www.slideshare.net/MatthewDunwoody1/no-easy-breach-derby-con-2016

Preview meta tags from the www.slideshare.net website.

Linked Hostnames

3

Thumbnail

Search Engine Appearance

Google

https://www.slideshare.net/MatthewDunwoody1/no-easy-breach-derby-con-2016

No Easy Breach DerbyCon 2016

The document details the difficulties faced by a security team in responding to a sophisticated cyber attack by APT29, illustrating challenges such as fast-paced, stealthy tactics, rapidly evolving attack methods, and advanced techniques like WMI and Kerberos ticket attacks. It outlines various responses and lessons learned, emphasizing the need for flexibility, improved visibility, and ongoing enhancement of detection methods. Key takeaways include the importance of matching attackers' strategies and continually refining incident response practices for effective security. - Download as a PDF or view online for free



Bing

No Easy Breach DerbyCon 2016

https://www.slideshare.net/MatthewDunwoody1/no-easy-breach-derby-con-2016

The document details the difficulties faced by a security team in responding to a sophisticated cyber attack by APT29, illustrating challenges such as fast-paced, stealthy tactics, rapidly evolving attack methods, and advanced techniques like WMI and Kerberos ticket attacks. It outlines various responses and lessons learned, emphasizing the need for flexibility, improved visibility, and ongoing enhancement of detection methods. Key takeaways include the importance of matching attackers' strategies and continually refining incident response practices for effective security. - Download as a PDF or view online for free



DuckDuckGo

https://www.slideshare.net/MatthewDunwoody1/no-easy-breach-derby-con-2016

No Easy Breach DerbyCon 2016

The document details the difficulties faced by a security team in responding to a sophisticated cyber attack by APT29, illustrating challenges such as fast-paced, stealthy tactics, rapidly evolving attack methods, and advanced techniques like WMI and Kerberos ticket attacks. It outlines various responses and lessons learned, emphasizing the need for flexibility, improved visibility, and ongoing enhancement of detection methods. Key takeaways include the importance of matching attackers' strategies and continually refining incident response practices for effective security. - Download as a PDF or view online for free

  • General Meta Tags

    7
    • title
      No Easy Breach DerbyCon 2016 | PDF | Operating Systems | Computer Software and Applications
    • charset
      utf-8
    • viewport
      width=device-width
    • robots
      index, follow
    • title
      No Easy Breach DerbyCon 2016
  • Open Graph Meta Tags

    10
    • og:site_name
      SlideShare
    • og:type
      website
    • og:url
      https://www.slideshare.net/slideshow/no-easy-breach-derby-con-2016/66447908
    • og:title
      No Easy Breach DerbyCon 2016
    • og:description
      The document details the difficulties faced by a security team in responding to a sophisticated cyber attack by APT29, illustrating challenges such as fast-paced, stealthy tactics, rapidly evolving attack methods, and advanced techniques like WMI and Kerberos ticket attacks. It outlines various responses and lessons learned, emphasizing the need for flexibility, improved visibility, and ongoing enhancement of detection methods. Key takeaways include the importance of matching attackers' strategies and continually refining incident response practices for effective security. - Download as a PDF or view online for free
  • Twitter Meta Tags

    17
    • twitter:site
      @SlideShare
    • twitter:card
      player
    • twitter:title
      No Easy Breach DerbyCon 2016
    • twitter:description
      The document details the difficulties faced by a security team in responding to a sophisticated cyber attack by APT29, illustrating challenges such as fast-paced, stealthy tactics, rapidly evolving attack methods, and advanced techniques like WMI and Kerberos ticket attacks. It outlines various responses and lessons learned, emphasizing the need for flexibility, improved visibility, and ongoing enhancement of detection methods. Key takeaways include the importance of matching attackers' strategies and continually refining incident response practices for effective security. - Download as a PDF or view online for free
    • twitter:image
      https://cdn.slidesharecdn.com/ss_thumbnails/noeasybreach-derbycon2016-160927021845-thumbnail.jpg?width=640&height=640&fit=bounds
  • Link Tags

    18
    • canonical
      https://www.slideshare.net/slideshow/no-easy-breach-derby-con-2016/66447908
    • preload
      https://public.slidesharecdn.com/_next/static/media/b6a6f0b43d027304-s.p.woff2
    • preload
      https://public.slidesharecdn.com/_next/static/media/9cf9c6e84ed13b5e-s.p.woff2
    • preload
      https://public.slidesharecdn.com/_next/static/media/8e9860b6e62d6359-s.p.woff2
    • preload
      https://public.slidesharecdn.com/_next/static/media/e4af272ccee01ff0-s.p.woff2
  • Website Locales

    2
    • EN country flagen
      https://www.slideshare.net/slideshow/no-easy-breach-derby-con-2016/66447908
    • DEFAULT country flagx-default
      https://www.slideshare.net/slideshow/no-easy-breach-derby-con-2016/66447908

Links

174