Description: We all know that our users do foolish things. Our normal response is to try to build stronger fences, to keep our zebra herd out of danger. Instead, what if we identify the riskiest zebras, radio-collar them, and track them to see where they go? This talk will use examples from real logs to show ideas for creatively using your log data, so your users can show you where the danger lies.
Bio:Senior malware researcher and linguist at Blue Coat Systems. Prefers to spend time looking at traffic logs and writing code, but telling people about malware is almost as much fun. (Which has led to talks at RSA, ShmooCon, HackCon, etc.) Stopped playing World of Warcraft years ago, because it’s more fun to hunt for real Bad Guys…
For More Information please visit : - http://www.derbycon.com
http://www.irongeek.com/i.php?page=videos/derbycon3/mainlist
Tags: securitytube , hacking , hackers , information security , convention , computer security , derbycon-2013 ,
Disclaimer: We are a infosec video aggregator and this video is linked from an external website. The original author may be different from the user re-posting/linking it here. Please do not assume the authors to be same without verifying.