Description: Since Lockheed Martin published its paper on the network intrusion kill chain, the concept has become widely accepted. It is pretty common to see even vendors discuss the idea in their documentation and sales pitches. Even though the idea has been widely accepted, defenders have only focused on two of the proposed courses of action -- detect and deny. Few organizations are working to disrupt, degrade, or deceive attempted network intrusions. This presentation will focus on defensive techniques that involve interrupting, deceiving, or flat out frustrating an attacker.
Stephen Hosom is a security enthusiast with a large amount of Blue Team experience in doing a lot of things wrong--and sometimes getting it right.
For More Information Please visit:- http://www.securitybsides.com/w/page/81789821/BSidesCMH2015
http://www.irongeek.com/i.php?page=videos/bsidescolumbus2015/mainlist
Tags:
Disclaimer: We are a infosec video aggregator and this video is linked from an external website. The original author may be different from the user re-posting/linking it here. Please do not assume the authors to be same without verifying.