ycliper

Популярное

Музыка Кино и Анимация Автомобили Животные Спорт Путешествия Игры Юмор

Интересные видео

2025 Сериалы Трейлеры Новости Как сделать Видеоуроки Diy своими руками

Топ запросов

смотреть а4 schoolboy runaway турецкий сериал смотреть мультфильмы эдисон
Скачать

Jupyter Notebooks and Pre-recorded Datasets for Threat Hunting - SANS THIR Summit 2019

Автор: SANS Digital Forensics and Incident Response

Загружено: 2020-02-27

Просмотров: 7297

Описание: How many times have you thought about a more efficient, intuitive, or creative way to analyze the security events your organization collects, but feel limited to the capabilities of a one language-dependent search bar with basic Boolean search capabilities? In addition, how much time do you usually spend preparing for the simulation of specific adversarial techniques? What if you could expedite the process to validate the detection of those techniques in a more efficient and affordable way? In this talk, we will introduce the concept of utilizing Jupyter Notebooks for a more dynamic, flexible, and language-agnostic way to analyze security events, and at the same time help your team document, standardize, and share detection playbooks.

We will go over the architecture, deployment, and capabilities of Jupyter Notebooks and present a few use cases covering multiple techniques to analyze data while performing research. In addition, we will show how to use pre-recorded datasets from a new open-source project named Mordor to expedite simulation of adversarial techniques and validation of data analytics. The final part of the presentation will cover a methodology used to collect and consume prerecorded security events in a controlled lab environment with specific security log auditing configurations that can also be used to identify gaps and provide recommendations for data
collection strategies in production environments.

Roberto Rodriguez @Cyb3rWard0g, Security Researcher
Jose Luis Rodriguez @Cyb3rPandaH, Security Researcher

Не удается загрузить Youtube-плеер. Проверьте блокировку Youtube в вашей сети.
Повторяем попытку...
Jupyter Notebooks and Pre-recorded Datasets for Threat Hunting  - SANS THIR Summit 2019

Поделиться в:

Доступные форматы для скачивания:

Скачать видео

  • Информация по загрузке:

Скачать аудио

Похожие видео

BZAR – Hunting Adversary Behaviors with Zeek and ATT&CK - SANS THIR Summit 2019

BZAR – Hunting Adversary Behaviors with Zeek and ATT&CK - SANS THIR Summit 2019

Jupyter Notebooks или скрипты Python? Когда какой использовать?

Jupyter Notebooks или скрипты Python? Когда какой использовать?

My “Aha!” Moment - Methods, Tips, & Lessons Learned in Threat Hunting - SANS THIR Summit 2019

My “Aha!” Moment - Methods, Tips, & Lessons Learned in Threat Hunting - SANS THIR Summit 2019

Finding and Decoding Malicious Powershell Scripts - SANS DFIR Summit 2018

Finding and Decoding Malicious Powershell Scripts - SANS DFIR Summit 2018

Threat Hunting Research Methodology: A Data Driven Approach by Roberto & Jose Luis Rodriguez

Threat Hunting Research Methodology: A Data Driven Approach by Roberto & Jose Luis Rodriguez

Threat Hunting Beacon Analysis

Threat Hunting Beacon Analysis

ShimCache and AmCache enterprise-wide hunting - SANS Threat Hunting Summit 2017

ShimCache and AmCache enterprise-wide hunting - SANS Threat Hunting Summit 2017

Enterprise Threat Hunting Using Jupyter Notebooks- Ross Burke - Hou.Sec.Con 2022

Enterprise Threat Hunting Using Jupyter Notebooks- Ross Burke - Hou.Sec.Con 2022

Become a Jupyter Notebooks Ninja – MSTICPy Fundamentals to Build Your Own Notebooks

Become a Jupyter Notebooks Ninja – MSTICPy Fundamentals to Build Your Own Notebooks

Taking Hunting to the Next Level: Hunting in Memory - SANS Threat Hunting Summit 2017

Taking Hunting to the Next Level: Hunting in Memory - SANS Threat Hunting Summit 2017

Distributed Evidence Collection and Analysis with Velociraptor - SANS DFIR Summit 2019

Distributed Evidence Collection and Analysis with Velociraptor - SANS DFIR Summit 2019

Threat Hunting in Microsoft 365 Environment

Threat Hunting in Microsoft 365 Environment

Threat Hunting via DNS | SANS@MIC Talk

Threat Hunting via DNS | SANS@MIC Talk

Atomic Friday: Project Mordor with Roberto Rodriguez | Red Canary

Atomic Friday: Project Mordor with Roberto Rodriguez | Red Canary

Putting MITRE ATT&CK™ into Action with What You Have, Where You Are presented by Katie Nickels

Putting MITRE ATT&CK™ into Action with What You Have, Where You Are presented by Katie Nickels

The Detection Series: Crypters and loaders

The Detection Series: Crypters and loaders

Intro to Shellcode Analysis: Tools and Techniques

Intro to Shellcode Analysis: Tools and Techniques

Stay ahead of the game: automate your threat hunting workflows

Stay ahead of the game: automate your threat hunting workflows

All About Jupyter Notebooks and Hunting in Microsoft Sentinel

All About Jupyter Notebooks and Hunting in Microsoft Sentinel

"Cyber Security Investigations with Jupyter Notebooks" - Ian Hellen (PyCascades 2022)

© 2025 ycliper. Все права защищены.



  • Контакты
  • О нас
  • Политика конфиденциальности



Контакты для правообладателей: [email protected]