The End Game: Exploiting Attacker Weak Spots with TTP-based Detection

...

Download Indicators of compromise (IOCs) are a losing battle for security teams as they are easily changed by the attackers. Adopting a detection strategy based on Tactics, Techniques, and Procedures (TTPs) returns power to the defender.

What you will learn:

- Why IOC-based detection is no longer effective and the benefits of a TTP-based
- How Attackers easily change IOC artifacts but lack the time and effort to modify their core tools and techniques
- How a large commercial bank switched to a TTP-based approach and immediately stopped a major APT

Categories
APPLICATIONS
0 Comment

Leave a Reply

Captcha image


RELATED BY

  • 5300c769af79e

    Live Demo: Office 365 Provisioning Deep Dive

    Since the release of Office 365 five years ago, many of the “easy” Office 365 migrations have been completed.Customers migrating to Office 365 now have much more complex requirements, such as having to work around unique user access and governance challenges that may involve their employees, customers, partners and providers.
  • 5300c769af79e

    Live for the Week of October 30, 2016

    We'll be talking with the InformationWeek." Join us for the show and for the incredible Friday Afternoon Conversation that runs beside the program.
  • 5300c769af79e

    BlackBerry Lets Go of Its Classic Phone

    The company reportedly is working on three new Android phones, codenamed "Neon," "Argon" and "Mercury," and expects to release one every quarter.However, it's "a good phone," he maintained, and he currently uses it himself.
  • 5300c769af79e

    Productivity & Collaboration Apps News, Analysis, & Advice

    Jessica DavisBy Senior Editor, Enterprise Apps, 4/21/2016ReadPost a Comment Skype users on Apple's Mac machines and the Web can now interact with bots from Microsoft.Kelly SheridanBy Associate Editor, InformationWeek, 4/19/2016ReadPost a Comment This is a great rundown of email apps.