SlideShare a Scribd company logo
@NTXISSA			#NTXISSACSC4
Artifacts	Are	for	Archaeologists:	
Why	Hunting	For	Malware	Isn’t	
Enough
Mark	Overholser
Consulting	Engineer
LightCyber,	Inc.
October	7,	2016
@NTXISSA			#NTXISSACSC4
Agenda
Today’s	Breach	Detection	Gap
Threats:	Malware,	Risky	Behavior,	Insiders	&	Advanced	Attacks
Top	Cyber	Weapons	
Signature	vs.	Behavior-based	Attack	Detection	
LightCyber	Magna	Behavioral	Attack	Detection
@NTXISSA			#NTXISSACSC4
99%
of	post-intrusion	behaviors	
such	as	reconnaissance	and	
lateral	movement	do	not	
originate	from	malware.
Breach	Detection	Gap
146	days
Is	the	median	length	that	
attackers	are	present	on	a	
victim’s	network	before	detection
SOURCE:	2016	LightCyber	Cyber	Weapons	Report,	M-Trends	2016	Threat	Report,	Verizon	Data	Breach	Investigations	Report
Most	Organizations	
Focus	on	Malware	and	
External	Attacks
Most	Organizations	
Cannot	Find	
Breaches	on	Their	
Own	
But	Cannot	Detect	
Attackers
in	Their	Network
@NTXISSA			#NTXISSACSC4
Crypting Services
• “Crypting”	can	be	used	to	obfuscate	malware	
until	AV	does	not	detect	it
• Upload	malware
• Malware	encrypted/re-encoded	and	scanned	
against	all	known	AV
• Process	repeats	until	all	AV	fails	to	detect	the	
malware
• Brian	Krebs	has	a	good	article	on	crypters
• (https://krebsonsecurity.com/2014/05/antivirus-
is-dead-long-live-antivirus/)
NTX	ISSA	Cyber	Security	Conference	– October	7-8,	2016 4
5 ©	2016	LightCyber		- Confidential	
Most	Organizations	Focus	Only	on	Malware
6
Threats	Analyzed	for	
Cyber	Weapons	
Research:	
Targeted	Attacks,	Insider	Attacks,	
Risky	Behavior,	and	Malware
@NTXISSA			#NTXISSACSC4
TargetedAttacks
Outside	the	Network
Intrusion
(Seconds	– Minutes)
Intrusion
Active	Breach	
(Hours	- Weeks)
Establish	
Backdoor
Recon	&	Lateral	
Movement
Data	Exfiltration
Inside	the	Network
 Attacker	compromises	a	
client	or	server	in	the
network
2 Attacker		performs	
reconnaissance	and	
moves	laterally	to
find	valuable	data
3 Attacker	steals	data	
by	uploading	or	
transferring	files
@NTXISSA			#NTXISSACSC4
Insider	Attacks
Recon	&	Lateral	
Movement
Abuse	of	User	
Rights
Data	
Exfiltration
 Employee	is	upset	by	demotion;
decides	to	steal	data	and	quit	job
2 Employee	accesses	many	file	
shares	including	rarely	
accessed	file	shares
3 Employee	uses	other	user’s	
credentials	and	exfiltrates a	
large	volume	of	data
IT	Assets	at	Risk
• Databases	and	file	servers	are	
considered	the	most	vulnerable	
to	insider	attacks	
SOURCE:	LinkedIn	Group	- Insider	Threat	Report	sponsored	by	LightCyber
File	Server
Insider
Sensitive	Data
@NTXISSA			#NTXISSACSC4
Risky	Behavior
2User	credentials	for		
service	account	shared		
by	multiple	admins
Remote	desktop	
access	from	home
3Access	to	high-risk	
websites
High	Risk	Website
Home	Desktop
Internet
Data	Breach	Incidents
SOURCE:	2016	Verizon:	Data	Breach	Investigations	Report
User
Remote	DesktopIT	Admin
IT	Admin
Miscellaneous	errors,	such	as	
misconfiguration,	misdelivery,	and	other	
errors,	accounted	for	the	highest	number	
of	data	breaches	in	2015
‘With	all	of	the	hubris	and	bravado	in	the	InfoSec	world,	
one	proclamation	we	usually	don’t	hear	is	“Our	
employees	NEVER	make	mistakes.”’
@NTXISSA			#NTXISSACSC4
Malware
Ransomware	Attack
Laptop
File	Servers
Malicious	
Website
2Infected	client	contacts	
command	and	control	server	
and	receives	a	unique	
cryptographic	key	
User	downloads	ransomware	
from	a	website	or opens	a	
malicious	email	attachment3Ransomware	encrypts	
data	on	the	local	client
4Ransomware	encrypts	
data	on	network	drives
Infected	Email
Command	&
Control
Internet
@NTXISSA			#NTXISSACSC4
Cyber	Weapons	
Research	Findings
Based	on	Anonymized	Alert	Data	
and	Network	to	Process	Association	
(N2PA)	Technology	From	LightCyber	
Customers
