Главная
Study mode:
on
1
Intro
2
Critical Assets
3
Short Game vs Long Game
4
Fundamentals
5
Asset Management
6
Our Own Battlefields
7
Defending the Unknown
8
Mapping Your Space
9
Collecting Data
10
Threat Intelligence
11
More data is not necessarily good
12
Where are you going to put that
13
What do you do
14
How many alerts
15
How many events can an analyst process
16
How long does it take to analyze an event
17
Do you drown in incidents
18
What threats are relevant
19
Everyones system is owned by malware
20
Three types of threats
21
Why does this matter
22
Tier 1 automated response
23
Destroy image
24
Human time expended
25
Containment analysis
26
Persistent threats
27
Human Time
28
Chess Match
29
Intelligent Prioritization
30
External Indicators
31
Internal External Content
32
Learning from Incidents
33
Raising Costs
34
The Goal
35
Real Security
Description:
Explore a comprehensive conference talk on active defense strategies in cybersecurity. Delve into the concept of winning long-term security wars despite losing individual battles. Learn about critical asset identification, the importance of asset management, and creating your own defensive battlefields. Discover techniques for mapping your digital space, collecting and analyzing threat intelligence, and dealing with data overload. Examine the challenges of alert fatigue, incident response, and analyst workload. Understand the three types of threats and their relevance to your organization. Investigate automated response systems, containment analysis, and persistent threat mitigation. Gain insights into intelligent prioritization, leveraging external indicators, and learning from security incidents. Explore strategies for raising costs for attackers and achieving real, sustainable security in an ever-evolving threat landscape.

Losing Battles Winning Wars - Active Defense Rebooted

Add to list