Главная
Study mode:
on
1
Introduction
2
Morse Code
3
Sun Tzu
4
Program
5
Customers want more
6
spear phishing
7
business email compromise
8
make it work
9
this is getting to
10
social engineering
11
whats a fish
12
stats
13
numbers
14
monitoring
15
data sources
16
attribute attribution
17
poker tells
18
behaviors and habits
19
human limitations
20
resources
21
attack habits
22
attribution
23
forensic evidence
24
collecting too much
25
extracting the files
26
common strings
27
spreadsheet
28
mount ego
29
investigative tools
30
hacker dread
Description:
Learn to develop a comprehensive cyber threat actor attribution program in this 22-minute conference talk from BSides Philly 2016. Explore topics including Morse Code, Sun Tzu's strategies, spear phishing, business email compromise, social engineering, and data monitoring. Discover techniques for identifying attacker behaviors, habits, and forensic evidence. Gain insights into investigative tools, data extraction methods, and the importance of analyzing common strings. Understand the challenges of collecting too much information and how to effectively attribute cyber attacks to specific threat actors.

Knowing the Enemy - Creating a Cyber Threat Actor Attribution Program

Add to list