What I do all Day - Identify and respond to Security Incidents - Collaborate with 3rd parties to respond to their incidents - Build tools to assist those above
Wikis for Great Justice - Wikis are great for dynamically structured data - Makes collaboration Easy - I’ve shared threat intel and incident templates (Linked at the End) - The Price is right…
Vendor Info - Vendor Blogs, Reports & podcasts Often have piles of data and indicators - Verizon’s Data Breach Investigations report is a yearly favorite - Look for resources from companies like Mandiant/FiReEye, Dell SecureWorks, AlienVault, and Crowdstrike Just watch out… they’re trying to sell you something…
Developing Your Own Intel - Think about What is important to determine who might attack and then decide how it could happen - Go “hunting” - Listen to your Users - Review & Iterate on your Own Incidents
Every Incident Response Starts a Vulnerability Assessment Every Vulnerability Assessment Starts An Incident Response For one iteration… most of the time…
Every Incident Response Starts a Vulnerability Assessment Every Vulnerability Assessment Starts An Incident Response For one iteration… most of the time…
- MIG is OpSec's platform for investigative surgery of remote endpoints. - Platform Agnostic - By Mozilla (The Firefox people) - MIDAS is a framework for developing a Mac Intrusion Detection Analysis System - By Etsy (yes, that Etsy) & Facebook (Yes, also that Facebook) Mig Word to the Wise: These are platforms, not products… MIDAS
Volitility The Volatility Framework is a completely open collection of tools, implemented in Python […], for the extraction of digital artifacts from volatile memory (RAM) samples.
Conclusion… -Intelligence Driven Incident Response is the new Normal -Open Source is making $$$ less important than Intel -Collaboration is Key -When its time to perform the time to prepare is past