell
24
Organization
25
Tools
26
Endpoint
27
Frequency Vulnerability Assessment
28
Malware Polymorphism
29
Continuous Testing
30
Machine Learning
31
Simulation
32
Summary
33
Optimization
34
Questions
Description:
Explore a DefCamp 2019 conference talk on implementing continuous offense to measure and monitor cybersecurity defenses. Delve into the importance of proactive security measures, including vulnerability assessments, breach attack simulations, and continuous testing. Learn about tools like Metasploit, Kali Linux, and PowerShell for ethical hacking. Discover the significance of understanding your network, practicing in sandboxed environments, and leveraging machine learning for optimized security. Gain insights on maturity levels, malware polymorphism, and the evolving landscape of cybersecurity threats. Engage with practical examples and strategies to enhance your organization's defense capabilities against potential attacks.

Implementing Continuous Offense to Measure and Monitor Cybersecurity Defenses - DefCamp - 2019

DefCamp
Add to list
0:00 / 0:00