Implementing the Lessons Learned From a Major Cyber Attack
In June 2017, Maersk suffered a major notpetya cyber-attack, this session explains lessons learned and how they are now being applied within Maersk.
By Andy Powell
Full Abstract: https://www.blackhat.com/eu-19/briefings/schedule/#implementing-the-lessons-learned-from-a-major-cyber-attack-18198
Видео Implementing the Lessons Learned From a Major Cyber Attack канала Black Hat
By Andy Powell
Full Abstract: https://www.blackhat.com/eu-19/briefings/schedule/#implementing-the-lessons-learned-from-a-major-cyber-attack-18198
Видео Implementing the Lessons Learned From a Major Cyber Attack канала Black Hat
Показать
Комментарии отсутствуют
Информация о видео
Другие видео канала
![Lies and Damn Lies: Getting Past the Hype of Endpoint Security Solutions](https://i.ytimg.com/vi/3p_7hYXxkXE/default.jpg)
![CQTools: The New Ultimate Hacking Toolkit](https://i.ytimg.com/vi/MZ0nSO0WOJg/default.jpg)
![Top 4 Active Directory Security Issues from 2 Years of Security Assessments | OD319](https://i.ytimg.com/vi/pXX9NR6F5B8/default.jpg)
![Most Ransomware Isn't As Complex As You Might Think](https://i.ytimg.com/vi/3pH13DxClag/default.jpg)
![Why Cybersecurity is Important! | Romeo Farinacci | TEDxGrandCanyonUniversity](https://i.ytimg.com/vi/JIJslcA8Q5g/default.jpg)
![Lessons Learned Meeting: How to Make it Excellent](https://i.ytimg.com/vi/cemERTeeQ7M/default.jpg)
![AirBnBeware: Short Term Rentals Long Term Pwnage](https://i.ytimg.com/vi/9fAnRkJ6N3s/default.jpg)
![Supernatural Seminar | Dr. Michael Heiser // Session 1](https://i.ytimg.com/vi/IZKy1Xt2Ow0/default.jpg)
![Israel's Cyber Spies And The Future of Crypto Warfare - Unit 8200 - Technology Documentary](https://i.ytimg.com/vi/29HfyHyEg-4/default.jpg)
![Amy Edmondson | Failure’s Mixed Bag](https://i.ytimg.com/vi/VH9Y3-lCigM/default.jpg)
![2019 LLVM Developers’ Meeting: E. Christopher & J. Doerfert “Introduction to LLVM”](https://i.ytimg.com/vi/J5xExRGaIIY/default.jpg)
![Cracking the Lens: Targeting HTTP's Hidden Attack-Surface](https://i.ytimg.com/vi/zP4b3pw94s0/default.jpg)
![Ethical challenges in Cybersecurity, by Mikko Hypponen](https://i.ytimg.com/vi/-CXD8qSPDHo/default.jpg)
![Breaking The Kill Chain: A Defensive Approach](https://i.ytimg.com/vi/II91fiUax2g/default.jpg)
![Live Cyber-Attack Simulation](https://i.ytimg.com/vi/WRIakA5CP3I/default.jpg)
![DEF CON 25 - Dennis Maldonado - Real time RFID Cloning in the Field](https://i.ytimg.com/vi/kUduHIygbY8/default.jpg)
![I'll Let Myself In: Tactics of Physical Pen Testers](https://i.ytimg.com/vi/rnmcRTnTNC8/default.jpg)
![The Latest in Cyber Attacks](https://i.ytimg.com/vi/AQP0On85ZdQ/default.jpg)
![Real-Time Threat Hunting - SANS Threat Hunting & Incident Response Summit 2017](https://i.ytimg.com/vi/TTbZd0he94U/default.jpg)
![Black Hat 2013 - Exploiting Network Surveillance Cameras Like a Hollywood Hacker](https://i.ytimg.com/vi/B8DjTcANBx0/default.jpg)