Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Automated Human Vulnerability Scanning With AVA

Black Hat via YouTube

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the groundbreaking approach to human vulnerability scanning presented in this Black Hat conference talk. Delve into the challenges of addressing human security risks and discover AVA, the first automated human vulnerability scanner. Learn how AVA maps people's connectivity, tests them with various security threats, and measures their behavior to make human security risk measurable. Understand the importance of actively protecting people within organizations, the limitations of current approaches, and the potential for transforming human security risk management. Gain insights into the phases of AVA, including the Principle of Least Privilege, information gathering, phishing attacks, and predictive behavior analysis. Examine case studies, discuss the public interest aspects of security tools, and consider the complexities of data scale and privacy. Reflect on the need for innovative solutions in the face of evolving security challenges and the potential impact of this new approach on organizational security strategies.

Syllabus

Introduction
Breaking conventions
You might feel uncomfortable
What are we discussing
I like people
Weve conquered it
Theyre relatively lazy
Technology
Vulnerability
Defense
Compliance
Shame victims
We are connected species
We do bits and pieces
We dont test
Why we dont test
Border devices arent enough
What is AVA
What does AVA mean
Phases
Principle of Least Privilege
Pulling Information
Phishing Attacks
Honeypot SMS
Powerplay
Call to Action
Giving the option of succeeding
Behavior over time
Training is big business
Graphs
Predictive Behavior Analysis
Boring Technologies
Demo
Case Study
Public Interest Security Tool
Threat Intelligence Application Security
Spam
Privacy
Complexity
Scale of Data
Why Compromise
Why We Need Unicorns
Nest
Google
Learn more
Questions

Taught by

Black Hat

Reviews

Start your review of Automated Human Vulnerability Scanning With AVA

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.