Overview
Syllabus
Intro
Who am I
Why this talk
Introduction
The Security Industry
How well are they working
Verizon Data Breach Report
Intrusion DetectionEfficacy
How do they get discovered
How do we compare
Other reports
Internal process
Climate change
What can we do
What is intrusion detection
Systems are not binary affairs
The false positive fallacy
The reality is more subtle
All events are welcome
Examples
IntelligenceDriven Detection
Registry Modifications
Blank User Agents
Event Pipeline
Blacklisting
Identity Translation
Correlation
Attack Plane
HostBased Correlation
Vanilla Correlation
Kill Chain
Attack Stages
Attack Planes
Context or Out of Context
Situational Awareness
Final Thoughts
Contact Info
Taught by
Black Hat