Главная
Study mode:
on
1
Intro
2
Widgets dont help
3
Python fans
4
Visibility
5
Complexity
6
Fail
7
Do you control the situation
8
Critical assets exfiltrated
9
Data governance projects
10
Recovering from a breach
11
What happens if you fail
12
Website defacements
13
Stolen trade secrets
14
Defense perspective
15
Attack perspective
16
Objective
17
We dont suck at security
18
Short game
19
Fundamentals
20
Asset Management
21
Network Map
22
Home Ice Advantage
23
Mapping Your Space
24
Collecting Data
25
Threat Intelligence
26
Intelligence
27
Where
28
Alerts
29
Pentesting
30
What threats are relevant
31
Malware
32
Types of Threats
33
Why Does This Matter
34
Tier 1 Automated Response
35
Reimage
36
Human time expended
37
Persistent threats
38
Human Time
39
Intelligent Prioritization
40
Learning
41
Raising Costs
42
The Goal
43
Real Security
Description:
Explore a comprehensive conference talk from DerbyCon 2015 that delves into the concept of active defense and its modern applications. Learn about the challenges faced in cybersecurity, including the limitations of widgets and the importance of visibility and complexity management. Discover how to regain control over critical assets, implement effective data governance projects, and recover from breaches. Examine the consequences of security failures, such as website defacements and stolen trade secrets, from both defense and attack perspectives. Gain insights into fundamental security practices, including asset management, network mapping, and threat intelligence. Understand the significance of home ice advantage, data collection, and intelligent prioritization in cybersecurity. Explore various types of threats, automated responses, and the value of human intervention in persistent threat scenarios. Discover strategies for raising costs for attackers and achieving real security through continuous learning and adaptation. Read more

Losing Battles Winning Wars - Active Defense Rebooted

Add to list