@NTXISSA			#NTXISSACSC4
Top	Attack	Behaviors
• Reconnaissance	
was	the	most	
common	attack	
behavior	
• Reconnaissance	
is	an	iterative	
process	of	trial	
and	error	as	
attackers	search	
for	valuable	
assets
@NTXISSA			#NTXISSACSC4
Cyber	Weapons	Used	in	Phases	of	an	
Attack
@NTXISSA			#NTXISSACSC4
Networking	and	Hacking	Tools
• Attackers	use	well-
known	tools	to	map	
the	network,	probe	
clients,	and	monitor	
activity
• NCrack,	Mimikatz,	
and	Windows	
Credential	Editor	can	
be	used	to	steal	user	
credentials
• Some	tools	are	native	
OS	utilities
@NTXISSA			#NTXISSACSC4
Admin	Tools
• Attackers	use	a	
variety	of	
command	line	
shells,	including	
native	OS	utilities
• Admin	tools	are	
used	for	lateral	
movement	as	well	
as	recon	and	
exfiltration
@NTXISSA			#NTXISSACSC4
Remote	Desktop	Tools
• Remote	
desktop	
tools	are:
• Used	for	C&C	
and	lateral	
movement
• Also	indicative	
of	risky	user	
behavior
@NTXISSA			#NTXISSACSC4
Malware
• 28%	of	suspicious	
processes	associated	
with	alerts	were	
either	malware	or	
riskware
• 1%	of	east-west	
threats	originated	
from	malware
@NTXISSA			#NTXISSACSC4
Major	Findings
70%+	of	malware	was	only	
detected	on	a	single	site,	
revealing	targeted	&	
polymorphic	variants
Attackers	often	use	
“benign”	apps,	native	OS	
tools	and	web	browsers	to	
conduct	attacks
Companies	that	only	look	
for	malware	will	miss	
attackers	that	are	already	
in	the	network
19
Signature	vs.	Behavior-
based	Attack	Detection
@NTXISSA			#NTXISSACSC4
Current	Limitations
Known	Bad
Traditional	Security
§ Signatures,	IoC’s,	Packet	Signatures,	
Domains,	Sandbox	Activity
§ Block,	or	Miss
§ Necessary,	Not	Sufficient
What’s	Needed
§ Learn	What	is	Good	[Baseline]
§ Detect	What	Isn’t	[Anomaly]
§ Catch	What	Slips	Through	the	
Cracks	of	Traditional	Security
Problems:
• Too	Many	False	Alarms	/	False	Positives
• Missed	Variants	/	False	Negatives
• Only	Detect	Malware-Based	Attacks
Learned	Good
Benefits:
• Eliminates	Zero-Day	Exploit	Dilemma
• Hundreds	of	Opportunities	to	Detect
• Applicable	to	All	Techniques	&	Stages
What’s	Needed?
Agents	&
Signatures
Agentless	&
Signature-less
@NTXISSA			#NTXISSACSC4
Behavioral	Attack	Detection:	
Optimal	Data	Context
LightCyber	Magna	Platform	
Using	Behavioral	Analytics	to	Find	
Attacks	&	Malware	on	Your	Network
@NTXISSA			#NTXISSACSC4
Behavioral	Attack	Detection
Magna	Platform	Overview
• Network-Centric	Detection	
• Agentless	&	Signature-less
• Post-Intrusion:	NTA/UEBA
Differentiation
• Most	Accurate	&	Efficient:	
Proven &	Measured	Success
• Broadest	Context:	Network	+	
Endpoint	+	User
• Broadest	Attack	Coverage	with	
Integrated	Remediation
Verticals	Served
• Finance	&	Insurance	
• Public	Sector
• Retail,	Healthcare,	Legal
• Service	Providers
• Media,	Technology,	&	More
Operations	Overview
• US	HQ	- CA	
• EMEA	HQ	- Amsterdam
• IL	HQ	- Ramat	Gan
• Customers	World-Wide
MAGNA
About	LightCyber
@NTXISSA			#NTXISSACSC4
Profiling,	Detection,	Investigation,	&	
Remediation
Behavioral	Profiling
- Network-Centric	Endpoint	and	User	Profiling
Attack	Detection
- Anomalous	Attack	Behavior	Across	the	Attack	Lifecycle
Automated	Investigation
- Network, User,	&	Process	Association	+	Cloud
Integrated	Remediation
- Block Attackers	with	NGFW,	NAC,	or	Lock	Accounts	with	AD
@NTXISSA			#NTXISSACSC4
SIEM
Evolving	IT	Security	Investment	Needs
Lockheed	Martin: Cyber	Kill	Chain
Active	Attack	
Phase
(Weeks	– Months)
Intrusion	
Attempt	Phase
(Seconds	– Minutes)
Sandboxing
Stateful	FW
IPS	/	IDS
Network	AV
Damage
Security	
Expenditure
Incident	
Response
(Weeks	– Months)
Breach	
Detection	Gap
@NTXISSA			#NTXISSACSC4
LightCyber	Magna	Platform
Network	Traffic
Endpoints
HQ	/	DC
MAGNADETECTOR
TAP	/	SPAN
Core	
Switch
MAGNA UI
MAGNAPATHFINDER
Remote	Office
MAGNAPROBE
TAP	/	SPAN
