Главная
Study mode:
on
1
Introduction
2
Jim Aldridge
3
Threat Landscape
4
What is a Targeted Persistent Threat
5
Advanced Persistent Threat
6
Incident Response
7
Example
8
Target Attack Lifecycle
9
Recommended Approach
10
Day 1 Attack
11
Day 4 Takeaways
12
Recommended Remediation Approach
13
Remediation Phase
14
Remediation Activities
15
Strategic Initiatives
16
Caveats
17
Prioritizing Initiatives
18
Login Monitoring
19
Password Change
20
Application Whitelisting
21
Strategic
22
Hunting
23
Investigation Ready
24
Enhancements
25
Survey
26
Additional Questions
Description:
Explore a comprehensive Black Hat USA 2012 conference talk on targeted intrusion remediation strategies. Delve into the unique challenges posed by persistent threats and learn how to adapt your approach for effective defense. Discover a three-pronged model for tactical and strategic security planning, focusing on inhibiting attacker activities, enhancing visibility for compromise detection, and improving rapid response capabilities. Gain insights from Jim Aldridge, a Mandiant manager with extensive experience in incident remediation, as he shares lessons learned from handling numerous APT threat actor cases. Examine the targeted attack lifecycle, recommended remediation approaches, and strategic initiatives to strengthen your organization's security posture. Understand the importance of login monitoring, password changes, application whitelisting, and strategic hunting in combating sophisticated threats.

Targeted Intrusion Remediation - Lessons From The Front Lines

Black Hat
Add to list