Threat Activity Attribution - Differentiating the Who from the How

Threat Activity Attribution - Differentiating the Who from the How

via YouTube Direct link

Make Defense Manageable

27 of 28

27 of 28

Make Defense Manageable

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Threat Activity Attribution - Differentiating the Who from the How

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Introduction
  2. 2 Traditional Attribution
  3. 3 Benefits
  4. 4 Drawbacks
  5. 5 Infosec Failures
  6. 6 Media Examples
  7. 7 What Attribution Should Do
  8. 8 Results of Attribution
  9. 9 Goals of Attribution
  10. 10 Operations vs. Identity
  11. 11 Attribution Limitation
  12. 12 Introducing the Diamond Model
  13. 13 Infrastructure - Atomic
  14. 14 Infrastructure - Behavioral
  15. 15 Capabilities - Behavioral
  16. 16 ALLANITE aka PALMETTO FUSION
  17. 17 Distinctions
  18. 18 ALLANITE Phishing
  19. 19 Targeting Differences
  20. 20 Diamond Model Evaluation
  21. 21 Implications
  22. 22 COVELLITE Publicity
  23. 23 COVELLITE Document
  24. 24 COVELLITE and LAZARUS
  25. 25 The Problem with LAZARUS
  26. 26 The Defender Problem
  27. 27 Make Defense Manageable
  28. 28 Process

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.