Switch
MAGNAMASTER
Email	&	Reports SIEMRemediation
@NTXISSA			#NTXISSACSC4
LightCyber	Magna	Security	Use	Cases
LightCyber	Magna	provides	accurate	and	
efficient	security	visibility	into	attacks	and	
attackers	in	your	network.
Security	Visibility	Encompasses:Malware Risky	
Behaviors
Insider	
Attacks
Targeted	
Attacks
LOWER
RELATIVE	RISK
HIGHER
@NTXISSA			#NTXISSACSC4
LightCyber	Delivers	Unbeatably	Accurate	
Results
Source:	http://lightcyber.com/lower-security-alerts-metrics/
Most	IT	security	teams	can’t	keep	up	
with	the	deluge	of	security	alerts
62%
ACROSS
ALL ALERTS
99%
ACROSS MAGNA’S
AUTOMATED “CONFIRMED
ATTACK” CATEGORY
LIGHTCYBER ACCURACY
@NTXISSA			#NTXISSACSC4
Malware	Example
Magna	Detects:
• Active	Command	&	Control	
channel
• Malware	Infection
• No	signs	of	internal	spreading
• Likely	opportunistic,	not	(yet)	
targeted Detection	Pattern:
• C&C
• Malware
• (No	East-West)
@NTXISSA			#NTXISSACSC4
Risky	Behavior	Example
Magna	Detects:
• RDP	to	>	20	Workstations
• Likely	non-malicious	
Internal	activity	since	
there	is	no	association	
with	other	malicious	
findings
Detection	Pattern:
• Credential	Abuse
• Not	Linked	to	Exfil or	Other
@NTXISSA			#NTXISSACSC4
Insider	Attack	Example
Detection	Pattern:
• Credential	Abuse
• Linked	to	Exfil or	Other	Findings
Magna	Detects:
• Suspicious	access	to	file	shares
• Exfiltration
• This	Correlation	indicates	likely	
Insider	Attack
@NTXISSA			#NTXISSACSC4
Targeted	Attack	Example
Magna	Detects:
• Anomalous	file	with	known	
Threat	Intelligence
• Recon
• Lateral	Movement
• Exfiltration	
• This	Correlation	Indicates	
Targeted	Attack Detection	Pattern:
• Multiple	Correlated	Findings
• North-South	+	East-West
@NTXISSA			#NTXISSACSC4
User,	Entity;	Network	+	Endpoint
Magna	Detects:
• Anomalous	Network	Activity
• Anomalous	and	Malicious	
Processes	on	the	Endpoint
• Anomalous	User	Activity
Magna	
Correlates:
• User
• Entity
• Network
• Process
• Endpoint
@NTXISSA			#NTXISSACSC4
Reporting:	Alert	Activity,	Triage	Activity	
&	SLA,	Asset	View,	and	More
LightCyber Magna Attack Detection Report
Reporting Period: 1/0/1900 1/0/1900
Number of days 1
Total Alerts for Period 0
Average #Alerts per day 0.00
Total Alerts handled 5
Unverified average handling time (days) 2.54
Suspicious average handling time (days) 10.78
Confirmed average handling time (days) 12.47
0
0.5
1
1.5
2
2.5
3
3.5
Alerts Triage and Handling
Suspicious
Unverified
1
1.5
2
2.5
3
3.5
Alert Types and Categories
C&C
20%
Exfilt
10%
Lateral
10%
Malware
20%
Recon
40%
Alerts Categories
45%
11%
33%
11%
Alerts Handling & Accuracy
Relevant and Handled
Whitelisted
Ignored
Still Open
0.0
2.0
4.0
6.0
8.0
10.0
12.0
14.0
16.0
18.0
Normal Resolved Whitelisted Normal Archived
Confirmed Suspicious Unverified
Alert Handling Time (days)
arnold
jenny
40%
60%
Alert Handling by Analyst
arnold
jenny
@NTXISSA			#NTXISSACSC4
LightCyber	Ecosystem	Integration
Endpoints
HQ	/	DC
MAGNAPATHFINDER
MAGNADETECTOR MAGNAMASTER
Core	
Switch
MAGNA UIRemediation SIEM
Network	
Packet	Broker
IAM	&	Policy	
Mgmt
@NTXISSA			#NTXISSACSC4
Magna	in	the	Security	
Ecosystem:	Integrated	Remediation
Terminate	
Malicious	Files	(MFT)
Block	Malicious	
Domains	with	NGFW	
Isolate	Infected	
Machines	With	NGFW	
Isolate	Infected	
Machines	with	NAC	
Lock	Compromised	
Active	Directory	
Reset	Compromised	
AD	Passwords	
Knock	The	Attacker	Back	Out	Of	Your	Network
Magna	Enables	You	To
AD AD
X
@NTXISSA			#NTXISSACSC4NTX	ISSA	Cyber	Security	Conference	– October	7-8,	2016 37
@NTXISSA			#NTXISSACSC4@NTXISSA			#NTXISSACSC4
The Collin College Engineering Department
Collin College Student	Chapter	of	the	North	Texas	ISSA
North	Texas	ISSA	(Information	Systems	Security	Association)
NTX	ISSA	Cyber	Security	Conference	– October	7-8,	2016 38
Thank	you

