Explore the ever-evolving landscape of cyber attackers and game-changing strategies in this 25-minute conference talk from BSidesLV 2015. Delve into the importance of understanding attacker evolution, learn about manual intervention techniques, and discover the process of deconstructing threats. Examine the application of Longest Common Subsequence (LCS) in cybersecurity, while acknowledging its limitations. Gain insights on confusing potential attackers and engage in a thought-provoking Q&A session to enhance your understanding of modern cybersecurity challenges and solutions.
Overview
Syllabus
Intro
What My Talk is About
Why Do We Care?
What Can We Do?
Manual Intervention
Deconstruction
Research
LCS application
Not the end-all solution
Confusing The Mice
Cool! Wait, What?
Questions?