Effortless, Agentless Breach Detection in the Enterprise - Token All the Things!
Offered By: 44CON Information Security Conference via YouTube
Course Description
Overview
Discover innovative techniques for effortless, agentless breach detection in enterprise environments through the use of honeytokens. This 49-minute conference talk from the 44CON Information Security Conference, presented by Azhar Desai and Nicholas Rohrbeck, explores the evolution and implementation of Canarytokens. Learn about the various types of tokens, including web bugs, DNS tripwires, SQL row tokens, and document tokens, and how they can be deployed quickly and easily through a simple web interface. Gain insights into new methods for setting tripwires around your network without the need for agent installation, hardware deployment, or additional costs. Explore advanced techniques such as abusing native OS functionality, leveraging cloud infrastructure, and employing file format chicanery to enhance breach detection capabilities. Discover practical defensive hacks and strategies to improve your organization's security posture and detect potential breaches more effectively.
Syllabus
Effortless, Agentless Breach Detection in the Enterprise: Token all the Things!
Taught by
44CON Information Security Conference
Related Courses
Computer SecurityStanford University via Coursera Cryptography II
Stanford University via Coursera Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera Building an Information Risk Management Toolkit
University of Washington via Coursera Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network