More Related Content

PDF
NTXISSACSC4 - A Brief History of Cryptographic Failures
PDF
NTXISSACSC4 - Detecting and Catching the Bad Guys Using Deception
PDF
NTXISSACSC4 - Ransomware: History Analysis & Mitigation
PDF
NTXISSACSC4 - The Art of Evading Anti-Virus
PDF
NTXISSACSC4 - Introducing the Vulnerability Management Maturity Model - VM3
PDF
NTXISSACSC4 - Array Networks - A Layered Approach to Web and Application Secu...
PDF
NTXISSACSC4 - Layered Security / Defense in Depth
PDF
NTXISSACSC4 - Business Geekdom: 1 = 3 = 5
NTXISSACSC4 - A Brief History of Cryptographic Failures
NTXISSACSC4 - Detecting and Catching the Bad Guys Using Deception
NTXISSACSC4 - Ransomware: History Analysis & Mitigation
NTXISSACSC4 - The Art of Evading Anti-Virus
NTXISSACSC4 - Introducing the Vulnerability Management Maturity Model - VM3
NTXISSACSC4 - Array Networks - A Layered Approach to Web and Application Secu...
NTXISSACSC4 - Layered Security / Defense in Depth
NTXISSACSC4 - Business Geekdom: 1 = 3 = 5

What's hot (20)

