YoVDO

Targeted Intrusion Remediation - Lessons From The Front Lines

Offered By: Black Hat via YouTube

Tags

Black Hat Courses Cybersecurity Courses Incident Response Courses Advanced Persistent Threats Courses

Course Description

Overview

Explore a comprehensive Black Hat USA 2012 conference talk on targeted intrusion remediation strategies. Delve into the unique challenges posed by persistent threats and learn how to adapt your approach for effective defense. Discover a three-pronged model for tactical and strategic security planning, focusing on inhibiting attacker activities, enhancing visibility for compromise detection, and improving rapid response capabilities. Gain insights from Jim Aldridge, a Mandiant manager with extensive experience in incident remediation, as he shares lessons learned from handling numerous APT threat actor cases. Examine the targeted attack lifecycle, recommended remediation approaches, and strategic initiatives to strengthen your organization's security posture. Understand the importance of login monitoring, password changes, application whitelisting, and strategic hunting in combating sophisticated threats.

Syllabus

Introduction
Jim Aldridge
Threat Landscape
What is a Targeted Persistent Threat
Advanced Persistent Threat
Incident Response
Example
Target Attack Lifecycle
Recommended Approach
Day 1 Attack
Day 4 Takeaways
Recommended Remediation Approach
Remediation Phase
Remediation Activities
Strategic Initiatives
Caveats
Prioritizing Initiatives
Login Monitoring
Password Change
Application Whitelisting
Strategic
Hunting
Investigation Ready
Enhancements
Survey
Additional Questions


Taught by

Black Hat

Related Courses

Computer Security
Stanford University via Coursera
Cryptography II
Stanford University via Coursera
Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera
Building an Information Risk Management Toolkit
University of Washington via Coursera
Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network