BSides DC 2019 - Sun - T1 - Looking to the Past to Better Understand Threat Intelligence
Genealogy is a search through your family history. As you progress through your research you can fall down into rabbit holes and uncover family secrets long since forgotten or hidden. This, amazingly, is not all that different from threat intel research. We will step through the process of finding a Revolutionary War ancestor and compare how it relates to finding an unknown threat actor.
John Laycock (Threat Intel Manager at White Ops)
Mr. Laycock has been involved with forensics for over 19 years. Starting out in the world of video forensics before moving over to computer forensics for the Department of Defense. He now works on the Satori Team for White Ops doing threat intel. Mr. Laycock lives in Maryland where he is a happily married father of 3 children and is a 5th generation Cubs fan who can't believe he finally got to see them win it all.
Видео BSides DC 2019 - Sun - T1 - Looking to the Past to Better Understand Threat Intelligence канала BSides DC
John Laycock (Threat Intel Manager at White Ops)
Mr. Laycock has been involved with forensics for over 19 years. Starting out in the world of video forensics before moving over to computer forensics for the Department of Defense. He now works on the Satori Team for White Ops doing threat intel. Mr. Laycock lives in Maryland where he is a happily married father of 3 children and is a 5th generation Cubs fan who can't believe he finally got to see them win it all.
Видео BSides DC 2019 - Sun - T1 - Looking to the Past to Better Understand Threat Intelligence канала BSides DC
Показать
Комментарии отсутствуют
Информация о видео
Другие видео канала
![BSides DC 2019 - We Do In The Shadows: "Going Dark" With Consumer Electronics](https://i.ytimg.com/vi/q-663aGnnJo/default.jpg)
![BSides DC 2018 - Network Traffic is an Open Book](https://i.ytimg.com/vi/knotaUAEV5c/default.jpg)
![BSides DC 2019 - Overcoming Workforce Retention & Recruitment Challenges in Cybersecurity](https://i.ytimg.com/vi/WBJnCLqgphY/default.jpg)
![BSides DC 2019 - Sun - T1 - What did the SIEM See?](https://i.ytimg.com/vi/e37qB-uQsWc/default.jpg)
![BSides DC 2016 - Tipping the Scales Back In Our Favor](https://i.ytimg.com/vi/UCSDL4711wE/default.jpg)
![BSides DC 2018 - Isolated to Constrained Language Mode - Living within the Confines](https://i.ytimg.com/vi/d_1P0rLb8gM/default.jpg)
![BSides DC 2016 - A Notional Framework for applying Antifragile thinking to the RMF](https://i.ytimg.com/vi/598ino_76bs/default.jpg)
![BSides DC 2019 - SCADA: What the next Stuxnet will look like and how to prevent it](https://i.ytimg.com/vi/JZaESWpzu1E/default.jpg)
![BSides DC 2015 - Welcome and Keynote: The New Face of Card Fraud](https://i.ytimg.com/vi/MOIwuE4H9PY/default.jpg)
![BSides DC 2019 - Malware Behavior Catalog](https://i.ytimg.com/vi/KY8Ty-0sdVU/default.jpg)
![BSides DC 2019 - What did the SIEM See?](https://i.ytimg.com/vi/4zjgl02z1bA/default.jpg)
![BSides DC 2016 - What’s the Big Deal with Assessing ICS/SCADA?](https://i.ytimg.com/vi/Idv9cR8xDNQ/default.jpg)
![BSides DC 2015 - Bridging the Gap: Lessons in Adversarial Tradecraft](https://i.ytimg.com/vi/xHkRhRo3l8o/default.jpg)
![BSides DC 2018 - What’s the Point of Compliance? Making Paperwork Useful](https://i.ytimg.com/vi/VfS2V2vbtaE/default.jpg)
![BSides DC 2016 - A Hacker’s Guide to Usability Testing](https://i.ytimg.com/vi/Nu-jcE8ARFc/default.jpg)
![BSides DC 2016 - Attacking Patient Health: The Anatomy of Hospital Exploitation](https://i.ytimg.com/vi/-7-S8ZhtZkQ/default.jpg)
![BSides DC 2014 - Building and Using A GPU Password Cracker](https://i.ytimg.com/vi/vRWetNz1G8o/default.jpg)
![BSides DC 2014 - Once upon a time... InfoSec History 101](https://i.ytimg.com/vi/Nja2LJ5ddG8/default.jpg)
![BSides DC 2019 - Digital Canaries in Coal Mines: Detecting Adversarial Enumeration with DNS & AD](https://i.ytimg.com/vi/d2G1s2QVLkU/default.jpg)
![BSides DC 2019 - Are you ready to leverage DevSecOps? Get ready and use it for good.](https://i.ytimg.com/vi/kWwnT8Zh0P4/default.jpg)
![BSides DC 2017 - Hacking ASUS Routers](https://i.ytimg.com/vi/lTl8LzKADSg/default.jpg)