PPTX
Cybersecurity is the Future of Computing
PDF
Dreaming of IoCs Adding Time Context to Threat Intelligence
PPTX
Ntxissacsc5 purple 5-insider threat-_andy_thompson
PPTX
CrowdStrike Webinar: Taking Dwell-Time Out of Incident Response
PDF
Predicting exploitability-forecasts-for-vulnerability-management
PDF
JS Fest 2019. Анастасия Войтова. "Defense in depth": trench warfare principle...
PDF
CrowdCast Monthly: Operationalizing Intelligence
PDF
MITRE ATT&CKcon 2.0: The World's Most Dangerous ATT&CKers; Robert Lipovsky, ESET
PDF
Cloud-Enabled: The Future of Endpoint Security
PPTX
Threat Hunting with Splunk
PDF
Does a Bear Leak in the Woods?
PPTX
Wie Sie Ransomware aufspüren und was Sie dagegen machen können
PDF
CrowdCasts Monthly: Going Beyond the Indicator
PDF
NTXISSACSC4 - How Not to Build a Trojan Horse
PDF
In search of unique behaviour
PPTX
Open Source Malware Lab
PPTX
Abstract Tools for Effective Threat Hunting
PDF
Endpoint (big) Data In The Age of Compromise, Ian Rainsburgh
PDF
Exploring DarkWeb For Threat Intelligence (SACON May 2018)
PDF
Threat Hunting with Splunk Hands-on
Cybersecurity is the Future of Computing
Dreaming of IoCs Adding Time Context to Threat Intelligence
Ntxissacsc5 purple 5-insider threat-_andy_thompson
CrowdStrike Webinar: Taking Dwell-Time Out of Incident Response
Predicting exploitability-forecasts-for-vulnerability-management
JS Fest 2019. Анастасия Войтова. "Defense in depth": trench warfare principle...
CrowdCast Monthly: Operationalizing Intelligence
MITRE ATT&CKcon 2.0: The World's Most Dangerous ATT&CKers; Robert Lipovsky, ESET
Cloud-Enabled: The Future of Endpoint Security
Threat Hunting with Splunk
Does a Bear Leak in the Woods?
Wie Sie Ransomware aufspüren und was Sie dagegen machen können
CrowdCasts Monthly: Going Beyond the Indicator
NTXISSACSC4 - How Not to Build a Trojan Horse
In search of unique behaviour
Open Source Malware Lab
Abstract Tools for Effective Threat Hunting
Endpoint (big) Data In The Age of Compromise, Ian Rainsburgh
Exploring DarkWeb For Threat Intelligence (SACON May 2018)
Threat Hunting with Splunk Hands-on
Ad

Viewers also liked (17)

PDF
NTXISSACSC4 - Between The Keyboard And The Chair - Cybersecurity's Secret Weapon
PDF
NTXISSACSC4 - World of Discovery
PDF
NTXISSACSC4 - Identity as a Threat Plane Leveraging UEBA and IdA
PDF
NTXISSACSC4 - Security for a New World
PDF
NTXISSACSC4 - Cyber Insurance – Did You Know?
PDF
NTXISSACSC4 - Intellectual Property Protection― Cross Roads between Ethics, I...
PDF
NTXISSACSC4 - A Day in the Life of a CISO
PDF
NTXISSACSC4 - Mitigating Security Risks in Vendor Agreements
PDF
NTXISSACSC4 - Day in the Life of a Security Solutions Architect
PDF
NTXISSACSC4 - Red, Amber, Green Status: The Human Dashboard
PDF
NTXISSACSC4 - Hacking Performance Management, the Blue Green Game
PDF
Gummer BruCON0x07
PDF
MindMap - Forensics Windows Registry Cheat Sheet
PPTX
F secure Radar vulnerability scanning and management
PPT
Cyber Security
PDF
Cyber security threats for 2017
PDF
Cyber Security 2017 Challenges
NTXISSACSC4 - Between The Keyboard And The Chair - Cybersecurity's Secret Weapon
NTXISSACSC4 - World of Discovery
NTXISSACSC4 - Identity as a Threat Plane Leveraging UEBA and IdA
NTXISSACSC4 - Security for a New World
NTXISSACSC4 - Cyber Insurance – Did You Know?
NTXISSACSC4 - Intellectual Property Protection― Cross Roads between Ethics, I...
NTXISSACSC4 - A Day in the Life of a CISO
NTXISSACSC4 - Mitigating Security Risks in Vendor Agreements
NTXISSACSC4 - Day in the Life of a Security Solutions Architect
NTXISSACSC4 - Red, Amber, Green Status: The Human Dashboard
NTXISSACSC4 - Hacking Performance Management, the Blue Green Game
Gummer BruCON0x07
MindMap - Forensics Windows Registry Cheat Sheet
F secure Radar vulnerability scanning and management
Cyber Security
Cyber security threats for 2017
Cyber Security 2017 Challenges
Ad

Similar to NTXISSACSC4 - Artifacts Are for Archaeologists: Why Hunting Malware Isn't Enough (20)

