Главная
Study mode:
on
1
Intro
2
A little about me
3
History of Hacking (Snapshot)
4
Hollywood's Romanticized "Hackers"
5
A New Type of Attack?
6
Adaptive Penetration Testing
7
APT2 Concept
8
Denial of Threat
9
We have created the Perfect Storm
10
Attack Vectors
11
The Compliance Problem
12
Attack Behavior (Welcome to Reality 101)
13
APT2 Rationale
14
APT Rationale
15
Case Study
16
Compliance Based Pen Tests
17
Business Driven Pen Tests
18
Where do you see business value?
19
Taxonomy of Criminal Attack
20
Attack Dimensions
21
Addressing the Advanced Persistent Threat
22
APT Resiliency Model
23
My Contact Information
Description:
Explore the concept of Adaptive Penetration Testing (APT2) and learn how to build a resilient program to protect businesses in this 44-minute conference talk from BSides Cleveland 2014. Delve into the history of hacking, examine Hollywood's romanticized portrayal of hackers, and understand the emergence of new attack types. Discover the APT2 concept, explore denial of threat scenarios, and analyze various attack vectors. Investigate the compliance problem, study real-world attack behaviors, and understand the rationale behind APT2. Compare compliance-based and business-driven penetration tests, examine the taxonomy of criminal attacks, and learn how to address advanced persistent threats. Gain insights into the APT Resiliency Model and acquire valuable knowledge to enhance your organization's cybersecurity posture.

Building a Resiliency Program to Protect Business

Add to list