YoVDO

Security Monitoring - Avoiding Oh Sh*t Moments

Offered By: Security BSides London via YouTube

Tags

Security BSides Courses Enumeration Courses Threat Modeling Courses Security Breaches Courses

Course Description

Overview

Discover effective strategies for security monitoring and learn how to prevent critical breaches in this insightful conference talk from Security BSides London. Explore the challenges of alert fatigue and the importance of identifying intrusions promptly. Gain valuable insights into threat modeling processes, including enumeration and modeling techniques. Understand the pitfalls of the "rockstar mentality" in cybersecurity and learn practical approaches to improve your organization's security posture. Delve into concepts like the "secret sock" and "budget sock" to enhance your understanding of resource allocation in security monitoring.

Syllabus

Introduction
Security breaches
Alert fatigue
Identify the intrusion
Rockstar mentality
The secret sock
The budget sock
Threat modeling
Threat modeling process
Modeling
Enumeration
Modelling


Taught by

Security BSides London

Related Courses

程序设计实习 / Practice on Programming
Peking University via Coursera
算法基础
Peking University via Coursera
算法基础 | Fundamental Algorithms
Peking University via edX
算法基础
Peking University via Coursera
Complete Cyber Security Course: Go From Zero To Hero
Udemy