Главная
Study mode:
on
1
Intro
2
The problem
3
Visibility
4
The Solution
5
Choosing Your Tools
6
Tools
7
Tools can be greedy
8
Symbiotic security
9
The question
10
Flow Data
11
HD Moore
12
Pattern Query Language
13
Malware Domain List
14
Results
15
Symbiotic Example
16
Darknet Analytics
17
Data Exfiltration
18
Port Scans
19
Outbound Connections
20
False Positives
21
Poll
22
Walter
23
VirusTotal
24
McAfee Alerts
25
McAfee Timeline
26
Custom Integration
27
Collective Intelligence Framework
28
RealTime Decision Making
29
Taking Action
30
Security Analytics
31
LastCon
32
Questions
Description:
Learn to detect and respond to security breaches before significant damage occurs in this 50-minute conference talk from HouSecCon 6 (2015). Explore the importance of visibility in cybersecurity, discover effective tools for breach detection, and understand the concept of symbiotic security. Delve into topics such as flow data analysis, pattern query language, and malware domain lists. Examine real-world examples of data exfiltration, port scans, and outbound connections. Gain insights into handling false positives, leveraging collective intelligence frameworks, and implementing real-time decision-making processes. Acquire practical knowledge on taking action and utilizing security analytics to enhance your organization's cybersecurity posture.

The Fox is in the Henhouse - Detecting a Breach Before the Damage is Done

Add to list
0:00 / 0:00