The Myth of Automated Hunting in ICS/SCADA Networks - SANS Threat Hunting Summit 2017

  Рет қаралды 4,102

SANS Digital Forensics and Incident Response

SANS Digital Forensics and Incident Response

Күн бұрын

Threat hunting is a human focused process. Automation is an important part to being able to hunt effectively and consistently over time but threat hunting cannot be fully automated.
The important part about threat hunting is pitting the best human defenders against the human threats we face. In this presentation the case will be made that threat hunting cannot be fully automated. This will be done through a discussion on where the approach should exist in an organization’s security maturity model and will be reinforced with examples of hunting inside of ICS/SCADA networks such as those that operate the power
grid, oil facilities, and petrochemical environments.
Robert M. Lee (@RobertMLee), CEO, Dragos Inc.

Пікірлер: 2
@LtChachee
@LtChachee 6 жыл бұрын
Links from the talk - taosecurity.blogspot.com/2017/03/the-origin-of-threat-hunting.html www.threathunting.net/ www.sans.org/reading-room/whitepapers/analyst/who-what-where-when-effective-threat-hunting-36785 ics.sans.org/media/E-ISAC_SANS_Ukraine_DUC_5.pdf
@arzoo_singh
@arzoo_singh 2 жыл бұрын
Please understand any Automated System could be fooled let me explain ? So you build an algorithm that when certain logs are generated block those connections or IP ( bad example ) So what's happening behind the scenes may calls being made on kernel level what if you exploited some calls ? We all know about Log4J and it's used in many security tools . So what's the idea build a system but have manual intervention every now and then .
Threat Hunting with Network Flow - SANS Threat Hunting Summit 2017
18:30
SANS Digital Forensics and Incident Response
Рет қаралды 19 М.
Cyber Security of Industrial Control Systems
1:24:35
Stanford
Рет қаралды 38 М.
НЫСАНА КОНЦЕРТ 2024
2:26:34
Нысана театры
Рет қаралды 1,3 МЛН
Alex hid in the closet #shorts
00:14
Mihdens
Рет қаралды 16 МЛН
WHAT’S THAT?
00:27
Natan por Aí
Рет қаралды 14 МЛН
Викторина от МАМЫ 🆘 | WICSUR #shorts
00:58
Бискас
Рет қаралды 4,2 МЛН
S4x24 Main Stage Interview With Rob Lee
33:31
S4 Events
Рет қаралды 1,6 М.
Honey, I Hacked The SCADA! : Industrial CONTROLLED Systems!
16:11
RSA Conference
Рет қаралды 12 М.
Threat Hunting in Security Operation - SANS Threat Hunting Summit 2017
27:39
SANS Digital Forensics and Incident Response
Рет қаралды 41 М.
SCADA Systems for electric power industry
4:44
Dr Yudhishthir pandey
Рет қаралды 162 М.
Industrial Control Systems : Pentesting PLCs 101 (Part 1/2)
57:43
ShimCache and AmCache enterprise-wide hunting - SANS Threat Hunting Summit 2017
27:53
SANS Digital Forensics and Incident Response
Рет қаралды 9 М.
Shell's Approach To ICS Security
30:09
S4 Events
Рет қаралды 7 М.
Taking Hunting to the Next Level: Hunting in Memory - SANS Threat Hunting Summit 2017
31:24
SANS Digital Forensics and Incident Response
Рет қаралды 7 М.
Real-Time Threat Hunting - SANS Threat Hunting & Incident Response Summit 2017
28:10
SANS Digital Forensics and Incident Response
Рет қаралды 37 М.
iPhone 15 Pro в реальной жизни
24:07
HUDAKOV
Рет қаралды 479 М.
Kumanda İle Bilgisayarı Yönetmek #shorts
0:29
Osman Kabadayı
Рет қаралды 2,3 МЛН
#samsung #retrophone #nostalgia #x100
0:14
mobijunk
Рет қаралды 13 МЛН
Как удвоить напряжение? #электроника #умножитель
1:00
Hi Dev! – Электроника
Рет қаралды 1,1 МЛН
iPhone 15 Pro Max vs IPhone Xs Max  troll face speed test
0:33