Overview
Explore a soothing bedtime tale for threat hunters in this 46-minute Black Hat conference talk. Learn the first five essential hunts to find bad actors and help CISOs rest easy. Discover how to identify hunt targets, find tactics and techniques, map to an attack lifecycle model, and create a hunting plan. Delve into topics such as automation, data exfiltration, lateral movement, industrial control systems, data historians, and machine learning. Gain valuable insights to improve your organization's cybersecurity posture and sleep soundly knowing you're prepared to tackle potential threats.
Syllabus
Introduction
Introductions
A Song of Intel and Planning
Identify Your Hunt Targets
Find Your Tactics and Techniques
Map to an Attack Lifecycle Model
Match Tactics and Techniques
Hunting Plan
Automation
Data Exfiltration
Lateral Movement
Industrial Control System
Data Historian
Machine Learning
Conclusion
Taught by
Black Hat