Advanced Incident Remediation Techniques

Advanced Incident Remediation Techniques

44CON Information Security Conference via YouTube Direct link

Intro

1 of 39

1 of 39

Intro

Class Central Classrooms beta

YouTube playlists curated by Class Central.

Classroom Contents

Advanced Incident Remediation Techniques

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 Bad hosts
  3. 3 The UFP
  4. 4 Problem with the UFP
  5. 5 The circle despair
  6. 6 Why is wiping the box
  7. 7 What is happening
  8. 8 Who is the attacker
  9. 9 Active attacker
  10. 10 What we typically get
  11. 11 Typical timeline
  12. 12 EM Trends
  13. 13 What can you do
  14. 14 Missed opportunities
  15. 15 Look after your Intel
  16. 16 Protect your information
  17. 17 Telegraph your activities
  18. 18 ENOS
  19. 19 Day slots
  20. 20 Deploying agents
  21. 21 Pentest vs Redteam
  22. 22 They know how to
  23. 23 How we can detect them
  24. 24 OPSEC fails
  25. 25 Sector synchronized isolation
  26. 26 Scenario
  27. 27 How long does it take
  28. 28 Theyre the after bad guy
  29. 29 Weve got some great people
  30. 30 WhackaMole
  31. 31 Mass simultaneous system remediation
  32. 32 Full visibility
  33. 33 Balls of steel
  34. 34 Rebuild
  35. 35 Sector synchronized
  36. 36 Hostile asset recovery
  37. 37 Play a game
  38. 38 Burn Intel
  39. 39 DEFCON Group

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.