SlideShare a Scribd company logo
1 of 31
Download to read offline
Incident Response on a
Shoestring Budget
Detecting	Attackers	on	Your	Network	Using	Open	Source	Tools
Who, what, when?
• At	BHIS	we	still	rarely	see	effective	logging	and	monitoring	for	
detecting	attacker	activity	
• Effective	ingress/egress	network	traffic	logs	to	determine	what	went	
where	and	when
• Consolidated	endpoint	logging	for	determining	what	ran	on	what	
system	and	when
• Free	and	open	source	can	provide	this	the	necessary	visibility
Bio
• Security	Analyst	at	Black	Hills	Information	Security
• Previous	Blue	Team,	now	mostly	Red	Team
• CitySec Meetup Organizer	– TidewaterSec (Hampton,	VA)
• Avid	OWA	enthusiast
Standard Disclaimer
• Enterprise	deployments	of	monitoring	and	logging	solutions	have	to	be	
sized	appropriately	for	the	amount	of	traffic,	logs,	and	analysis
• This	is	true	for	commercial	and	open	source	tools
• The	open	source	and	free	tools	discussed	in	this	presentation	will	scale	
to	the	enterprise
• It	still	takes	planning	and	resources	beyond	what	
can	be	covered	in	an	hour
• One	size	does	not	fit	all
• Your	mileage	may	vary
Detection vs. Prevention
• Prevention	is	ideal	but	detection	is	a	must
• Preventive	measures	can	be	bypassed
• Preventive	solutions	potentially	cost	a	substantial	amount	of	money
• Many	detective	solutions	can	be	done	for	“free”
• Detective	solutions	are	essential	in identifying	the	“full	picture”	on	an	
incident
Value of Time
• Open	source	and	free	software	is	not	cost	free	if	you	value	your	time
• Trade	offs	for	figuring	out	vs.	ability	to	call	the	vendor
• If	you	go	with	completely	free	and	
open	source	solutions,	you	may	be	on	
your	own	to	figure	it	out	and	make	it	
work
• But	your	security	Kung	Fu	will	get	
better	because	of	this
Core Monitoring Components
• Network	Monitoring
• Host	Based	Monitoring	(monitoring	edge	devices)
• Forensics	at	Scale	(one	analyst	to	many	systems)
• Centralized	Logging
• Log	Correlation	and	alerting	(SIEM)
Threat Intelligence?
Cyber	Kill	Chain®
(lockheedmartin.com/cyber) 1)	Reconnaissance
2)	Weaponization
3)	Delivery
4)	Exploitation
5)	Installation
6)	Command	and	Control
7)	Actions	on	Objectives
Where are you now?
Network Monitoring
• Bro	vs.	Snort	- Apples	and	oranges
• Bro	is	network	protocol	decoding	at	scale
• Forensic	ground	truth	of	what	happens	on	the	network
• Snort	matches	packets	to	signatures	to	detect	potentially	bad	traffic
• They	have	different	use	cases	– use	the	right	tool	for	the	job
Host Based Monitoring
• With	cloud	and	mobile,	increasingly	more	important	to	gain	edge	
device	visibility
• Sysmon is	an	easy	win	to	deploy	to	Windows	Endpoints
• Process	creation	with	full	command	line
• Hash	of	process	(SHA1)
• Network	Connections	
• File	creation	time	changes
Sysmon
Process	Create:
UtcTime:	2017-06-09	00:57:42.516
ProcessGuid:	{3f6cf078-f286-5939-0000-001096ec2a00}
ProcessId:	3232
Image:	C:WindowsSystem32WindowsPowerShellv1.0powershell.exe
CommandLine:	powershell /HeLlo
CurrentDirectory:	C:UsersBruce	L.	Roy
User:	WIN-OK4HSK4QBPHBruce	L.	Roy
LogonGuid:	 {3f6cf078-30ec-5938-0000-002031df1000}
LogonId:	0x10df31
TerminalSessionId:	 1
IntegrityLevel:	Medium
Hashes:	SHA1=04C5D2B4DA9A0F3FA8A45702D4256CEE42D8C48D
ParentProcessGuid:	{3f6cf078-f27b-5939-0000-001026e22a00}
ParentProcessId:	3364
ParentImage:	C:WindowsSystem32cmd.exe
ParentCommandLine:	"C:Windowssystem32cmd.exe"
Log Consolidation
• Centralize	log	collection	from	all	edge	devices	and	boundary	devices
• Syslog	client	on	Linux	systems
• NXLog supports	syslog	shipping	of	
Windows	Event	Logs
• Microsoft	Windows	Event	Collector
• Boundary	device	syslog	(Firewall,	
proxies,	etc.)
SIEM For Free
• Any	DIY	SIEM	solution	could	be	time	and	labor	intensive
• Elastic	Logstash Kibana (ELK)	/	Elastic	Stack
• Graylog
• If	you	have	budget	and	have	to	choose	where	to	spend,	this	may	be	
the	best	place
• If	you	are	not	centralizing	logs	now	start	simple
• Consolidate	device	and	endpoint	logs	into	syslog	with	nxlog
Forensics at Scale
• Ability	for	IR	and	forensics	staff	to	quickly	and	remotely	acquire	
necessary	evidence	to	analyze	an	attack
• Can	be	difficult	and	time	consuming	to	image	RAM	and	disk	evidence	
for	every	investigation	
• F-Response	(not	free)
