Explore the intricacies of incident response and cybersecurity strategy in this 43-minute conference talk from Circle City Con 2014. Delve into the incident response lifecycle, attack patterns, and common pitfalls in hiring practices. Examine how product-driven decisions and political influences can impact security. Learn about the importance of proper preparation, identification of threats, and containment strategies. Discover techniques for assessing attacker capabilities and implementing counterstrikes. Gain valuable insights on lessons learned and how to improve overall security posture in this comprehensive presentation on modern cybersecurity challenges.
Overview
Syllabus
Intro
Incident Response Lifecycle
Attack Lifecycle
The Enemy
We don't understand how to hire
We Let the Product Drive
We Let Politics Drive
Follow the Money
True Preparation
Identification
Often Overlooked
Containment
Flush out your attacker
Assess Attacker's Capability
Strike Back
Lessons Learned