ycliper

Популярное

Музыка Кино и Анимация Автомобили Животные Спорт Путешествия Игры Юмор

Интересные видео

2025 Сериалы Трейлеры Новости Как сделать Видеоуроки Diy своими руками

Топ запросов

смотреть а4 schoolboy runaway турецкий сериал смотреть мультфильмы эдисон
Скачать

Digital forensics and security: Automate audits, investigations and response with AWX and Ansible

Автор: SANS Digital Forensics and Incident Response

Загружено: 2025-12-11

Просмотров: 482

Описание: Enterprise digital forensics and security with open tools: Automate audits, computer forensics investigations and incident response with AWX and Ansible

Alessandro Fiorenzi, Cyber Security & Digital Forensics Expert - SF Security & Forensics
DFIR Europe Prague

In modern enterprises, managing digital forensics, incident response, and security audits across hundreds of endpoints and cloud systems is challenging. This session demonstrates how open-source automation tools — AWX and Ansible — can streamline forensic investigations, compliance audits, and incident response. Attendees will learn how agentless automation can collect evidence scientifically and at scale, ensuring consistency, traceability, and efficiency across heterogeneous environments without expensive commercial solutions. Case studies will demonstrate how to orchestrate large-scale operations, turning manual forensic tasks into centrally managed automated workflows for faster, reliable enterprise investigations.

Не удается загрузить Youtube-плеер. Проверьте блокировку Youtube в вашей сети.
Повторяем попытку...
Digital forensics and security: Automate audits, investigations and response with AWX and Ansible

Поделиться в:

Доступные форматы для скачивания:

Скачать видео

  • Информация по загрузке:

Скачать аудио

Похожие видео

When the threat group doesn’t leave: Incident response under fire

When the threat group doesn’t leave: Incident response under fire

Keynote | DFIR AI-ze Your Workflow

Keynote | DFIR AI-ze Your Workflow

WEBINAR | Threat Modelling under the Cyber Resilience Act | Part 2

WEBINAR | Threat Modelling under the Cyber Resilience Act | Part 2

Extracting the unseen: Real-world RAM acquisition and analysis from Android devices

Extracting the unseen: Real-world RAM acquisition and analysis from Android devices

PDF forensics and authenticity detection

PDF forensics and authenticity detection

Introduction to Digital Forensics: Decoding Digital Evidence

Introduction to Digital Forensics: Decoding Digital Evidence

MacOS telemetry vs EDR telemetry - Which is better?

MacOS telemetry vs EDR telemetry - Which is better?

Applying Modular Design to Maintain IR Playbooks at Scale

Applying Modular Design to Maintain IR Playbooks at Scale

The art of concealment: How cybercriminals are becoming and remaining anonymous

The art of concealment: How cybercriminals are becoming and remaining anonymous

When to Conduct Structured and Unstructured Threat Hunts

When to Conduct Structured and Unstructured Threat Hunts

Mobile device hardening: A forensic comparison of advanced protection programmes in IOS and Android

Mobile device hardening: A forensic comparison of advanced protection programmes in IOS and Android

Home automation and IoT as a source of evidence: Forensic analysis of Home Assistant

Home automation and IoT as a source of evidence: Forensic analysis of Home Assistant

Hunting payloads in Linux extended file attributes

Hunting payloads in Linux extended file attributes

How to Hide in Plain Sight: Next-Level Digital Privacy | Ivan Banov at BSidesCache 2025

How to Hide in Plain Sight: Next-Level Digital Privacy | Ivan Banov at BSidesCache 2025

Tool: The only ‘Kanvas’ you need when spreadsheets fail your IR case management

Tool: The only ‘Kanvas’ you need when spreadsheets fail your IR case management

Tool: Location log analysis of Google Maps IOS

Tool: Location log analysis of Google Maps IOS

Сисадмины больше не нужны? Gemini настраивает Linux сервер и устанавливает cтек N8N. ЭТО ЗАКОННО?

Сисадмины больше не нужны? Gemini настраивает Linux сервер и устанавливает cтек N8N. ЭТО ЗАКОННО?

How Encryption Works

How Encryption Works

Stay Ahead of Ransomware - Ransomware and Cyber Extortion on the Rise in the Cloud

Stay Ahead of Ransomware - Ransomware and Cyber Extortion on the Rise in the Cloud

MCP против API: что нужно знать каждому разработчику

MCP против API: что нужно знать каждому разработчику

© 2025 ycliper. Все права защищены.



  • Контакты
  • О нас
  • Политика конфиденциальности



Контакты для правообладателей: [email protected]