Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Profiling the Attacker - Using Offender Profiling in SOC Environments

Security BSides London via YouTube

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore offender profiling techniques for enhancing Security Operations Center (SOC) environments in this 19-minute conference talk from Security BSides London. Delve into a technical framework for building a comprehensive knowledge base on malicious actors. Learn how to develop an information classification system for assets, plot attack significance, conduct attack factor comparison analysis, and discern attacker motives. Examine the attacker kill chain, create malicious actor profile checklists, and establish naming conventions for threat actors. Gain insights into preemptive security measures and understand the importance of profiling in modern cybersecurity practices through real-world examples and practical methodologies.

Syllabus

Introduction
Preemptive security
Outline
Who am I
What is offender profiling
Why is offender profiling important
Security is important
Examples of offender profiling
How offender profiling works
Alices example
Method Zero
Method One Frequency
Method Two Frequency
Method Three Frequency
Method Five Classification
Summary

Taught by

Security BSides London

Reviews

Start your review of Profiling the Attacker - Using Offender Profiling in SOC Environments

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.