Title | : | Enabling Defenders to Conduct Incident Response Investigations with Open-Source Tools |
Duration | : | 32:19 |
Viewed | : | 0 |
Published | : | 21-11-2022 |
Source | : | Youtube |
Today's current threat climate has organizations stretched thin in their budgets for security tools. While this is understandable, many defenders are left with a limited capability to adequately protect their organization. Combine this with the difficulty of implementing proprietary software that does get approved, defenders struggle to conduct in-depth investigations in their organization's environment. To improve this, this presentation will examine four stages of a cyber-attack/incident and discuss use cases for open-source tools that defenders can immediately implement to conduct initial Incident Response investigations. I will conclude by discussing how defenders can scale these investigations to a large environment. After this presentation, viewers will be able to immediately deploy incident response tactics in their organization without the need for proprietary software or licenses. ABOUT THE SPEAKER Logan is an Incident Responder for GreyCastle Security. Logan conducts digital forensics on endpoints, network traffic analysis, malware analysis, and threat hunting for a variety of organizations including higher education, manufacturing, and financial institutions. He holds a Bachelor of Applied Science in Cybersecurity from the SANS Technology Institute, along with several GIAC certifications including GCFA, GCFE, and GCIA. View upcoming Summits: http://www.sans.org/u/DuS Download the presentation slides (SANS account required) at https://www.sans.org/u/1iaE #BlueTeamSummit #BlueTeam #CyberDefense
![]() |
Faster, Better, AND Cheaper: Improving security... 00:45 - 10,103 |
![]() |
Introduction to Kansa - PowerShell-based Incide... 22:10 - 14,530 |
![]() |
Responding to Advanced Adversaries 39:40 - 808 |
![]() |
Application Monitoring Using Open Source: Contr... 01:41 - 154 |
![]() |
A Deep Dive into AWS IAM Privilege Escalation A... 59:29 - 531 |
![]() |
Live Incident Response with Velociraptor 09:18 - 8,831 |
![]() |
Once Upon a Login: How Logon Sessions Help Defe... 39:43 - 446 |
![]() |
Open-Source Intelligence (OSINT) + Digital Fore... 57:36 - 2,216 |