MITRE ATT&CK Framework Overview | MITRE ATT&CK Framework Vs Cyber Kill Chain

  Рет қаралды 11,077

GISPP ACADEMY

GISPP ACADEMY

Күн бұрын

Пікірлер: 29
@umershahbaz2318
@umershahbaz2318 3 жыл бұрын
Excellent delivery of content , this explains the presenter has strong grip in information security domain .
@umersayyam4947
@umersayyam4947 3 жыл бұрын
Very outstanding presentation, it covers approximately all the topics that are on top priority in the industry and needed to be understand.
@numanmaavia8575
@numanmaavia8575 2 жыл бұрын
very informative session. thanks GISPP and especially thanks to organizer sir Shahzad subhani for organizin such a valuable sessions.
@arsalananwar3397
@arsalananwar3397 2 жыл бұрын
good content and very informative session
@Chsultan5125
@Chsultan5125 3 жыл бұрын
A very informative and comprehensible presentation. A must watch even for non cyber security guys like me. The presenter was able to present in a manner that a novice like me could understand it as well. Hats off 👏👏👏
@GISPPACADEMY
@GISPPACADEMY 3 жыл бұрын
Glad you liked it!
@janjua2012
@janjua2012 3 жыл бұрын
Very informative session. It seems that presentor had a deep knowledge of the topic and conveyed it quite effectively and efficiently
@GISPPACADEMY
@GISPPACADEMY 3 жыл бұрын
Glad you liked it
@showkatmeer5474
@showkatmeer5474 Жыл бұрын
👍, Really nice session Sajjad Bhai , bring more sessions like this.
@bilalmazhar100
@bilalmazhar100 3 жыл бұрын
Great content and very informative session
@GISPPACADEMY
@GISPPACADEMY 3 жыл бұрын
Glad it was helpful!
@ganimohammed7863
@ganimohammed7863 2 жыл бұрын
Bhaiya masha Allah it will help us.... May Allah bless you with more knowledge
@abdulghafoor6085
@abdulghafoor6085 3 жыл бұрын
Very Nice
@1parag
@1parag 2 жыл бұрын
Good Job Sir...
@GISPPACADEMY
@GISPPACADEMY 3 жыл бұрын
Please check video description for slides link. Also if you like the video, gives us a 👍 and subscribe to the channel.
@dhaliguitar2568
@dhaliguitar2568 2 жыл бұрын
Great presentation sir!! And for the most part I felt that you sound very much like Amitabh Bachchan.. it's like learning Cyber-security from Big-B :)
@mhradeel6310
@mhradeel6310 3 жыл бұрын
Thankx for informative video
@GISPPACADEMY
@GISPPACADEMY 3 жыл бұрын
Thanks for liking
@muhammadatif2199
@muhammadatif2199 2 жыл бұрын
I am from usa i would like to learn SOC
@tallorder00
@tallorder00 3 жыл бұрын
Defense in depth is not dead per say if a user clicks spearphishing mail, or of your security controls are not patched or harden..it's problem of security management. Without defense I'd depth you cannot design any security system or control... One example people who had harden there window server for ransomware prevents encryption of sensitive extensions so the impact is reduced We don't do service level hardening or customisation which reduces impact
@GISPPACADEMY
@GISPPACADEMY 3 жыл бұрын
Very good feedback indeed 👍 👍 👍
@cookiemaster1049
@cookiemaster1049 2 жыл бұрын
Actually the point was related to layered security model that is also use in defense in depth. can you please tell me what was the reason ransomware attacks are so much successful these days what is defense in depth is doing to stop ransomware attack ? have you ever handled any spear phishing attacks ? two factor authentication bypass ? password sprays , Webshells , incase you are not much aware of such attacks then defense is depth is dead here, Also how zero days are catered by defence in depht ? any idea about Supply chain attacks why defence is depth cant help you against Log4j vulnerability ? why solar wind Orion update was compromised by a legitimate certificate and malware dll why defense and depth IDS IPS cannot able to detect that attack for months to C&C domains ? please shed some insights ?
@tallorder00
@tallorder00 2 жыл бұрын
