Are You a Janitor or a Cleaner
Offered By: YouTube
Course Description
Overview
Explore the intricacies of incident response and cybersecurity strategy in this 43-minute conference talk from Circle City Con 2014. Delve into the incident response lifecycle, attack patterns, and common pitfalls in hiring practices. Examine how product-driven decisions and political influences can impact security. Learn about the importance of proper preparation, identification of threats, and containment strategies. Discover techniques for assessing attacker capabilities and implementing counterstrikes. Gain valuable insights on lessons learned and how to improve overall security posture in this comprehensive presentation on modern cybersecurity challenges.
Syllabus
Intro
Incident Response Lifecycle
Attack Lifecycle
The Enemy
We don't understand how to hire
We Let the Product Drive
We Let Politics Drive
Follow the Money
True Preparation
Identification
Often Overlooked
Containment
Flush out your attacker
Assess Attacker's Capability
Strike Back
Lessons Learned
Related Courses
Information Security Management in a NutshellSAP Learning Identifying, Monitoring, and Analyzing Risk and Incident Response and Recovery
(ISC)² via Coursera Enterprise Security Fundamentals
Microsoft via edX Planning a Security Incident Response
Microsoft via edX Introduction to Cybersecurity
Udacity