PDF
Applied cognitive security complementing the security analyst
PDF
Top 13 hacking software for beginners.pdf
PPTX
Security O365 Using AI-based Advanced Threat Protection
PDF
The Modern Malware Review March 2013
PDF
The modern-malware-review-march-2013
PDF
2016 ISACA NACACS - Audit As An Impact Player For Cybersecurity
PDF
Check point 2015-securityreport
PPTX
Insider Threat Solution from GTRI
PPTX
EverSec + Cyphort: Big Trends in Cybersecurity
PPTX
What is Network Security and Why is it Needed?
PPTX
MMW April 2016 Ransomware Resurgence
PPTX
SECURITY IN COMPUTING.pptx
PPTX
Ник Белогорский - Будни Кремниевой Долины. История карьеры Ника, борьба с хак...
PPTX
SIEM Fundamentals-Session 1 presentations
PPTX
Open Source Insight: Artifex Ruling, NY Cybersecurity Regs, PATCH Act, & Wan...
PDF
War on stealth cyber attacks phishing docusign apache metron
PDF
Websense 2013 Threat Report
PDF
2013 Threat Report
PDF
How to Use Artificial Intelligence to Minimize your Cybersecurity Attack Surface
PPT
Ibm risk management-30min
Applied cognitive security complementing the security analyst
Top 13 hacking software for beginners.pdf
Security O365 Using AI-based Advanced Threat Protection
The Modern Malware Review March 2013
The modern-malware-review-march-2013
2016 ISACA NACACS - Audit As An Impact Player For Cybersecurity
Check point 2015-securityreport
Insider Threat Solution from GTRI
EverSec + Cyphort: Big Trends in Cybersecurity
What is Network Security and Why is it Needed?
MMW April 2016 Ransomware Resurgence
SECURITY IN COMPUTING.pptx
Ник Белогорский - Будни Кремниевой Долины. История карьеры Ника, борьба с хак...
SIEM Fundamentals-Session 1 presentations
Open Source Insight: Artifex Ruling, NY Cybersecurity Regs, PATCH Act, & Wan...
War on stealth cyber attacks phishing docusign apache metron
Websense 2013 Threat Report
2013 Threat Report
How to Use Artificial Intelligence to Minimize your Cybersecurity Attack Surface
Ibm risk management-30min

More from North Texas Chapter of the ISSA (20)

PPTX
Purple seven-ntxissacsc5 walcutt
PPTX
Ntxissacsc5 yellow 7 protecting the cloud with cep
PDF
Ntxissacsc5 gold 4 beyond detection and prevension remediation
PPTX
Ntxissacsc5 gold 1 mimecast e mail resiliency
PPTX
Ntxissacsc5 yellow 6-abusing protocols for dynamic addressing in space-jacenr...
PPTX
Ntxissacsc5 yellow 2-evidence driven infosec compliance strategy-garrettp1
PPTX
Ntxissacsc5 yellow 1-beginnerslinux bill-petersen
PDF
Ntxissacsc5 red 6-diy-pentest-lab dustin-dykes
PDF
Ntxissacsc5 red 1 & 2 basic hacking tools ncc group
PPTX
Ntxissacsc5 purple 4-threat detection using machine learning-markszewczul
PPTX
Ntxissacsc5 purple 3-cyber insurance essentials-shawn_tuma.pptx
PPTX
Ntxissacsc5 purple 1-eu-gdpr_patrick_florer
PPTX
Ntxissacsc5 gold 1--mimecast email resiliency- erez-haimowicz
PPTX
Ntxissacsc5 blue 7-zerotrust more effective approach to security-ed higgins
PPTX
Ntxissacsc5 blue 6-securityawareness-laurianna_callaghan
PPTX
Ntxissacsc5 blue 5-holistic approach to cybersecurity-abu_sadeq
PDF
Ntxissacsc5 blue 3-shifting from incident to continuous response bill white
PPTX
Ntxissacsc5 blue 4-the-attack_life_cycle_erich_mueller
PPTX
Ntxissacsc5 blue 2-herding cats and security tools-harold_toomey
PPTX
Ntxissacsc5 blue 1-nine cybersecurity habits-george_finney
Purple seven-ntxissacsc5 walcutt
Ntxissacsc5 yellow 7 protecting the cloud with cep
Ntxissacsc5 gold 4 beyond detection and prevension remediation
Ntxissacsc5 gold 1 mimecast e mail resiliency
Ntxissacsc5 yellow 6-abusing protocols for dynamic addressing in space-jacenr...
Ntxissacsc5 yellow 2-evidence driven infosec compliance strategy-garrettp1
Ntxissacsc5 yellow 1-beginnerslinux bill-petersen
Ntxissacsc5 red 6-diy-pentest-lab dustin-dykes
Ntxissacsc5 red 1 & 2 basic hacking tools ncc group
Ntxissacsc5 purple 4-threat detection using machine learning-markszewczul
Ntxissacsc5 purple 3-cyber insurance essentials-shawn_tuma.pptx
Ntxissacsc5 purple 1-eu-gdpr_patrick_florer
Ntxissacsc5 gold 1--mimecast email resiliency- erez-haimowicz
Ntxissacsc5 blue 7-zerotrust more effective approach to security-ed higgins
Ntxissacsc5 blue 6-securityawareness-laurianna_callaghan
Ntxissacsc5 blue 5-holistic approach to cybersecurity-abu_sadeq
Ntxissacsc5 blue 3-shifting from incident to continuous response bill white
Ntxissacsc5 blue 4-the-attack_life_cycle_erich_mueller
Ntxissacsc5 blue 2-herding cats and security tools-harold_toomey
Ntxissacsc5 blue 1-nine cybersecurity habits-george_finney

