Overview
Explore a comprehensive video presentation from Derbycon 2012 featuring Ian Amit's talk "SexyDefense: the red team tore you a new one, Now what." Delve into the aftermath of a red team assessment and learn how to effectively respond to security vulnerabilities. Discover methodologies for mapping information assets, exposures, and threats, as well as techniques for correlating logs and developing constant security improvements. Gain insights on aligning security efforts with business objectives, leveraging counter-intelligence, and utilizing adversary tools to enhance defenses. Examine innovative approaches such as using Kippo and Artillery, and understand how to navigate legal aspects of cybersecurity. Conclude with actionable steps to strengthen your organization's security posture in the face of sophisticated attacks.
Syllabus
Intro
Iftach lan Amit
Background
Reading bad reports
Vulnerability
Methodology
What does it mean? Attack
Remember!
Map (information & Security assets) Ist - What is the business doing anyway? • How does it makes!
Map (exposures & Issues)
Map (Threats)
Logs
Correlate
Constant development
Align outwards
Counter-intel
Use THEIR tools...
Law is hackable
Kippo
Artillery
Conclusions
Call for Action