• Possible	with	PowerShell
• Google	GRR
• Incident	Response	Framework
Tool Configuration
End Point Monitoring
nxlog
• Endpoint	agent	to	ship	logs	to	a	syslog	collector
• Support	for	Windows	Event	log	shipping	to	remote	collector	– we’re	
going	to	be	sending	JSON
• Text	based	conf file
• Application	log	selecting	EVT	IDs	1102,	4103,	4104
• Security	log	selecting	EVT	IDs 1102,	4624,	4625
• System	log	selecting	EVT	IDs	1102,	7009,	7045
• All	of	Sysmon log	(filtering	done	in	Sysmon config)
https://gist.github.com/deruke/20e77eaa14ad193fd6ab85a76c64cb21
Additional EVT Logs
• Windows	Logging	Cheat	Sheet	at	www.malwarearchaeology.com
• NSA	Spot	the	Adversary	List
PowerShell Logging
• Module	Logging
• Records	pipeline	execution	details
• Script	Block	Logging
• Records	blocks	of	code	as	they	are	executed
• Also	records	de-obfuscated	code	execution
• PowerShell	5.0	automatically	logs	script	blocks	considered	as	“suspicious”
• Transcription
• Unique	record	of	every	PowerShell	session
• All	input	and	output
PowerShell Logging
• Administrative	Templates>Windows	Components>Windows	
PowerShell
GPO Caveats
• If	running	Windows	7	Obtain	Administrative	Templates	for	Windows	
10
• Copy	both	the	requisite	files	into	%systemroot%Policy	Definitions
• PowerShellExecutionPolicy.admx
• PowerShellExecutionPolicy.adml
• Copy	to		sysvolPoliciesPolicy	Definititions if	performing	this	as	
domain	GPO
Sysmon Config File
• Install	with	XML	based	configuration	to
• Start	with	@SwiftOnSecurity’s file	as	a	base	then	customize	to	fit	your	
environment
• https://github.com/SwiftOnSecurity/sysmon-config
• Filters	events	based	on	Sysmon event	type	
• For	every	type,	sensible	exclusions	and	inclusions	to	reduce	noise	or	
look	for	specifically	suspicious	activity
Sysmon Config File
Collector
• Ubuntu	16.04	LTS	system	running	Elastic	Stack	(ELK)
• Logstash ingests	incoming	syslog	from	endpoints	and	outputs	to	
Elasticsearch
• Kibana web	front	end	to	search	
and	visualize	the	data
• Scales	to	Enterprise,	but	you	will	
need	to	plan	accordingly
Logstash config:	https://gist.github.com/deruke/093e9fa9b666aa211cfdce81921cb3ce
Deployment via GPO
• Script	Block	Logging
• Nxlog installation	and/or	service	start	on	start	up
• Sysmon installation	and/or	service	start	on	start	up
https://gist.github.com/deruke/743a80c89740fdedcb7f8871cdf02536
Demo Time
What about Prevention?
• Configuration	changes	can	be	effective	prevention
• Strong	password	policy
• 15	characters	min	for	users
• 28	characters	for	service	and	administrator	accounts
• 2FA	on	all	external	facing	portals
• Restrict	administrative	access
• LAPS
• Microsoft	Tiered	Architecture	Approach
• Restrict	client-to-client	communication
• Private	VLANs or	Windows	Firewall
What about Prevention?
• Application	Whitelisting
• Windows	10	Enterprise	features
• Device	Guard	– attempts	to	prevent	malicious	code	from	ever	running,	only	
known	good	code	can	run
• Credential	Guard	– hardening	of	key	user	and	system	secrets,	attempted	
mitigation	of	credential	based	attacks
• Both	use	Virtual	Secure	Mode	(VMS)
• Both	require	planning	and	deployment
Resources
• Network	Monitoring
• www.bro.org
• snort.org
• molo.ch
• Host	Based	Monitoring
• Sysmon - technet.microsoft.com/en-
us/sysinternals/bb545021.aspx
• Sysmon Config:	
https://github.com/SwiftOnSecurity/sysmon-config
• Nxlog:	nxlog.co
• Blog	on	setup:
• https://www.blackhillsinfosec.com/endpoint-
monitoring-shoestring-budget-webcast-write/
• Live	response	at	scale	
• Google	GRR:	https://github.com/google/grr
• Log	Correlation
• Elastic:	https://www.elastic.co/
• Graylog:	https://www.graylog.org/
• Microsoft	Environment	Configuration	
• LAPS:	https://www.microsoft.com/en-
us/download/details.aspx?id=46899
• AD	Tiered	Model:	
https://docs.microsoft.com/en-us/windows-
server/identity/securing-privileged-
access/securing-privileged-access-reference-
material
Conclusions
• Free	and	Open	Source	solutions	can	effectively	be	used	for	
monitoring,	detection,	and	live	response
• Edge	based	host	monitoring	with	centralized	logging	is	a	powerful	
combination
• Configuration	changes	are	an	important	aspect	of	preventing	
compromise
Conclusions
• Derek	Banks	- @0xderuke
• @BHInfoSecurity – http://www.blackhillsinfosec.com
0x3F

