May 30, 2024, 5:19 a.m. | Antisyphon Training

Antisyphon Training www.youtube.com

/// 🔗 Register for webcasts, summits, and workshops -
https://blackhillsinfosec.zoom.us/ze/hub/stadium
🛝 Webcast Slides -
https://www.antisyphontraining.com/wp-content/uploads/2024/05/2024_05_29_anticast_Realistic-End-to-End-Attacks-Detective-Controls_Jeff-McJunkin.pdf

Jeff reveals the five ways outside attackers gain internal access and outlines three core defender objectives:

Reducing initial access.Lowering detection and response time.Slowing down the attackers.

Discover actionable insights through three live, realistic breach demonstrations into detective controls and slowing down attackers.

Total prevention would be ideal, but it's impossible.

Focus on minimizing, detecting, and accelerating response to incidents.
Additional resources on credential stuffing, threat …

access actionable actionable insights and response attackers attacks breach controls defender detection detection and response detective discover down end end-to-end initial access insights internal live objectives register response response time slides webcast webcasts workshops

CyberSOC Technical Lead

@ Integrity360 | Sandyford, Dublin, Ireland

Cyber Security Strategy Consultant

@ Capco | New York City

Cyber Security Senior Consultant

@ Capco | Chicago, IL

Sr. Product Manager

@ MixMode | Remote, US

Corporate Intern - Information Security (Year Round)

@ Associated Bank | US WI Remote

Senior Offensive Security Engineer

@ CoStar Group | US-DC Washington, DC