Blue Team Keeping Tempo with Offense

Presented at DerbyCon 7.0 Legacy (2017), Sept. 23, 2017, noon (50 minutes)

"Red: Forgot about slinging binaries, and set aside Powershell. What does it take to level attacks against an enterprises that take a positive approach to endpoint telemetry and security: application whitelisting, exploit mitigation, virtualization-based security? Blue: Forget about static indicators, and assume that even the most clever patterns of attack depend on awareness of a specific technique (albeit not a specific implementation). What does it take to build a defensive strategy that assumes as little as possible, favoring suppression of the good over alerting to the bad?" We have ground truth on tracing adversaries and their tactics. @subTee @kwm

Presenters:

Links:

Similar Presentations: