Главная
Study mode:
on
You
History
Saved
In progress
0 courses
compleat
0 courses
#Art & Design
#Adobe
#ChatGPT
#GitHub
#Incident Analysis
Showing:
31
courses
Sort by Relevancy
Highest rated
Lowest rated
Most recently added
Dragos: ICS Cybersecurity
2021 ICS/OT Cybersecurity Threat Landscape Review
0
rewiews
Explore the 2021 ICS/OT cybersecurity landscape, including new threat groups, ransomware trends, and notable incidents. Gain insights to better safeguard industrial control systems and operational technologies.
Add to list
15
Lesons
1 hour
On-Demand
Free-Video
Linux Foundation
Are We Forever Doomed to Software Supply Chain Security?
0
rewiews
Explore software supply chain security challenges, recent incidents, and strategies for mitigating vulnerabilities in open-source ecosystems. Learn about maintainer account security and registry management.
Add to list
11
Lesons
16 minutes
On-Demand
Free-Video
USENIX
When One Line Took Thousands of Websites Offline - Lessons from a Kubernetes Incident
0
rewiews
Explore a critical incident where a single configuration change caused widespread website outages, examining the recovery process, lessons learned, and subsequent improvements in Kubernetes infrastructure.
Add to list
1
Lesons
27 minutes
On-Demand
Free-Video
BruCON Security Conference
Inside the Biggest Hacks and Facts of the Past Year - 2022-2023
0
rewiews
Explore the most significant cybersecurity events, active threat actors, and surprising facts from 2022-2023 in this comprehensive overview of the rapidly evolving digital security landscape.
Add to list
1
Lesons
42 minutes
On-Demand
Free-Video
Defeating Cognitive Bias and Developing Analytic Technique - T100
0
rewiews
Explore cognitive biases in cybersecurity analysis, learn techniques to overcome them, and develop stronger analytical skills for more effective network security monitoring and incident response.
Add to list
37
Lesons
49 minutes
On-Demand
Free-Video
Security BSides London
Breaking the Cloud - A Tale of Three Breaches
0
rewiews
Explore three real-world cloud security breaches, analyzing attack vectors, vulnerabilities, and lessons learned to enhance your organization's cloud defenses and incident response strategies.
Add to list
1
Lesons
38 minutes
On-Demand
Free-Video
CNCF [Cloud Native Computing Foundation]
How a Couple of Characters and GitOps Brought Down Our Site
0
rewiews
Explore how GitOps adoption led to a global outage at Skyscanner, examining challenges, benefits, and key learnings to help prevent similar incidents in cloud-native environments.
Add to list
1
Lesons
48 minutes
On-Demand
Free-Video
Automating Incident Response
0
rewiews
Explore techniques for streamlining and automating incident response processes to enhance cybersecurity efficiency and effectiveness.
Add to list
1
Lesons
47 minutes
On-Demand
Free-Video
Security BSides San Francisco
A Year in the Wild - Fighting Malware at the Corporate Level
0
rewiews
Explore Yelp's automated malware defense system, featuring in-house tools like AIR and OSXCollector, complemented by open-source solutions for swift threat detection and response in corporate networks.
Add to list
14
Lesons
34 minutes
On-Demand
Free-Video
Threat Intel Analysis of Ukrainians Power Grid Hack
0
rewiews
Analyze the Ukrainian power grid hack, exploring tools, techniques, and implications. Learn about ICS vulnerabilities, attack stages, and strategies to enhance critical infrastructure security.
Add to list
33
Lesons
43 minutes
On-Demand
Free-Video
USENIX
Metastable Failures in the Wild
0
rewiews
Explores metastable failures in distributed systems, analyzing real-world incidents to categorize triggers and amplification mechanisms, aiding understanding and potential solutions for this prevalent issue.
Add to list
12
Lesons
16 minutes
On-Demand
Free-Video
USENIX
The Origins of USAA's Postmortem of the Week
0
rewiews
Discover USAA's journey in establishing an IT-wide Postmortem Review meeting, with tips for implementing your own large-scale review process. Learn from their experiences and insights.
Add to list
5
Lesons
18 minutes
On-Demand
Free-Video
USENIX
Tales from the VOID - The Scary Truth about Incident Metrics
0
rewiews
Challenges industry-standard incident metrics, proposing alternative approaches for better system resilience. Explores VOID database insights to improve incident response and organizational learning.
Add to list
19
Lesons
27 minutes
On-Demand
Free-Video
USENIX
Are We Getting Better Yet? - Progress Toward Safer Operations
0
rewiews
Exploring progress in safer operations, this talk delves into effective incident analysis, organizational learning, and strategic investments for improved reliability and team well-being.
Add to list
23
Lesons
41 minutes
On-Demand
Free-Video
USENIX
Meatbag Systems - How Our Reliability Culture & Practice Evolved over Time
0
rewiews
Exploring the evolution of reliability culture through major incidents, emphasizing the human aspect in maintaining production systems and aligning reliability with customer value.
