Are You a Janitor or a Cleaner
Offered By: YouTube
Course Description
Overview
Explore the intricacies of incident response and cybersecurity strategy in this 43-minute conference talk from Circle City Con 2014. Delve into the incident response lifecycle, attack patterns, and common pitfalls in hiring practices. Examine how product-driven decisions and political influences can impact security. Learn about the importance of proper preparation, identification of threats, and containment strategies. Discover techniques for assessing attacker capabilities and implementing counterstrikes. Gain valuable insights on lessons learned and how to improve overall security posture in this comprehensive presentation on modern cybersecurity challenges.
Syllabus
Intro
Incident Response Lifecycle
Attack Lifecycle
The Enemy
We don't understand how to hire
We Let the Product Drive
We Let Politics Drive
Follow the Money
True Preparation
Identification
Often Overlooked
Containment
Flush out your attacker
Assess Attacker's Capability
Strike Back
Lessons Learned
Related Courses
Computer SecurityStanford University via Coursera Cryptography II
Stanford University via Coursera Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera Building an Information Risk Management Toolkit
University of Washington via Coursera Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network