Главная
Study mode:
on
1
Introduction
2
Amanda Berlin
3
Open Source Intelligence II
4
ReconNG
5
The Harvester
6
Odin
7
Best Practice
8
Scripts
9
Disable SSL
10
Centralized Login
11
Remove Unnecessary Software
12
Disable DNS Zone Transfers
13
Spunk
14
Netdisco
15
Printers
16
Software
17
IR
18
Purple Team
19
Application Whitelisting
20
Purple teaming
21
Rawr
22
Compliance
23
VLANs
24
Budget
25
User Education
26
Favorite Vulnerability Scanner
Description:
Discover essential strategies for managing an inherited security department in this 46-minute conference talk. Learn about open-source intelligence tools like ReconNG, The Harvester, and Odin. Explore best practices for securing your network, including disabling SSL, implementing centralized login, and removing unnecessary software. Gain insights into incident response, purple teaming, and application whitelisting. Understand the importance of compliance, VLANs, budgeting, and user education. Acquire valuable knowledge on vulnerability scanning and other critical aspects of cybersecurity management to effectively lead your newly inherited security team.

So You've Inherited a Security Department - Now What

Add to list
0:00 / 0:00