YoVDO

Profiling the Attacker - Using Offender Profiling in SOC Environments

Offered By: Security BSides London via YouTube

Tags

Security BSides Courses Network Security Courses

Course Description

Overview

Explore offender profiling techniques for enhancing Security Operations Center (SOC) environments in this 19-minute conference talk from Security BSides London. Delve into a technical framework for building a comprehensive knowledge base on malicious actors. Learn how to develop an information classification system for assets, plot attack significance, conduct attack factor comparison analysis, and discern attacker motives. Examine the attacker kill chain, create malicious actor profile checklists, and establish naming conventions for threat actors. Gain insights into preemptive security measures and understand the importance of profiling in modern cybersecurity practices through real-world examples and practical methodologies.

Syllabus

Introduction
Preemptive security
Outline
Who am I
What is offender profiling
Why is offender profiling important
Security is important
Examples of offender profiling
How offender profiling works
Alices example
Method Zero
Method One Frequency
Method Two Frequency
Method Three Frequency
Method Five Classification
Summary


Taught by

Security BSides London

Related Courses

An Introduction to Computer Networks
Stanford University via Independent
Computer Networks
University of Washington via Coursera
Computer Networking
Georgia Institute of Technology via Udacity
Cybersecurity and Its Ten Domains
University System of Georgia via Coursera
Model Building and Validation
AT&T via Udacity