Загрузка страницы

Lean Hunting - SANS Threat Hunting Summit 2018

(Threat) Hunting has been around long enough that most agree it should be part of any comprehensive information security program. In any cat and mouse game, tooling will never catch all evil. We need to apply creativity, analytical thinking, and keep humans in the loop. The challenge, of course, is that human hours are scarce and expensive. Most organizations cannot afford to staff hunt teams 24/7 (or at all), so what’s the best way to deploy human attention to identify emerging threats? We’ll explore how to take aspects of entrepreneurship and align organizations to achieve positive outcomes by building lean (threat) hunting capabilities.

Ben Johnson (@chicagoben), Co-Founder & CTO, Obsidian Security
Ben Johnson is CTO and co-founder of Obsidian Security. Prior to founding Obsidian, he co-founded
Carbon Black and most recently served as the company’s Chief Security Strategist. As the company’s
original CTO, he led efforts to create the powerful capabilities that helped define the next-generation
endpoint security space. Prior to Carbon Black, Ben was an NSA computer scientist and later worked as
a cyber engineer in an advanced intrusion operations division for the intelligence community. Johnson
has extensive experience building complex systems for environments where speed and reliability are
paramount. His background also includes a great deal of technical “agility,” having worked on advanced
operational teams supporting US national security missions, to advising cyber security start-ups and the
Department of Justice to writing complex calculation engines for the financial sector. Johnson earned a
bachelor’s degree in computer science from the University of Chicago and a master’s degree in computer science from Johns Hopkins University. He lives in Newport Beach, CA with his wife and three sons.

Видео Lean Hunting - SANS Threat Hunting Summit 2018 канала SANS Digital Forensics and Incident Response
Показать
Комментарии отсутствуют
Введите заголовок:

Введите адрес ссылки:

Введите адрес видео с YouTube:

Зарегистрируйтесь или войдите с
Информация о видео
28 февраля 2019 г. 0:00:03
00:34:01
Другие видео канала
Threat Hunting with Network Flow - SANS Threat Hunting Summit 2017Threat Hunting with Network Flow - SANS Threat Hunting Summit 2017Huntworld - SANS Threat Hunting & Incident Response Summit 2017Huntworld - SANS Threat Hunting & Incident Response Summit 2017The Dark Arts of Social Engineering – SANS Security Awareness Summit 2018The Dark Arts of Social Engineering – SANS Security Awareness Summit 2018Real-Time Threat Hunting - SANS Threat Hunting & Incident Response Summit 2017Real-Time Threat Hunting - SANS Threat Hunting & Incident Response Summit 2017Living in the Shadow of the Shadow Brokers - SANS DFIR Summit 2018Living in the Shadow of the Shadow Brokers - SANS DFIR Summit 2018Hiring Veterans| Interview with Cyber Threat Intelligence Analyst John Stoner | 7 Eagle GroupHiring Veterans| Interview with Cyber Threat Intelligence Analyst John Stoner | 7 Eagle GroupThreat Hunting in Security Operation - SANS Threat Hunting Summit 2017Threat Hunting in Security Operation - SANS Threat Hunting Summit 2017Hunting for Post-Exploitation Stage Attacks with Elastic Stack and the MITRE ATT&CK FrameworkHunting for Post-Exploitation Stage Attacks with Elastic Stack and the MITRE ATT&CK FrameworkUsing Open Tools to Convert Threat Intelligence into Practical Defenses: Threat Hunting Summit 2016Using Open Tools to Convert Threat Intelligence into Practical Defenses: Threat Hunting Summit 2016MAC Times, Mac Times, and More - SANS Digital Forensics & Incident Response Summit 2017MAC Times, Mac Times, and More - SANS Digital Forensics & Incident Response Summit 2017Hunting Hidden Empires with  TLS - Certified Hypotheses - SANS Cyber Threat Intelligence Summit 2018Hunting Hidden Empires with TLS - Certified Hypotheses - SANS Cyber Threat Intelligence Summit 2018Advanced Incident Detection and Threat Hunting using Sysmon and Splunk - Tom UeltschiAdvanced Incident Detection and Threat Hunting using Sysmon and Splunk - Tom UeltschiTaking Hunting to the Next Level: Hunting in Memory - SANS Threat Hunting Summit 2017Taking Hunting to the Next Level: Hunting in Memory - SANS Threat Hunting Summit 2017What to do if detective wants a callbackWhat to do if detective wants a callbackHunting Is Sacred, But We Never Do It for Sport! - SANS THIR Summit 2019Hunting Is Sacred, But We Never Do It for Sport! - SANS THIR Summit 2019Threat Hunting Using Live Box Forensics - SANS Threat Hunting Summit 2018Threat Hunting Using Live Box Forensics - SANS Threat Hunting Summit 2018Toppling the Stack: Outlier Detection for Threat Hunters - SANS Threat Hunting Summit 2017Toppling the Stack: Outlier Detection for Threat Hunters - SANS Threat Hunting Summit 2017How Threats Are Slipping In the Back Door - SANS ICS Security Summit 2017How Threats Are Slipping In the Back Door - SANS ICS Security Summit 2017FOR508 - Advanced Incident Response and Threat Hunting Course Updates: Hunting GuideFOR508 - Advanced Incident Response and Threat Hunting Course Updates: Hunting Guide
Яндекс.Метрика