Главная
Study mode:
on
1
Intro
2
Why is Threat Hunting Needed?
3
What is Threat Hunting?
4
Running Processes
5
Process Privileges
6
Network Activity
7
Kernel Drivers
8
Persistence Mechanisms
9
Scheduled Tasks
10
Services
11
Anti-Virus & HIPs
12
What is the End Result?
13
How Do You Get There?
14
IT Security Pre-Deployment
15
Incorporating the IR Team Pre-Deployment
16
Incident Preparedness
17
Utilizing Documentation
18
Documentation into Internal Training
19
About Executive Support...
20
Spending: Security vs IR Preparedness
21
Conclusions
22
Questions/Comments?
Description:
Explore the critical need for proactive defense and threat hunting within organizations in this conference talk from BSides Tampa 2015. Delve into the reasons behind threat hunting's importance and gain a comprehensive understanding of its implementation. Learn about key areas of focus, including running processes, process privileges, network activity, kernel drivers, and persistence mechanisms. Discover how to effectively incorporate incident response teams, prepare for potential incidents, and utilize documentation for internal training. Examine the balance between security spending and incident response preparedness, and understand the importance of executive support in implementing robust cybersecurity measures. Conclude with valuable insights and engage in a Q&A session to further enhance your knowledge of proactive cybersecurity strategies.

The Need for Proactive Defense and Threat Hunting Within Organizations

Add to list