Fighting Advanced Persistent Threats with Advanced Persistent Security
Offered By: YouTube
Course Description
Overview
Explore advanced strategies for combating persistent cyber threats in this conference talk from SecureWV/Hack3rcon 2017. Delve into the world of sophisticated attacks, examining real-world examples like the IRS breach, Ashley Madison hack, and Anthem data theft. Learn to leverage security hype to your advantage, understand the Detection Deficit Disorder, and implement the IRI Rules. Discover common vulnerabilities, risk management techniques, and the importance of multifactor authentication. Gain insights on assuming failure, improving detection and protection mechanisms, and allocating security budgets effectively. Master the art of fighting Advanced Persistent Threats with Advanced Persistent Security strategies.
Syllabus
Intro
Iras first experience speaking in the Bible Belt
Why this presentation came about
Why the hype matters
Did your security program really suck
Sophisticated attacks
Use hype to your advantage
Hacking Team
Was this sophisticated
IRS breach
What do they need
Ashley Madison
SQL Injection
ISIS Hacks
Anthem Hack
Watering Hole Attack
The Detection Deficit Disorder
The IRS Attack
The IRI Rules
Common Vulnerabilities
Advanced Persistent Threats
Risk Management
Impolite Failure
Potential Loss
Security Budget
Multifactor Authentication
Assume Failure
Detection
Protection
Detecting
Security
Related Courses
Building Geospatial Apps on Postgres, PostGIS, & Citus at Large ScaleMicrosoft via YouTube Unlocking the Power of ML for Your JavaScript Applications with TensorFlow.js
TensorFlow via YouTube Managing the Reactive World with RxJava - Jake Wharton
ChariotSolutions via YouTube What's New in Grails 2.0
ChariotSolutions via YouTube Performance Analysis of Apache Spark and Presto in Cloud Environments
Databricks via YouTube