YoVDO

Targeted Intrusion Remediation - Lessons From The Front Lines

Offered By: Black Hat via YouTube

Tags

Black Hat Courses Cybersecurity Courses Incident Response Courses Advanced Persistent Threats Courses

Course Description

Overview

Explore a comprehensive Black Hat USA 2012 conference talk on targeted intrusion remediation strategies. Delve into the unique challenges posed by persistent threats and learn how to adapt your approach for effective defense. Discover a three-pronged model for tactical and strategic security planning, focusing on inhibiting attacker activities, enhancing visibility for compromise detection, and improving rapid response capabilities. Gain insights from Jim Aldridge, a Mandiant manager with extensive experience in incident remediation, as he shares lessons learned from handling numerous APT threat actor cases. Examine the targeted attack lifecycle, recommended remediation approaches, and strategic initiatives to strengthen your organization's security posture. Understand the importance of login monitoring, password changes, application whitelisting, and strategic hunting in combating sophisticated threats.

Syllabus

Introduction
Jim Aldridge
Threat Landscape
What is a Targeted Persistent Threat
Advanced Persistent Threat
Incident Response
Example
Target Attack Lifecycle
Recommended Approach
Day 1 Attack
Day 4 Takeaways
Recommended Remediation Approach
Remediation Phase
Remediation Activities
Strategic Initiatives
Caveats
Prioritizing Initiatives
Login Monitoring
Password Change
Application Whitelisting
Strategic
Hunting
Investigation Ready
Enhancements
Survey
Additional Questions


Taught by

Black Hat

Related Courses

Incident Response and Recovery
(ISC)² via Coursera
Fundamentos de Ciberseguridad: un enfoque práctico
Inter-American Development Bank via edX
FIREWALLS & THREAT MANAGEMENT
Foothill College via California Community Colleges System
Ciberseguridad: ataques y contramedidas
Universidad Rey Juan Carlos via Independent
Palo Alto Networks Cybersecurity Fundamentals: 1 Cybersecurity Contexts
LinkedIn Learning