You are on page 1of 9

Detecting and Defending against Cyber Threats

Attention Attendees:
Remember to type your messages to all panellists and attendees
Detect
Topics
• Detective Controls
• Logging & SIEM
• Threat Hunting
Detective Controls
• Intrusion Detection System (IDS)
• Intrusion Prevention System (IPS)
• Advanced Endpoint Threat Detection
(AETD)
• SOC & MSSP
• Digital Forensics
Logging & SIEM
• Critical component of detection
• Aggregate logs
• Protect logs
• Correlate logs
• Packet Captures (PCAPs)
Threat Hunting
• Assume compromised
• Hunt for indicators of compromise
(IOCs)
Demo
Questions?
References
• Microsoft (2017). AppLocker – Windows 10. Retrieved from
https://docs.microsoft.com/en-us/windows/security/threat-protectio
n/windows-defender-application-control/applocker/applocker-overvie
w
• Snitkin, S (2017). ICS Cybersecurity Requires Passive and Active
Defense. Retrieved from:
https://www.arcweb.com/blog/ics-cybersecurity-requires-passive-acti
ve-defense

You might also like