More Related Content

What's hot

Preparing a Next Generation IT Strategy
Preparing a Next Generation IT StrategyPreparing a Next Generation IT Strategy
Preparing a Next Generation IT StrategyBishop Fox
 
NTXISSACSC2 - Social Engineering 101 or The Art of How You Got Owned by That ...
NTXISSACSC2 - Social Engineering 101 or The Art of How You Got Owned by That ...NTXISSACSC2 - Social Engineering 101 or The Art of How You Got Owned by That ...
NTXISSACSC2 - Social Engineering 101 or The Art of How You Got Owned by That ...North Texas Chapter of the ISSA
 
Application Assessment Techniques
Application Assessment TechniquesApplication Assessment Techniques
Application Assessment TechniquesDenim Group
 
IBM Power Migration without the Risk and Downtime
IBM Power Migration without the Risk and DowntimeIBM Power Migration without the Risk and Downtime
IBM Power Migration without the Risk and DowntimePrecisely
 
Webinar - Finding Local Tech Expertise and Support for Nonprofits and Librari...
Webinar - Finding Local Tech Expertise and Support for Nonprofits and Librari...Webinar - Finding Local Tech Expertise and Support for Nonprofits and Librari...
Webinar - Finding Local Tech Expertise and Support for Nonprofits and Librari...TechSoup
 
MT 117 Key Innovations in Cybersecurity
MT 117 Key Innovations in CybersecurityMT 117 Key Innovations in Cybersecurity
MT 117 Key Innovations in CybersecurityDell EMC World
 
Finding Security a Home in a DevOps World
Finding Security a Home in a DevOps WorldFinding Security a Home in a DevOps World
Finding Security a Home in a DevOps WorldShannon Lietz
 
NTXISSACSC2 - Information Security Opportunity: Embracing Big Data with Peopl...
NTXISSACSC2 - Information Security Opportunity: Embracing Big Data with Peopl...NTXISSACSC2 - Information Security Opportunity: Embracing Big Data with Peopl...
NTXISSACSC2 - Information Security Opportunity: Embracing Big Data with Peopl...North Texas Chapter of the ISSA
 
