A Logo

Feel free to include my content in your page via my
RSS feed

Help Irongeek.com pay for
bandwidth and research equipment:

Subscribestar or Patreon

Search Irongeek.com:

Affiliates:
Irongeek Button
Social-engineer-training Button

Help Irongeek.com pay for bandwidth and research equipment:

paypalpixle


Cyber, Cyber, Cyber - Using the killchain to accomplish something - Amanda Sullivan Berlin Bsides Cleveland 2017 (Hacking Illustrated Series InfoSec Tutorial Videos)

Cyber, Cyber, Cyber - Using the killchain to accomplish something
Amanda Sullivan Berlin

Everyone talks about the cyberkill chain(tm). I want to show you how to map some of the common threats to the different steps along with how to defend against and monitor for each along the way. Threats like ransomware, data exfiltration, and application vulnerabilities will be broken down for a better understanding of how to improve the standard of defense.

Amanda Berlin is an Information Security Architect for a consulting firm in Northern Ohio. She has spent over a decade in different areas of technology and sectors providing infrastructure support, triage, and design. Amanda has been involved in implementing a secure Payment Card Industries (PCI) process and Health Insurance Portability and Accountability Act (HIPAA) compliance as well as building a comprehensive phishing and awards-based user education program. She is the author for a Blue Team best practices book called "Defensive Security Handbook: Best Practices for Securing Infrastructure" through O'Reilly Media. She is a co-host on the Brakeing Down Security podcast and writes for several blogs.


Back to Bsides Cleveland 2017 video list

Printable version of this article

15 most recent posts on Irongeek.com:


If you would like to republish one of the articles from this site on your webpage or print journal please contact IronGeek.

Copyright 2020, IronGeek
Louisville / Kentuckiana Information Security Enthusiast