@@cookiemaster1049 I guess to speak on security you cannot be blinded by attacker mindset only, real protection comes when you understand security management is not just about security jargons or attacks vectors you mentioned. Defense in depth is a principle it's not a rule or exe that you can run on any sys and it will give you defense in depth/breadth. It's a mindset which you cannot have or gained if you have attacker only mindset. Infact most people would not know what difference between defense in depth vs breadth. Secure architecture like zero trust model of real existence or proof of defense in depth also micro or nano segmentation are part of modern networks secure design. Do you have examples or case study where these attacks failed? Did of all N number of systems that were attacked ...were all breached. ? Those that were not compromised you have a root cause of data. Seeing a glass half full or half empty but you need to have certain cognitive and analytical intelligence to debate the topic without bias and incomplete data. All you assumed that all systems are green day, means ripped for attack and compromise ..you have no idea how secure systems are designed and engineered...it's just like saying of that bullet proof jacked failed one time out 1000...let's throw out protection features of jacket all together. Are all MFA insecure are they inherently insecure or were deployed as insecure? At time of heartbleed there were companies who had customized ssl libraries and we're safe from breach? You know why and what promoted to change these libs?
@asifnasimsatti4172
@asifnasimsatti4172 11 ай бұрын
I want to know presenter name?
@GISPPACADEMY
@GISPPACADEMY 11 ай бұрын
Check video description
@tallorder00
@tallorder00 3 жыл бұрын
On 21:28 you self contradict yourself you said no defense in depth No access control No antivirus etc So you are justifying need of defense in depth here?
@GISPPACADEMY
@GISPPACADEMY 3 жыл бұрын
Thanks for the feedback. Defense on depth is certainly necessary but if it is not configured well then it might provide a false sense of security. Thanks for your valuable comments.
@cookiemaster1049
@cookiemaster1049 2 жыл бұрын
its just an example for example using keygen to crack office 2016 ,this is quite norm in each organization and i found AV report such incidents and usually system admins are found doing such activities . crackers and Free vpns , torrents and even Crypto mining is practices by employees in companies.
@tallorder00
@tallorder00 2 жыл бұрын
@@cookiemaster1049 normal and secure are two different things...like I have worked in organizations where the CD/DVD plus USB slots were removed from all workstations. It's about level of risk you are willing to accept..and for that risk you have to pay the price. Keygen etc is norm but there are dozens of control to pervent such practice..supply chain can be secure through IT auditing software that keep check on licensing misuse and asset management. But if your admin are involved in same game then whom is to blame?
Workshop: MITRE ATT&CK Fundamentals
1:47:11
FIRST
Рет қаралды 26 М.
Breaking The Kill Chain: A Defensive Approach
13:18
The CISO Perspective
Рет қаралды 165 М.
Players vs Pitch 🤯
00:26
LE FOOT EN VIDÉO
Рет қаралды 129 МЛН
Симбу закрыли дома?! 🔒 #симба #симбочка #арти
00:41
Симбочка Пимпочка
Рет қаралды 3,1 МЛН
How Much Tape To Stop A Lamborghini?
00:15
MrBeast
Рет қаралды 201 МЛН
МЕНЯ УКУСИЛ ПАУК #shorts
00:23
Паша Осадчий
Рет қаралды 4,6 МЛН
Cyber Kill Chain guide - How to improve cybersecurity posture
22:28
How to Use MITRE ATT&CK Framework Detailed Approach  2022
30:21
Prabh Nair
Рет қаралды 83 М.
Threat Detection and Hunting for Common MITRE ATT&CK Techniques
1:43:54
LogRhythm SIEM
Рет қаралды 22 М.
The Anatomy of an Att&ck
7:46
IBM Technology
Рет қаралды 31 М.
Cyber Kumite - Ep. 7 - NIST CSF vs MITRE ATT&CK
21:41
Security Risk Advisors
Рет қаралды 855
Detect, Deny, and Disrupt with MITRE D3FEND
1:04:08
SANS Cyber Defense
Рет қаралды 9 М.
AWS Certified Cloud Practitioner Training 2020 - Full Course
3:58:01
freeCodeCamp.org
Рет қаралды 7 МЛН
Players vs Pitch 🤯
00:26
LE FOOT EN VIDÉO
Рет қаралды 129 МЛН