Главная
Study mode:
on
1
Intro
2
Iras first experience speaking in the Bible Belt
3
Why this presentation came about
4
Why the hype matters
5
Did your security program really suck
6
Sophisticated attacks
7
Use hype to your advantage
8
Hacking Team
9
Was this sophisticated
10
IRS breach
11
What do they need
12
Ashley Madison
13
SQL Injection
14
ISIS Hacks
15
Anthem Hack
16
Watering Hole Attack
17
The Detection Deficit Disorder
18
The IRS Attack
19
The IRI Rules
20
Common Vulnerabilities
21
Advanced Persistent Threats
22
Risk Management
23
Impolite Failure
24
Potential Loss
25
Security Budget
26
Multifactor Authentication
27
Assume Failure
28
Detection
29
Protection
30
Detecting
31
Security
Description:
Explore advanced strategies for combating persistent cyber threats in this conference talk from SecureWV/Hack3rcon 2017. Delve into the world of sophisticated attacks, examining real-world examples like the IRS breach, Ashley Madison hack, and Anthem data theft. Learn to leverage security hype to your advantage, understand the Detection Deficit Disorder, and implement the IRI Rules. Discover common vulnerabilities, risk management techniques, and the importance of multifactor authentication. Gain insights on assuming failure, improving detection and protection mechanisms, and allocating security budgets effectively. Master the art of fighting Advanced Persistent Threats with Advanced Persistent Security strategies.

Fighting Advanced Persistent Threats with Advanced Persistent Security

Add to list
0:00 / 0:00