Главная
Study mode:
on
1
Intro
2
I AM THE INSIDER THREAT
3
ADMIN BREAKING BAD
4
INSIDER THREAT INTENTIONS
5
INSIDER THREAT KILL CHAIN
6
PREVENT: HUMAN INDICATORS OF COMPROMISE
7
PREVENT: HUMAN TO MACHINE INDICATORS
8
PREVENT & DETECT
9
LOG INTELLIGENCE & ANALYTICS
10
WHAT TO LOG?
11
LOGGING REAL PROBLEMS
12
CASE STUDY: POWER COMPANY
13
IDS Inside The Network
14
Physical Security Meets Digital
15
Lazy Logging
16
Future Threats?
Description:
Explore the concept of insider threats in cybersecurity through this 21-minute conference talk from BSidesLV 2014. Delve into the insider threat kill chain and learn to identify human indicators of compromise. Examine various aspects of insider threats, including admin privileges, intentions, and prevention strategies. Discover the importance of log intelligence and analytics, understanding what to log and real-world logging challenges. Analyze a power company case study, discuss intrusion detection systems within networks, and explore the intersection of physical and digital security. Gain insights into future threats and the implications of lazy logging practices in organizational cybersecurity.

Insider Threat Kill Chain - Human Indicators of Compromise

Add to list
0:00 / 0:00