www.slideshare.net/MatthewDunwoody1/no-easy-breach-derby-con-2016
Preview meta tags from the www.slideshare.net website.
Linked Hostnames
3Thumbnail

Search Engine Appearance
No Easy Breach DerbyCon 2016
The document details the difficulties faced by a security team in responding to a sophisticated cyber attack by APT29, illustrating challenges such as fast-paced, stealthy tactics, rapidly evolving attack methods, and advanced techniques like WMI and Kerberos ticket attacks. It outlines various responses and lessons learned, emphasizing the need for flexibility, improved visibility, and ongoing enhancement of detection methods. Key takeaways include the importance of matching attackers' strategies and continually refining incident response practices for effective security. - Download as a PDF or view online for free
Bing
No Easy Breach DerbyCon 2016
The document details the difficulties faced by a security team in responding to a sophisticated cyber attack by APT29, illustrating challenges such as fast-paced, stealthy tactics, rapidly evolving attack methods, and advanced techniques like WMI and Kerberos ticket attacks. It outlines various responses and lessons learned, emphasizing the need for flexibility, improved visibility, and ongoing enhancement of detection methods. Key takeaways include the importance of matching attackers' strategies and continually refining incident response practices for effective security. - Download as a PDF or view online for free
DuckDuckGo
No Easy Breach DerbyCon 2016
The document details the difficulties faced by a security team in responding to a sophisticated cyber attack by APT29, illustrating challenges such as fast-paced, stealthy tactics, rapidly evolving attack methods, and advanced techniques like WMI and Kerberos ticket attacks. It outlines various responses and lessons learned, emphasizing the need for flexibility, improved visibility, and ongoing enhancement of detection methods. Key takeaways include the importance of matching attackers' strategies and continually refining incident response practices for effective security. - Download as a PDF or view online for free
General Meta Tags
7- titleNo Easy Breach DerbyCon 2016 | PDF | Operating Systems | Computer Software and Applications
- charsetutf-8
- viewportwidth=device-width
- robotsindex, follow
- titleNo Easy Breach DerbyCon 2016
Open Graph Meta Tags
10- og:site_nameSlideShare
- og:typewebsite
- og:urlhttps://www.slideshare.net/slideshow/no-easy-breach-derby-con-2016/66447908
- og:titleNo Easy Breach DerbyCon 2016
- og:descriptionThe document details the difficulties faced by a security team in responding to a sophisticated cyber attack by APT29, illustrating challenges such as fast-paced, stealthy tactics, rapidly evolving attack methods, and advanced techniques like WMI and Kerberos ticket attacks. It outlines various responses and lessons learned, emphasizing the need for flexibility, improved visibility, and ongoing enhancement of detection methods. Key takeaways include the importance of matching attackers' strategies and continually refining incident response practices for effective security. - Download as a PDF or view online for free
Twitter Meta Tags
17- twitter:site@SlideShare
- twitter:cardplayer
- twitter:titleNo Easy Breach DerbyCon 2016
- twitter:descriptionThe document details the difficulties faced by a security team in responding to a sophisticated cyber attack by APT29, illustrating challenges such as fast-paced, stealthy tactics, rapidly evolving attack methods, and advanced techniques like WMI and Kerberos ticket attacks. It outlines various responses and lessons learned, emphasizing the need for flexibility, improved visibility, and ongoing enhancement of detection methods. Key takeaways include the importance of matching attackers' strategies and continually refining incident response practices for effective security. - Download as a PDF or view online for free
- twitter:imagehttps://cdn.slidesharecdn.com/ss_thumbnails/noeasybreach-derbycon2016-160927021845-thumbnail.jpg?width=640&height=640&fit=bounds
Link Tags
18- canonicalhttps://www.slideshare.net/slideshow/no-easy-breach-derby-con-2016/66447908
- preloadhttps://public.slidesharecdn.com/_next/static/media/b6a6f0b43d027304-s.p.woff2
- preloadhttps://public.slidesharecdn.com/_next/static/media/9cf9c6e84ed13b5e-s.p.woff2
- preloadhttps://public.slidesharecdn.com/_next/static/media/8e9860b6e62d6359-s.p.woff2
- preloadhttps://public.slidesharecdn.com/_next/static/media/e4af272ccee01ff0-s.p.woff2
Website Locales
2en
https://www.slideshare.net/slideshow/no-easy-breach-derby-con-2016/66447908x-default
https://www.slideshare.net/slideshow/no-easy-breach-derby-con-2016/66447908
Links
174- https://support.scribd.com/hc/en/articles/360038016931-Privacy-Rights-Request-Form
- https://support.scribd.com/hc/en/categories/360004792932-SlideShare?userType=SlideShare
- https://support.scribd.com/hc/en/categories/360004792932-SlideShare?userType=SlideShare/articles/210129326-General-Terms-of-Use
- https://support.scribd.com/hc/en/categories/360004792932-SlideShare?userType=SlideShare/articles/210129366-Privacy-policy
- https://support.scribd.com/hc/en/sections/202246086