Calgary security road show master deck final
Calgary security road show master deck finalCalgary security road show master deck final
Calgary security road show master deck finalScalar Decisions
 
Corporate Data Secruity Best Practices and Legal Compliance (00969538xBF97D)
Corporate Data Secruity Best Practices and Legal Compliance (00969538xBF97D)Corporate Data Secruity Best Practices and Legal Compliance (00969538xBF97D)
Corporate Data Secruity Best Practices and Legal Compliance (00969538xBF97D)Paul C. Van Slyke
 
The Intersection Between Open Source and Cybersecurity
The Intersection Between Open Source and CybersecurityThe Intersection Between Open Source and Cybersecurity
The Intersection Between Open Source and CybersecurityBlack Duck by Synopsys
 
NTXISSACSC2 - Bring Your Own Device: The Great Debate by Brandon Swain
NTXISSACSC2 - Bring Your Own Device: The Great Debate by Brandon SwainNTXISSACSC2 - Bring Your Own Device: The Great Debate by Brandon Swain
NTXISSACSC2 - Bring Your Own Device: The Great Debate by Brandon SwainNorth Texas Chapter of the ISSA
 

What's hot (14)

Preparing a Next Generation IT Strategy
Preparing a Next Generation IT StrategyPreparing a Next Generation IT Strategy
Preparing a Next Generation IT Strategy
 
Grc t17
Grc t17Grc t17
Grc t17
 
NTXISSACSC2 - Social Engineering 101 or The Art of How You Got Owned by That ...
NTXISSACSC2 - Social Engineering 101 or The Art of How You Got Owned by That ...NTXISSACSC2 - Social Engineering 101 or The Art of How You Got Owned by That ...
NTXISSACSC2 - Social Engineering 101 or The Art of How You Got Owned by That ...
 
Application Assessment Techniques
Application Assessment TechniquesApplication Assessment Techniques
Application Assessment Techniques
 
IBM Power Migration without the Risk and Downtime
IBM Power Migration without the Risk and DowntimeIBM Power Migration without the Risk and Downtime
IBM Power Migration without the Risk and Downtime
 
Webinar - Finding Local Tech Expertise and Support for Nonprofits and Librari...
Webinar - Finding Local Tech Expertise and Support for Nonprofits and Librari...Webinar - Finding Local Tech Expertise and Support for Nonprofits and Librari...
Webinar - Finding Local Tech Expertise and Support for Nonprofits and Librari...
 
The Journey to DevSecOps
The Journey to DevSecOpsThe Journey to DevSecOps
The Journey to DevSecOps
 
MT 117 Key Innovations in Cybersecurity
MT 117 Key Innovations in CybersecurityMT 117 Key Innovations in Cybersecurity
MT 117 Key Innovations in Cybersecurity
 
Finding Security a Home in a DevOps World
Finding Security a Home in a DevOps WorldFinding Security a Home in a DevOps World
Finding Security a Home in a DevOps World
 
NTXISSACSC2 - Information Security Opportunity: Embracing Big Data with Peopl...
NTXISSACSC2 - Information Security Opportunity: Embracing Big Data with Peopl...NTXISSACSC2 - Information Security Opportunity: Embracing Big Data with Peopl...
NTXISSACSC2 - Information Security Opportunity: Embracing Big Data with Peopl...
 
Calgary security road show master deck final
Calgary security road show master deck finalCalgary security road show master deck final
Calgary security road show master deck final
 
Corporate Data Secruity Best Practices and Legal Compliance (00969538xBF97D)
Corporate Data Secruity Best Practices and Legal Compliance (00969538xBF97D)Corporate Data Secruity Best Practices and Legal Compliance (00969538xBF97D)
Corporate Data Secruity Best Practices and Legal Compliance (00969538xBF97D)
 
The Intersection Between Open Source and Cybersecurity
The Intersection Between Open Source and CybersecurityThe Intersection Between Open Source and Cybersecurity
The Intersection Between Open Source and Cybersecurity
 
