Player FMアプリでオフラインにしPlayer FMう!
聞く価値のあるポッドキャスト
スポンサード


Episode 3 - NIST SP 800-61 Computer Security Incident Handling Guide (Detection)
Manage episode 422217120 series 3578563
In this 45 minute episode Clint covers a lot of ground based on the Detection phase of NIST 800-61.
Attack vectors for digital security incidents, including insider threats and weaponized USBs.
Cybersecurity incident response and detection, including NIST guidelines and Sysmon logging augmentation
The importance of following temporal linearity in Forensic Investigations, expanding analysis to 5-10 minutes prior to and after events, particularly in Internet History and Memory Dumps
Building a baseline of activity through network pcaps and log analysis
Why synchronised clocks are important?
How detailed notes help in your investigations
19 つのエピソード
Manage episode 422217120 series 3578563
In this 45 minute episode Clint covers a lot of ground based on the Detection phase of NIST 800-61.
Attack vectors for digital security incidents, including insider threats and weaponized USBs.
Cybersecurity incident response and detection, including NIST guidelines and Sysmon logging augmentation
The importance of following temporal linearity in Forensic Investigations, expanding analysis to 5-10 minutes prior to and after events, particularly in Internet History and Memory Dumps
Building a baseline of activity through network pcaps and log analysis
Why synchronised clocks are important?
How detailed notes help in your investigations
19 つのエピソード
Tutti gli episodi
×
1 Audiobook - Mastering Sysmon. Deploying, Configuring, and Tuning in 10 easy steps 43:16

1 Episode 16 - Mastering the Basics: Key Strategies for Cyber Investigations 30:43

1 Episode 15 -Windows event log analysis with Hayabusa. The Sigma-based log analysis tool 23:20

1 Episode 14 - AI and the future of log analysis, bug detection, forensics and AI ethical considerations with Jonathan Thompson 1:08:33

1 Episode 13-ELK EDR and Sandboxing, Home grown CTF environments, DFIR Automation & Forensics in the cloud, with Jacob Wilson 54:55

1 Episode 12 - You're forced to decide: Cyber Generalist or Cyber Specialist? 17:47

1 Episode 11 - Velociraptor, Containerisation and Infrastructure Deployed as Code with Myles Agnew 52:46

1 Episode 10 - Detecting and Preventing Phishing Attacks 19:04

1 Episode 9 -Unmasking APT40 (Leviathan): Tactics, Challenges, and Defense Strategies 21:48

1 Episode 8 - Hidden digital forensic logging for Cybersecurity on Any Budget: Practical Strategies for Enhanced Detection and Prevention Using Sysmon, Blocking Data Exfil with group policy and… 19:57

1 Episode 7 - Defending Against Scattered Spider: Understanding Their Tactics, Techniques, and Procedures 17:07

1 Episode 6 - Responding to ransomware - is your VPN a target? Plus ransomware risk mitigation with Phil Ngo 26:11

1 Episode 5 - NIST SP 800-61 Computer Security Incident Handling Guide (Post-Incident Activity) 33:06

1 Episode 4 - NIST SP 800-61 Computer Security Incident Handling Guide (Containment,Eradication and Recovery) 22:10
プレーヤーFMへようこそ!
Player FMは今からすぐに楽しめるために高品質のポッドキャストをウェブでスキャンしています。 これは最高のポッドキャストアプリで、Android、iPhone、そしてWebで動作します。 全ての端末で購読を同期するためにサインアップしてください。