Главная
Study mode:
on
1
Introduction
2
Jon Stewart
3
Home Depot
4
How do we solve that
5
Conficker
6
Common underlying attacks
7
Kaminsky attack
8
Target attack
9
Attack chain
10
Network noise
11
Weak link
12
Business problem
13
Industrialization
14
Rapid compliance
15
Security reports
16
Attack continuum
17
What is a security analyst
18
Security analyst vs security ops manager
19
NICE Framework
20
What does a security analyst do
21
The problem with perimeter security
22
Complex threat and visibility
23
A wellknown tool
24
Areas of focus
25
Security investigation process
26
Security policies
Description:
Explore the role and responsibilities of a security analyst in this comprehensive conference talk from BSides Tampa 2015. Delve into the evolving landscape of cybersecurity, examining high-profile attacks like Conficker and the Target breach. Understand the challenges faced by security professionals, including network noise, weak links, and the industrialization of threats. Learn about the NICE Framework and how it defines the security analyst role. Discover the key differences between security analysts and security operations managers. Investigate the limitations of perimeter security and the need for complex threat visibility. Gain insights into essential security investigation processes and the importance of well-defined security policies in today's rapidly changing digital environment.

What Is a Security Analyst and What Job Role Will They Perform

Add to list