NTXISSACSC2 - Bring Your Own Device: The Great Debate by Brandon Swain
NTXISSACSC2 - Bring Your Own Device: The Great Debate by Brandon SwainNTXISSACSC2 - Bring Your Own Device: The Great Debate by Brandon Swain
NTXISSACSC2 - Bring Your Own Device: The Great Debate by Brandon Swain
 

Viewers also liked

Technology and AI sharing - From 2016 to Y2017 and Beyond
Technology and AI sharing - From 2016 to Y2017 and BeyondTechnology and AI sharing - From 2016 to Y2017 and Beyond
Technology and AI sharing - From 2016 to Y2017 and BeyondJames Huang
 
ProRail Laurens Koppenol & Paul van der Voort
ProRail Laurens Koppenol & Paul van der VoortProRail Laurens Koppenol & Paul van der Voort
ProRail Laurens Koppenol & Paul van der VoortBigDataExpo
 
Google Big Data Expo
Google Big Data ExpoGoogle Big Data Expo
Google Big Data ExpoBigDataExpo
 
Elasticsearch 5.0 les nouveautés
Elasticsearch 5.0 les nouveautésElasticsearch 5.0 les nouveautés
Elasticsearch 5.0 les nouveautésMathieu Elie
 
Big Data Analytics to Enhance Security
Big Data Analytics to Enhance SecurityBig Data Analytics to Enhance Security
Big Data Analytics to Enhance SecurityData Science Thailand
 
Anomaly Detection in Time-Series Data using the Elastic Stack by Henry Pak
Anomaly Detection in Time-Series Data using the Elastic Stack by Henry PakAnomaly Detection in Time-Series Data using the Elastic Stack by Henry Pak
Anomaly Detection in Time-Series Data using the Elastic Stack by Henry PakData Con LA
 
NUS-ISS Learning Day 2016 - Big Data Analytics
NUS-ISS Learning Day 2016 - Big Data AnalyticsNUS-ISS Learning Day 2016 - Big Data Analytics
NUS-ISS Learning Day 2016 - Big Data AnalyticsNUS-ISS
 
Bde presentatie bakker_bart_20170920
Bde presentatie bakker_bart_20170920Bde presentatie bakker_bart_20170920
Bde presentatie bakker_bart_20170920BigDataExpo
 
Picnic Big Data Expo
Picnic Big Data ExpoPicnic Big Data Expo
Picnic Big Data ExpoBigDataExpo
 
Mainframe Customer Education Webcast: New Ironstream Facilities for Enhanced ...
Mainframe Customer Education Webcast: New Ironstream Facilities for Enhanced ...Mainframe Customer Education Webcast: New Ironstream Facilities for Enhanced ...
Mainframe Customer Education Webcast: New Ironstream Facilities for Enhanced ...Precisely
 
Accenture Big Data Expo
Accenture Big Data ExpoAccenture Big Data Expo
Accenture Big Data ExpoBigDataExpo
 
Eneco Ronald Root
Eneco Ronald RootEneco Ronald Root
Eneco Ronald RootBigDataExpo
 
Zoomable Menu Mockup
Zoomable Menu MockupZoomable Menu Mockup
Zoomable Menu MockupNone None
 
De Bijenkorf Niels Reijmer
De Bijenkorf Niels ReijmerDe Bijenkorf Niels Reijmer
De Bijenkorf Niels ReijmerBigDataExpo
 
Presentatie big data expo swarovski
Presentatie big data expo swarovskiPresentatie big data expo swarovski
Presentatie big data expo swarovskiBigDataExpo
 

Viewers also liked (20)

Java start01 in 2hours
Java start01 in 2hoursJava start01 in 2hours
Java start01 in 2hours
 
Technology and AI sharing - From 2016 to Y2017 and Beyond
Technology and AI sharing - From 2016 to Y2017 and BeyondTechnology and AI sharing - From 2016 to Y2017 and Beyond
Technology and AI sharing - From 2016 to Y2017 and Beyond
 
ProRail Laurens Koppenol & Paul van der Voort
ProRail Laurens Koppenol & Paul van der VoortProRail Laurens Koppenol & Paul van der Voort
ProRail Laurens Koppenol & Paul van der Voort
 
Google Big Data Expo
Google Big Data ExpoGoogle Big Data Expo
Google Big Data Expo
 
