Overview
Explore defense evasion modeling techniques in this 57-minute conference talk from BSidesLV 2013. Delve into new technologies, development processes, and tools for layered security. Evaluate the effectiveness of your defenses through threat modeling, transforms, and tuning of various security components including IPS, NGFW, and endpoint protection. Examine corporate infrastructure, exploit techniques, and threat protection strategies. Gain insights into NSS and macro approaches for enhancing overall security posture.
Syllabus
Introduction
New Technologies
Development Process
Tools
Layered Security
How effective are your defenses
Threat Modeling
Transforms
Tungsten
Tuning IPS
NGFW
IPS
Endpoint Protection
Corporate Infrastructure
Endpoint Protection Credit
Head Mask
Exploits
Bubble View
Threat Protection
Conclusions
NSS
Macro approaches
Taught by
BSidesLV