YoVDO

Automated Human Vulnerability Scanning With AVA

Offered By: Black Hat via YouTube

Tags

Black Hat Courses Threat Intelligence Courses Privacy Courses Behavior Analysis Courses Application Security Courses Phishing Attacks Courses

Course Description

Overview

Explore the groundbreaking approach to human vulnerability scanning presented in this Black Hat conference talk. Delve into the challenges of addressing human security risks and discover AVA, the first automated human vulnerability scanner. Learn how AVA maps people's connectivity, tests them with various security threats, and measures their behavior to make human security risk measurable. Understand the importance of actively protecting people within organizations, the limitations of current approaches, and the potential for transforming human security risk management. Gain insights into the phases of AVA, including the Principle of Least Privilege, information gathering, phishing attacks, and predictive behavior analysis. Examine case studies, discuss the public interest aspects of security tools, and consider the complexities of data scale and privacy. Reflect on the need for innovative solutions in the face of evolving security challenges and the potential impact of this new approach on organizational security strategies.

Syllabus

Introduction
Breaking conventions
You might feel uncomfortable
What are we discussing
I like people
Weve conquered it
Theyre relatively lazy
Technology
Vulnerability
Defense
Compliance
Shame victims
We are connected species
We do bits and pieces
We dont test
Why we dont test
Border devices arent enough
What is AVA
What does AVA mean
Phases
Principle of Least Privilege
Pulling Information
Phishing Attacks
Honeypot SMS
Powerplay
Call to Action
Giving the option of succeeding
Behavior over time
Training is big business
Graphs
Predictive Behavior Analysis
Boring Technologies
Demo
Case Study
Public Interest Security Tool
Threat Intelligence Application Security
Spam
Privacy
Complexity
Scale of Data
Why Compromise
Why We Need Unicorns
Nest
Google
Learn more
Questions


Taught by

Black Hat

Related Courses

Attack on Titan M, Reloaded - Vulnerability Research on a Modern Security Chip
Black Hat via YouTube
Attacks From a New Front Door in 4G & 5G Mobile Networks
Black Hat via YouTube
AAD Joined Machines - The New Lateral Movement
Black Hat via YouTube
Better Privacy Through Offense - How to Build a Privacy Red Team
Black Hat via YouTube
Whip the Whisperer - Simulating Side Channel Leakage
Black Hat via YouTube