Elasticsearch 5.0 les nouveautés
Elasticsearch 5.0 les nouveautésElasticsearch 5.0 les nouveautés
Elasticsearch 5.0 les nouveautés
 
Datasnap web client
Datasnap web clientDatasnap web client
Datasnap web client
 
Big Data Analytics to Enhance Security
Big Data Analytics to Enhance SecurityBig Data Analytics to Enhance Security
Big Data Analytics to Enhance Security
 
Anomaly Detection in Time-Series Data using the Elastic Stack by Henry Pak
Anomaly Detection in Time-Series Data using the Elastic Stack by Henry PakAnomaly Detection in Time-Series Data using the Elastic Stack by Henry Pak
Anomaly Detection in Time-Series Data using the Elastic Stack by Henry Pak
 
NUS-ISS Learning Day 2016 - Big Data Analytics
NUS-ISS Learning Day 2016 - Big Data AnalyticsNUS-ISS Learning Day 2016 - Big Data Analytics
NUS-ISS Learning Day 2016 - Big Data Analytics
 
Polar Bears Mario
Polar Bears MarioPolar Bears Mario
Polar Bears Mario
 
Travelbird
TravelbirdTravelbird
Travelbird
 
Bde presentatie bakker_bart_20170920
Bde presentatie bakker_bart_20170920Bde presentatie bakker_bart_20170920
Bde presentatie bakker_bart_20170920
 
Picnic Big Data Expo
Picnic Big Data ExpoPicnic Big Data Expo
Picnic Big Data Expo
 
Mainframe Customer Education Webcast: New Ironstream Facilities for Enhanced ...
Mainframe Customer Education Webcast: New Ironstream Facilities for Enhanced ...Mainframe Customer Education Webcast: New Ironstream Facilities for Enhanced ...
Mainframe Customer Education Webcast: New Ironstream Facilities for Enhanced ...
 
Accenture Big Data Expo
Accenture Big Data ExpoAccenture Big Data Expo
Accenture Big Data Expo
 
Eneco Ronald Root
Eneco Ronald RootEneco Ronald Root
Eneco Ronald Root
 
Zoomable Menu Mockup
Zoomable Menu MockupZoomable Menu Mockup
Zoomable Menu Mockup
 
Digital transformation - Jo Caudron
Digital transformation - Jo CaudronDigital transformation - Jo Caudron
Digital transformation - Jo Caudron
 
De Bijenkorf Niels Reijmer
De Bijenkorf Niels ReijmerDe Bijenkorf Niels Reijmer
De Bijenkorf Niels Reijmer
 
Presentatie big data expo swarovski
Presentatie big data expo swarovskiPresentatie big data expo swarovski
Presentatie big data expo swarovski
 

Similar to Incident response on a shoestring budget

Managing Open Source in Application Security and Software Development Lifecycle
Managing Open Source in Application Security and Software Development LifecycleManaging Open Source in Application Security and Software Development Lifecycle
Managing Open Source in Application Security and Software Development LifecycleBlack Duck by Synopsys
 
Webinar: Accelerate Business Automation with APPSeCONNECT iPaaS
Webinar: Accelerate Business Automation with APPSeCONNECT iPaaSWebinar: Accelerate Business Automation with APPSeCONNECT iPaaS
Webinar: Accelerate Business Automation with APPSeCONNECT iPaaSAPPSeCONNECT
 
Bootstrapping an Open-Source Program Office at Blue Cross NC
Bootstrapping an Open-Source Program Office at Blue Cross NCBootstrapping an Open-Source Program Office at Blue Cross NC
Bootstrapping an Open-Source Program Office at Blue Cross NCAll Things Open
 
How to Get the Most Out of Security Tools
How to Get the Most Out of Security ToolsHow to Get the Most Out of Security Tools
How to Get the Most Out of Security ToolsSecurity Innovation
 
Mork - CISO Summit USA 2016 - Security in an Outsourced World
Mork - CISO Summit USA 2016 - Security in an Outsourced WorldMork - CISO Summit USA 2016 - Security in an Outsourced World
Mork - CISO Summit USA 2016 - Security in an Outsourced WorldNothing Nowhere
 
