Huntworld - SANS Threat Hunting & Incident Response Summit 2017
Adversaries have been coming to our networks for nearly 20 years, repeating the same intrusions day after day, while we repeat more or less the same responses day after day. We’ll kick off the second annual Threat Hunting & Incident Response Summit by exploring
the hunting culture over the years and studying what works, what doesn’t, and what the future holds.
Rob Lee (@robtlee), Lead – DFIR Curriculum, SANS Institute
Видео Huntworld - SANS Threat Hunting & Incident Response Summit 2017 канала SANS Digital Forensics and Incident Response
the hunting culture over the years and studying what works, what doesn’t, and what the future holds.
Rob Lee (@robtlee), Lead – DFIR Curriculum, SANS Institute
Видео Huntworld - SANS Threat Hunting & Incident Response Summit 2017 канала SANS Digital Forensics and Incident Response
Показать
Комментарии отсутствуют
Информация о видео
24 октября 2017 г. 19:30:01
00:55:00
Другие видео канала
Threat Detection and Hunting for Common MITRE ATT&CK TechniquesEfficiently Summarizing Web Browsing Activity - SANS DFIR Summit 2018Incident Response in the CloudSurvival Heuristics: My Favorite Techniques for Avoiding Intelligence Traps - SANS CTI Summit 2018Investigating WMI AttacksSANS Webcast: Effective (Threat) Hunting TechniquesHunting Webshells: Tracking TwoFace - SANS Threat Hunting Summit 2018Living in the Shadow of the Shadow Brokers - SANS DFIR Summit 2018Hunting for Post-Exploitation Stage Attacks with Elastic Stack and the MITRE ATT&CK FrameworkFinding and Decoding Malicious Powershell Scripts - SANS DFIR Summit 2018Differentiating Evil from Benign in the Normally Abnormal World - SANS Threat Hunting Summit 2018Creating a Security Metrics Program: How to Measure Success - SANS ICS Security Summit 2019SOF ELK® A Free, Scalable Analysis Platform for Forensic, Incident Response, and Security OperationSANS Webcast - Perimeter Security and Why it is ObsoleteBusiness Email Compromise; Office 365 Making Sense of All the NoiseTriage Collection and Timeline Analysis with KAPEHow Threats Are Slipping In the Back Door - SANS ICS Security Summit 2017Lean Hunting - SANS Threat Hunting Summit 2018What Event Logs Part 2 Lateral Movement without Event LogsEssential Elements of Effective Threat Hunting