Overview
Explore a keynote address from AppSecEU 2014 in Cambridge focusing on combating advanced cyber threats through shared intelligence. Delve into the evolving landscape of cyber adversaries, their sophisticated techniques, and the underground market forces driving their activities. Learn about methods for identifying, anonymizing, and sharing threat intelligence, with practical applications in areas such as DDoS prevention and malware detection. Gain insights into how collaborative threat intelligence can accelerate response times and prevent security breaches. Examine the challenges facing the cybersecurity industry, including talent shortages and the increasing complexity of attacks. Discover key principles for effective threat intelligence sharing and the importance of automated, community-driven approaches. Conclude with a Q&A session covering topics like application layer monitoring and the future of cybersecurity collaboration.
Syllabus
Introduction
When did the problem begin
Verification
Breaking Systems
Buffer Overflow
Security is a core requirement
Where does that leave us
Not getting more successful
The attacker has to be right
In 2014 we will show up barely half staffed
Security roles are vacant
What it takes to become a doctor
Top 10 computer science programs
Large attacks
Under pressure
Working together
Discovery
Challenges
Key Principles
Automated Community
Brute Force Login
Community Participation
Conclusion
Questions
Application Layer Monitoring
Outro
Taught by
OWASP Foundation