Главная
Study mode:
on
1
Introduction
2
Anthony Blakemore
3
Agenda
4
Background
5
Why do attacks keep working
6
Life cycle of attacks
7
Network security and monitoring
8
Firewalls
9
Visibility
10
Why IPS fail
11
Internal traffic
12
LightCyber
13
Cold
14
Patch Management
15
Standardization
16
Standardize
17
Legacy Systems
18
Sim Products
19
Commitment to Sim
20
Sim Failures
21
Stealth Bits
22
Endpoint Protection
23
Breaches
24
Silence
25
Cobalt Strike
26
Wrapup
27
Questions
28
When are you going to replace these solutions
29
Is there a balance
30
Whitelisting
31
The Middle of the Road
32
Patching
33
Quarantine
34
Isolation
35
Solutions
36
Other Protections
37
Use Abilities
38
Find the Pain Point
39
Set Goals
40
High Coverage
Description:
Explore a comprehensive security conference talk that delves into removing ineffective elements from security programs. Learn why attacks continue to succeed, understand the lifecycle of attacks, and gain insights into network security and monitoring. Examine the limitations of firewalls, IPS failures, and the challenges of internal traffic visibility. Discover the importance of patch management, standardization, and the pitfalls of security information management (SIM) products. Investigate endpoint protection strategies, breach prevention, and the impact of tools like Cobalt Strike. Engage with discussions on replacing outdated solutions, balancing security measures, whitelisting, and implementing quarantine and isolation techniques. Acquire practical knowledge on leveraging existing abilities, identifying pain points, setting goals, and achieving high coverage in your security program.

Removing the Snake Oil From Your Security Program

Add to list
0:00 / 0:00