YoVDO

Effortless, Agentless Breach Detection in the Enterprise - Token All the Things!

Offered By: 44CON Information Security Conference via YouTube

Tags

44CON Courses Cybersecurity Courses Operating Systems Courses Cloud Infrastructure Courses

Course Description

Overview

Discover innovative techniques for effortless, agentless breach detection in enterprise environments through the use of honeytokens. This 49-minute conference talk from the 44CON Information Security Conference, presented by Azhar Desai and Nicholas Rohrbeck, explores the evolution and implementation of Canarytokens. Learn about the various types of tokens, including web bugs, DNS tripwires, SQL row tokens, and document tokens, and how they can be deployed quickly and easily through a simple web interface. Gain insights into new methods for setting tripwires around your network without the need for agent installation, hardware deployment, or additional costs. Explore advanced techniques such as abusing native OS functionality, leveraging cloud infrastructure, and employing file format chicanery to enhance breach detection capabilities. Discover practical defensive hacks and strategies to improve your organization's security posture and detect potential breaches more effectively.

Syllabus

Effortless, Agentless Breach Detection in the Enterprise: Token all the Things!


Taught by

44CON Information Security Conference

Related Courses

Architecting Microsoft Azure Solutions
Microsoft via edX
Designing Highly Scalable Web Apps on Google Cloud Platform
Google via Coursera
Windows Server 2016: Azure for On-Premises Administrators
Microsoft via edX
Essential Google Cloud Infrastructure: Foundation
Google Cloud via Coursera
Unlock Your Digital Business with SAP HANA Enterprise Cloud
SAP Learning