Add to list
1
Lesons
24 minutes
On-Demand
Free-Video
media.ccc.de
OMGOVHBBQ
0
rewiews
Análisis detallado del incendio en el centro de datos de Estrasburgo en marzo de 2021, sus causas y consecuencias para la infraestructura en la nube.
Add to list
1
Lesons
37 minutes
On-Demand
Free-Video
USENIX
Patterns, Not Categories - Learning Across Incidents
0
rewiews
Explore a pattern-centered approach to outage analysis, moving beyond traditional categorization methods to identify fundamental failure patterns in complex systems for improved reliability decision-making.
Add to list
1
Lesons
45 minutes
On-Demand
Free-Video
GOTO Conferences
An Incident Post-Mortem
0
rewiews
Explore the process of conducting effective incident post-mortems in software engineering, focusing on collaborative problem-solving and continuous improvement without blame or finger-pointing.
Add to list
1
Lesons
31 minutes
On-Demand
Free-Video
USENIX
Turning an Incident Report into a Design Issue with TLA+
0
rewiews
Explore how modeling-driven techniques and TLA+ can enhance postmortem analysis, uncover root causes, and improve system design in distributed database architectures.
Add to list
1
Lesons
31 minutes
On-Demand
Free-Video
USENIX
Incident Commanders to Incident Analysts - How We Got Here
0
rewiews
Explore the transition from incident management to incident analysis, highlighting the distinct skills required and the value of post-incident learning for driving meaningful organizational change.
Add to list
1
Lesons
26 minutes
On-Demand
Free-Video
USENIX
Far from the Shallows - The Value of Deeper Incident Analysis
0
rewiews
Explore the value of in-depth incident analysis in SRE, moving beyond surface-level metrics to uncover hidden insights and improve system reliability through qualitative investigation.
Add to list
1
Lesons
40 minutes
On-Demand
Free-Video
Black Hat
Legal Aspects of Cyberspace Operations
0
rewiews
Explore legal frameworks for cyberspace operations, including network security, defense, exploitation, and attack. Gain insights into recent incidents and their legal classifications.
Add to list
1
Lesons
1 hour 2 minutes
On-Demand
Free-Video
GOTO Conferences
Incident Analysis Before Chaos Engineering
0
rewiews
Explore incident analysis in chaos engineering with real-world stories, learn its benefits, and discover how to implement it effectively for improved system resilience and reliability.
Add to list
10
Lesons
25 minutes
On-Demand
Free-Video
Black Hat
Interpretable Incident Inspector Based on Large-Scale Language Model and Association Mining
0
rewiews
Explainable AI-powered incident inspector combining language models and association mining for robust, interpretable cybersecurity analysis of large-scale events.
Add to list
1
Lesons
40 minutes
On-Demand
Free-Video
Losing Battles Winning Wars - Active Defense Rebooted
0
rewiews
Explore active defense strategies, focusing on asset management, threat intelligence, and intelligent prioritization to effectively combat persistent threats and achieve real security.
Add to list
35
Lesons
46 minutes
On-Demand
Free-Video
Lend Me Your IRs
0
rewiews
Explore incident response strategies and best practices for effective cybersecurity management in this informative conference talk by Matt Scheurer.
Add to list
1
Lesons
53 minutes
On-Demand
Free-Video
USENIX
AutoARTS - Taxonomy, Insights and Tools for Root Cause Labelling of Incidents in Microsoft Azure
0
rewiews
Comprehensive study on incident root causes in Microsoft Azure, proposing a novel hierarchical taxonomy and automated labeling tool to improve postmortem analysis and prevent future incidents.
Add to list
1
Lesons
20 minutes
On-Demand
Free-Video
JSConf
A Postmortem on the Ingen Incident
0
rewiews
Explore a unique software postmortem analysis of the Jurassic Park incident, blending tech insights with pop culture references for an engaging look at system failures and disaster prevention.
Add to list
1
Lesons
27 minutes
On-Demand
Free-Video
USENIX Enigma Conference
Moving Fast and Breaking Things - Security Misconfigurations in Practice
0
rewiews
Exploring system operators' perspectives on security misconfigurations, analyzing root causes, and providing practical recommendations to reduce their frequency and impact in organizations.
Add to list
15
Lesons
20 minutes
On-Demand
Free-Video
SF Python
CAST-Based Analysis for Software Incident Investigations and Retrospectives
0
rewiews
Discover how to conduct effective incident investigations using CAST methodology, focusing on software reliability engineering and systematic analysis of system failures.
Add to list
1
Lesons
29 minutes
On-Demand
Free-Video
CNCF [Cloud Native Computing Foundation]
No Requests, No Limits, No Service - How to Bring Kubernetes to a Grinding Halt
0
rewiews
Dive into a real-world Kubernetes incident analysis, exploring how thousands of test environment pods caused cluster failure and learn valuable lessons for managing internal build platforms.
Add to list
1
Lesons
17 minutes
On-Demand
Free-Video
load more...