May 30, 2024, 5:19 a.m. | Antisyphon Training

Antisyphon Training www.youtube.com

/// 🔗 Register for webcasts, summits, and workshops -
https://blackhillsinfosec.zoom.us/ze/hub/stadium
🛝 Webcast Slides -
https://www.antisyphontraining.com/wp-content/uploads/2024/05/2024_05_29_anticast_Realistic-End-to-End-Attacks-Detective-Controls_Jeff-McJunkin.pdf

Jeff reveals the five ways outside attackers gain internal access and outlines three core defender objectives:

Reducing initial access.Lowering detection and response time.Slowing down the attackers.

Discover actionable insights through three live, realistic breach demonstrations into detective controls and slowing down attackers.

Total prevention would be ideal, but it's impossible.

Focus on minimizing, detecting, and accelerating response to incidents.
Additional resources on credential stuffing, threat …

access actionable actionable insights and response attackers attacks breach controls defender detection detection and response detective discover down end end-to-end initial access insights internal live objectives register response response time slides webcast webcasts workshops

CyberSOC Technical Lead

@ Integrity360 | Sandyford, Dublin, Ireland

Cyber Security Strategy Consultant

@ Capco | New York City

Cyber Security Senior Consultant

@ Capco | Chicago, IL

Sr. Product Manager

@ MixMode | Remote, US

Security Compliance Strategist

@ Grab | Petaling Jaya, Malaysia

Cloud Security Architect, Lead

@ Booz Allen Hamilton | USA, VA, McLean (1500 Tysons McLean Dr)