Explore current cyber trends and FBI cybersecurity objectives in this 43-minute conference talk from Louisville InfoSec 2013. Gain insights into sophisticated intrusion methods, comparing theory with reality through intrusion statistics and steps of compromise. Follow a detailed scenario covering reconnaissance, targeted attacks, persistence establishment, and initial identification. Learn about FBI involvement in cybercrime investigations and understand the perspective of being a victim. Discover valuable information for cybersecurity professionals and those interested in the evolving landscape of digital threats and law enforcement responses.
Overview
Syllabus
Intro
FBI Cyber Objective
Sophistication
Current Intrusion Methods
Theory vs. Reality
Intrusion Statistics
Steps of Compromise
Scenario
Recon
Targeted Attack
Established Persistence
Initial Identification
FBI Involvement
You Are The Victim