Тёмный

Using Open Tools to Convert Threat Intelligence into Practical Defenses: Threat Hunting Summit 2016 

SANS Digital Forensics and Incident Response
Подписаться 71 тыс.
Просмотров 22 тыс.
50% 1

Threat actors are not magic and there is not an unlimited, unique list of threats for every organization. Enterprises face similar threats from similar threat sources and threat actors - so why does every organization need to perform completely unique risk assessments and prioritized control decisions? This presentation will show how specific, community-driven threat models can be used to prioritize an organization’s defenses - without all the confusion. In this
presentation James Tarala will present a new, open, community-driven threat model that can be used by any industry to evaluate the risk that faces them. Then he will show how to practically
use this model to prioritize enterprise defense and map to existing compliance requirements facing organizations today. Whether you are in the Department of Defense or work for a small mom-and-pop retailer, you will be able to use this model to specifically determine a prioritized defense for your organization.
James Tarala, Principal Consultant, Enclave Security; Senior Instructor, SANS Institute
James Tarala is a principal consultant with Enclave Security and is based out of Venice, Florida. He is a regular speaker and senior instructor with the SANS Institute as well as a courseware author and editor for many SANS auditing and security courses. As a consultant, he has spent the past few years architecting large enterprise IT security and infrastructure architectures, specifically working with many Microsoft-based directory services, e-mail, terminal services, and wireless technologies. He has also spent a large amount of time consulting with organizations to assist them in their security management, operational practices, and regulatory compliance issues, and he often performs independent security audits and assists internal audit groups in developing their internal audit programs. James completed his undergraduate studies at Philadelphia Biblical University and his graduate work at the University of Maryland. He holds numerous professional certifications.
ATTEND THE 2017 THREAT HUNTING SUMMIT: dfir.to/ThreatHunting2017
SANS THREAT HUNTING AND INCIDENT RESPONSE COURSES
FOR508: Digital Forensics, Incident Response, & Threat Hunting: sans.org/FOR508
FOR572: Network Forensics: sans.org/FOR572
FOR578: Cyber Threat Intelligence: sans.org/FOR578

Наука

Опубликовано:

 

11 авг 2016

Поделиться:

Ссылка:

Скачать:

Готовим ссылку...

Добавить в:

Мой плейлист
Посмотреть позже
Комментарии : 8   
@i.m.i.7310
@i.m.i.7310 2 года назад
Objectivity Objections of course. Piss.off the programmers. Kudos. 👌 Sir. Great presentation.
@noirth-security
@noirth-security 3 года назад
Hmm, AlienVault OTX?
@caspianemerson9717
@caspianemerson9717 2 года назад
instablaster...
@abhirupmaz
@abhirupmaz 2 года назад
The website that redirected me here is trash :(
@debjyotighosh4159
@debjyotighosh4159 2 года назад
same bro, i feel your pain
@generalkalashnikov1002
@generalkalashnikov1002 2 года назад
same :(
@oryinegan8674
@oryinegan8674 4 года назад
Learn my new ethic course on how to bill it
@i.m.i.7310
@i.m.i.7310 2 года назад
DON. Helped create the. 1st. (CODE.BREAKERS)
Далее
skibidi toilet zombie universe 34 ( New Virus)
03:35
Просмотров 2,6 млн
Cyber Risk Management: Essentials for the Practical CISO
1:01:10
SANS Webcast: Effective (Threat) Hunting Techniques
54:01
Так ли Хорош Founders Edition RTX 4080 ?
13:00