Intrusion Detection Along the Kill Chain - Why Your Detection System Sucks

Intrusion Detection Along the Kill Chain - Why Your Detection System Sucks

Black Hat via YouTube Direct link

How do we compare

10 of 37

10 of 37

How do we compare

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Intrusion Detection Along the Kill Chain - Why Your Detection System Sucks

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 Who am I
  3. 3 Why this talk
  4. 4 Introduction
  5. 5 The Security Industry
  6. 6 How well are they working
  7. 7 Verizon Data Breach Report
  8. 8 Intrusion DetectionEfficacy
  9. 9 How do they get discovered
  10. 10 How do we compare
  11. 11 Other reports
  12. 12 Internal process
  13. 13 Climate change
  14. 14 What can we do
  15. 15 What is intrusion detection
  16. 16 Systems are not binary affairs
  17. 17 The false positive fallacy
  18. 18 The reality is more subtle
  19. 19 All events are welcome
  20. 20 Examples
  21. 21 IntelligenceDriven Detection
  22. 22 Registry Modifications
  23. 23 Blank User Agents
  24. 24 Event Pipeline
  25. 25 Blacklisting
  26. 26 Identity Translation
  27. 27 Correlation
  28. 28 Attack Plane
  29. 29 HostBased Correlation
  30. 30 Vanilla Correlation
  31. 31 Kill Chain
  32. 32 Attack Stages
  33. 33 Attack Planes
  34. 34 Context or Out of Context
  35. 35 Situational Awareness
  36. 36 Final Thoughts
  37. 37 Contact Info

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.