Главная
Study mode:
on
1
Introduction
2
Overview
3
Maersk
4
The Golden Hour
5
NotPetya
6
Active Directory
7
Recovery
8
Logistics
9
Changing threat landscape
10
Applying the lessons
11
Resilient Active Directory
12
Target Operating Models
13
OT Frameworks
14
Security Operating Principles
15
The TwoWay Process
16
How did the person who brought the malware come forward
17
Why did you choose the cloud
18
The danger of fighting the last war
19
Riskbased approach
Description:
Explore the aftermath and lessons learned from Maersk's major NotPetya cyber-attack in June 2017 through this 51-minute Black Hat conference talk. Delve into the critical "Golden Hour" of response, the impact on Active Directory, and the recovery process. Examine the changing threat landscape and how Maersk applied these lessons to enhance cybersecurity. Learn about implementing resilient Active Directory structures, target operating models, OT frameworks, and security operating principles. Gain insights into the two-way process of improvement, cloud migration decisions, and adopting a risk-based approach to cybersecurity. Understand the importance of adapting to new threats rather than fighting the last war in this informative session presented by Andy Powell.

Implementing the Lessons Learned From a Major Cyber Attack

Black Hat
Add to list
0:00 / 0:00