SpiceWorks Webinar: Whose logs, what logs, why logs
SpiceWorks Webinar: Whose logs, what logs, why logs  SpiceWorks Webinar: Whose logs, what logs, why logs
SpiceWorks Webinar: Whose logs, what logs, why logs AlienVault
 
AppSec in an Agile World
AppSec in an Agile WorldAppSec in an Agile World
AppSec in an Agile WorldDavid Lindner
 
Choosing a Database
Choosing a DatabaseChoosing a Database
Choosing a Database501 Commons
 
The Biggest Mistake you can make with your Data Center Licenses
The Biggest Mistake you can make with your Data Center LicensesThe Biggest Mistake you can make with your Data Center Licenses
The Biggest Mistake you can make with your Data Center LicensesIvanti
 
(SEC402) Enterprise Cloud Security via DevSecOps 2.0
(SEC402) Enterprise Cloud Security via DevSecOps 2.0(SEC402) Enterprise Cloud Security via DevSecOps 2.0
(SEC402) Enterprise Cloud Security via DevSecOps 2.0Amazon Web Services
 
Using analytics in ux design my view
Using analytics in ux design   my viewUsing analytics in ux design   my view
Using analytics in ux design my viewOuti Aramo
 
Open Source Security for Newbies - Best Practices
Open Source Security for Newbies - Best PracticesOpen Source Security for Newbies - Best Practices
Open Source Security for Newbies - Best PracticesBlack Duck by Synopsys
 
Hacker vs Tools: Which to Choose?
Hacker vs Tools: Which to Choose?Hacker vs Tools: Which to Choose?
Hacker vs Tools: Which to Choose?Security Innovation
 
What Good is this Tool? A Guide to Choosing the Right Application Security Te...
What Good is this Tool? A Guide to Choosing the Right Application Security Te...What Good is this Tool? A Guide to Choosing the Right Application Security Te...
What Good is this Tool? A Guide to Choosing the Right Application Security Te...Kevin Fealey
 
Finding the Sweet Spot: Counter Honeypot Operations (CHOps) by Jonathan Creek...
Finding the Sweet Spot: Counter Honeypot Operations (CHOps) by Jonathan Creek...Finding the Sweet Spot: Counter Honeypot Operations (CHOps) by Jonathan Creek...
Finding the Sweet Spot: Counter Honeypot Operations (CHOps) by Jonathan Creek...EC-Council
 
Getting Started with Product Analytics - A 101 Implementation Guide for Begin...
Getting Started with Product Analytics - A 101 Implementation Guide for Begin...Getting Started with Product Analytics - A 101 Implementation Guide for Begin...
Getting Started with Product Analytics - A 101 Implementation Guide for Begin...Vishrut Shukla
 
Open Source isn't Just Good, it's Good Business - DrupalCamp Colorado 2014
Open Source isn't Just Good, it's Good Business - DrupalCamp Colorado 2014Open Source isn't Just Good, it's Good Business - DrupalCamp Colorado 2014
Open Source isn't Just Good, it's Good Business - DrupalCamp Colorado 2014Zivtech, LLC
 
Your cyber security webinar
Your cyber security webinarYour cyber security webinar
Your cyber security webinarIntergen
 
Giving your AppSec program the edge - using OpenSAMM for benchmarking and sof...
Giving your AppSec program the edge - using OpenSAMM for benchmarking and sof...Giving your AppSec program the edge - using OpenSAMM for benchmarking and sof...
Giving your AppSec program the edge - using OpenSAMM for benchmarking and sof...Denim Group
 

Similar to Incident response on a shoestring budget (20)

Managing Open Source in Application Security and Software Development Lifecycle
Managing Open Source in Application Security and Software Development LifecycleManaging Open Source in Application Security and Software Development Lifecycle
Managing Open Source in Application Security and Software Development Lifecycle
 
Webinar: Accelerate Business Automation with APPSeCONNECT iPaaS
Webinar: Accelerate Business Automation with APPSeCONNECT iPaaSWebinar: Accelerate Business Automation with APPSeCONNECT iPaaS
Webinar: Accelerate Business Automation with APPSeCONNECT iPaaS
 
Bootstrapping an Open-Source Program Office at Blue Cross NC
Bootstrapping an Open-Source Program Office at Blue Cross NCBootstrapping an Open-Source Program Office at Blue Cross NC
Bootstrapping an Open-Source Program Office at Blue Cross NC
 
