Главная
Study mode:
on
1
Introduction
2
Security breaches
3
Alert fatigue
4
Identify the intrusion
5
Rockstar mentality
6
The secret sock
7
The budget sock
8
Threat modeling
9
Threat modeling process
10
Modeling
11
Enumeration
12
Modelling
Description:
Discover effective strategies for security monitoring and learn how to prevent critical breaches in this insightful conference talk from Security BSides London. Explore the challenges of alert fatigue and the importance of identifying intrusions promptly. Gain valuable insights into threat modeling processes, including enumeration and modeling techniques. Understand the pitfalls of the "rockstar mentality" in cybersecurity and learn practical approaches to improve your organization's security posture. Delve into concepts like the "secret sock" and "budget sock" to enhance your understanding of resource allocation in security monitoring.

Security Monitoring - Avoiding Oh Sh*t Moments

Security BSides London
Add to list