Главная
Study mode:
on
1
Introduction
2
Who am I
3
Overview
4
Means
5
Advanced Persistent
6
Static Variables
7
Class Structure
8
Aerospace Industry
9
Not a Rat
10
Fake Login Form
11
Intelligence
12
Feedback Loop
13
Data Collection
14
Goals
15
Why Open Source
16
People
17
Cuckoo Sandbox
18
Document
19
Tracking
20
Sharing
21
Declassified Report
22
Intel Sharing
23
Targeting Information
24
Reporting Watering Holes
25
Defending Data
26
Best Practices
27
Protocols
28
Crits
29
What makes a good Intel sharing community
30
No leverage
31
Automated remediation
32
Slides
33
Top Security Controls
Description:
Explore the intricacies of building an intelligence program from the ground up in this 51-minute conference talk from BSides Columbus 2016. Delve into topics such as advanced persistent threats, static variables, and class structure within the aerospace industry. Learn about intelligence gathering techniques, including open-source methods, data collection, and the importance of feedback loops. Discover the significance of intel sharing, targeting information, and defending data through best practices and protocols. Gain insights into effective intel sharing communities, automated remediation, and top security controls. Examine practical examples like fake login forms, Cuckoo Sandbox, and document tracking to enhance your understanding of offensive and defensive strategies in the cybersecurity landscape.

Open Secrets of the Defense Industry - Building Your Own Intelligence Program From the Ground

Add to list