Completed
Intro
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Intrusion Detection Along the Kill Chain - Why Your Detection System Sucks
Automatically move to the next video in the Classroom when playback concludes
- 1 Intro
- 2 Who am I
- 3 Why this talk
- 4 Introduction
- 5 The Security Industry
- 6 How well are they working
- 7 Verizon Data Breach Report
- 8 Intrusion DetectionEfficacy
- 9 How do they get discovered
- 10 How do we compare
- 11 Other reports
- 12 Internal process
- 13 Climate change
- 14 What can we do
- 15 What is intrusion detection
- 16 Systems are not binary affairs
- 17 The false positive fallacy
- 18 The reality is more subtle
- 19 All events are welcome
- 20 Examples
- 21 IntelligenceDriven Detection
- 22 Registry Modifications
- 23 Blank User Agents
- 24 Event Pipeline
- 25 Blacklisting
- 26 Identity Translation
- 27 Correlation
- 28 Attack Plane
- 29 HostBased Correlation
- 30 Vanilla Correlation
- 31 Kill Chain
- 32 Attack Stages
- 33 Attack Planes
- 34 Context or Out of Context
- 35 Situational Awareness
- 36 Final Thoughts
- 37 Contact Info