Главная
Study mode:
on
1
Intro
2
Outline
3
Incident Response Model
4
The baddies have a model too...
5
Intrusion Kill Chain
6
The Incident Tango
7
Data to Intelligence
8
Developing Intelligence
9
Five Different Attacks?
10
Or One Persistent Attack?
11
Quick Tips for Believability
12
Unorganized Informal Communities
13
Infragard
14
Active Defense is NOT...
15
Active Defense is...
16
Why Active Defense?
17
Delay
18
Demo Time
19
Conclusion
20
Questions?
21
Contact Information
Description:
Explore incident response strategies and active defense techniques in this conference talk from BSides Rhode Island. Dive into the Incident Response Model and compare it with the adversary's approach using the Intrusion Kill Chain. Learn how to transform data into actionable intelligence and distinguish between multiple attacks versus a single persistent threat. Gain insights on developing believable intelligence and understanding the role of informal communities in cybersecurity. Discover what active defense truly entails, its benefits, and how it can delay attackers. Watch a live demonstration and engage with the speaker's concluding thoughts on effective cybersecurity practices.

Blitzing with Your Defense - Active Incident Response Strategies

Add to list