How to Get the Most Out of Security Tools
How to Get the Most Out of Security ToolsHow to Get the Most Out of Security Tools
How to Get the Most Out of Security Tools
 
Mork - CISO Summit USA 2016 - Security in an Outsourced World
Mork - CISO Summit USA 2016 - Security in an Outsourced WorldMork - CISO Summit USA 2016 - Security in an Outsourced World
Mork - CISO Summit USA 2016 - Security in an Outsourced World
 
SpiceWorks Webinar: Whose logs, what logs, why logs
SpiceWorks Webinar: Whose logs, what logs, why logs  SpiceWorks Webinar: Whose logs, what logs, why logs
SpiceWorks Webinar: Whose logs, what logs, why logs
 
AppSec in an Agile World
AppSec in an Agile WorldAppSec in an Agile World
AppSec in an Agile World
 
Choosing a Database
Choosing a DatabaseChoosing a Database
Choosing a Database
 
The Biggest Mistake you can make with your Data Center Licenses
The Biggest Mistake you can make with your Data Center LicensesThe Biggest Mistake you can make with your Data Center Licenses
The Biggest Mistake you can make with your Data Center Licenses
 
(SEC402) Enterprise Cloud Security via DevSecOps 2.0
(SEC402) Enterprise Cloud Security via DevSecOps 2.0(SEC402) Enterprise Cloud Security via DevSecOps 2.0
(SEC402) Enterprise Cloud Security via DevSecOps 2.0
 
Using analytics in ux design my view
Using analytics in ux design   my viewUsing analytics in ux design   my view
Using analytics in ux design my view
 
Open Source Security for Newbies - Best Practices
Open Source Security for Newbies - Best PracticesOpen Source Security for Newbies - Best Practices
Open Source Security for Newbies - Best Practices
 
Hacker vs Tools: Which to Choose?
Hacker vs Tools: Which to Choose?Hacker vs Tools: Which to Choose?
Hacker vs Tools: Which to Choose?
 
Hacker vs tools
Hacker vs toolsHacker vs tools
Hacker vs tools
 
What Good is this Tool? A Guide to Choosing the Right Application Security Te...
What Good is this Tool? A Guide to Choosing the Right Application Security Te...What Good is this Tool? A Guide to Choosing the Right Application Security Te...
What Good is this Tool? A Guide to Choosing the Right Application Security Te...
 
Finding the Sweet Spot: Counter Honeypot Operations (CHOps) by Jonathan Creek...
Finding the Sweet Spot: Counter Honeypot Operations (CHOps) by Jonathan Creek...Finding the Sweet Spot: Counter Honeypot Operations (CHOps) by Jonathan Creek...
Finding the Sweet Spot: Counter Honeypot Operations (CHOps) by Jonathan Creek...
 
Getting Started with Product Analytics - A 101 Implementation Guide for Begin...
Getting Started with Product Analytics - A 101 Implementation Guide for Begin...Getting Started with Product Analytics - A 101 Implementation Guide for Begin...
Getting Started with Product Analytics - A 101 Implementation Guide for Begin...
 
Open Source isn't Just Good, it's Good Business - DrupalCamp Colorado 2014
Open Source isn't Just Good, it's Good Business - DrupalCamp Colorado 2014Open Source isn't Just Good, it's Good Business - DrupalCamp Colorado 2014
Open Source isn't Just Good, it's Good Business - DrupalCamp Colorado 2014
 
Your cyber security webinar
Your cyber security webinarYour cyber security webinar
Your cyber security webinar
 
Giving your AppSec program the edge - using OpenSAMM for benchmarking and sof...
Giving your AppSec program the edge - using OpenSAMM for benchmarking and sof...Giving your AppSec program the edge - using OpenSAMM for benchmarking and sof...
Giving your AppSec program the edge - using OpenSAMM for benchmarking and sof...
 

Recently uploaded

Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality AssuranceInflectra
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Alkin Tezuysal
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesThousandEyes
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rick Flair
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...Wes McKinney
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterMydbops
 
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Scott Andery
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 

Recently uploaded (20)

Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL Router
 
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 

Incident response on a shoestring budget