Главная
Study mode:
on
1
Introduction
2
What is Incident Response
3
Entry Points
4
Telemetry
5
Active Directory
6
Content Filtering
7
General Traffic
8
Human Activity
9
Domain Accounts
10
Problems
11
Worth it
12
Gaps
13
Whats next
Description:
Explore techniques for detecting and analyzing network breaches in this 45-minute conference talk from LASCON. Learn how to identify anomalous behavior, capture host images, and determine ongoing malware and hacker activity. Gain insights from experienced Red Team members as they share their expertise in Blue Team activities. Discover approaches for locating suspicious network activity, analyzing it with certainty, and eradicating threats. Cover topics such as incident response, entry points, telemetry, Active Directory, content filtering, general traffic analysis, human activity detection, and domain account monitoring. Understand common problems, assess the value of breach assessments, identify gaps in security, and explore future developments in cybersecurity. Equip yourself with the knowledge to answer critical questions about your organization's security posture and ability to detect ongoing attacks.

Breach Assessments - Are You Owned? You Can Find Out!

LASCON
Add to list
0:00 / 0:00