Recently uploaded (20)

PPTX
durere- in cancer tu ttresjjnklj gfrrjnrs mhugyfrd
PPTX
PptxGenJS_Demo_Chart_20250317130215833.pptx
PPTX
introduction about ICD -10 & ICD-11 ppt.pptx
PPTX
Introduction to Information and Communication Technology
PPTX
Introuction about ICD -10 and ICD-11 PPT.pptx
PPTX
Introuction about WHO-FIC in ICD-10.pptx
PDF
Slides PDF The World Game (s) Eco Economic Epochs.pdf
PPTX
Module 1 - Cyber Law and Ethics 101.pptx
PPTX
Job_Card_System_Styled_lorem_ipsum_.pptx
PDF
“Google Algorithm Updates in 2025 Guide”
PPTX
cyber security Workshop awareness ppt.pptx
PPTX
CSharp_Syntax_Basics.pptxxxxxxxxxxxxxxxxxxxxxxxxxxxx
PPT
tcp ip networks nd ip layering assotred slides
PDF
Best Practices for Testing and Debugging Shopify Third-Party API Integrations...
PDF
Decoding a Decade: 10 Years of Applied CTI Discipline
PPTX
Slides PPTX World Game (s) Eco Economic Epochs.pptx
PDF
LABUAN4D EXCLUSIVE SERVER STAR GAMING ASIA NO.1
PDF
Automated vs Manual WooCommerce to Shopify Migration_ Pros & Cons.pdf
PDF
Behind the Smile Unmasking Ken Childs and the Quiet Trail of Deceit Left in H...
PPTX
Funds Management Learning Material for Beg
durere- in cancer tu ttresjjnklj gfrrjnrs mhugyfrd
PptxGenJS_Demo_Chart_20250317130215833.pptx
introduction about ICD -10 & ICD-11 ppt.pptx
Introduction to Information and Communication Technology
Introuction about ICD -10 and ICD-11 PPT.pptx
Introuction about WHO-FIC in ICD-10.pptx
Slides PDF The World Game (s) Eco Economic Epochs.pdf
Module 1 - Cyber Law and Ethics 101.pptx
Job_Card_System_Styled_lorem_ipsum_.pptx
“Google Algorithm Updates in 2025 Guide”
cyber security Workshop awareness ppt.pptx
CSharp_Syntax_Basics.pptxxxxxxxxxxxxxxxxxxxxxxxxxxxx
tcp ip networks nd ip layering assotred slides
Best Practices for Testing and Debugging Shopify Third-Party API Integrations...
Decoding a Decade: 10 Years of Applied CTI Discipline
Slides PPTX World Game (s) Eco Economic Epochs.pptx
LABUAN4D EXCLUSIVE SERVER STAR GAMING ASIA NO.1
Automated vs Manual WooCommerce to Shopify Migration_ Pros & Cons.pdf
Behind the Smile Unmasking Ken Childs and the Quiet Trail of Deceit Left in H...
Funds Management Learning Material for Beg

NTXISSACSC4 - Artifacts Are for Archaeologists: Why Hunting Malware Isn't Enough