IOT, Threat hunting, ICS security

Beacon Analysis, Chris Brenton – Paul’s Security Weekly #574

September 9, 2018
Beacon analysis is an integral part of threat hunting. If you are not looking for beacons you take the chance of missing compromised IoT devices or anything that does not have a threat mitigation agent installed. I'll talk about what makes beacon hunting so hard, and how the open source tool RITA can simplify the process. ***Powerpoint Slides in Full Show Notes*** Full Show Notes Subscribe to YouTube Channel

Hosts

[caption id="attachment_210" align="alignleft" width="120"]Patrick Laverty Patrick Laverty - Security Consultant, Rapid 7.[/caption] [caption id="attachment_210" align="alignleft" width="120"]Doug White Doug White - Professor, Roger Williams University.[/caption] [caption id="attachment_210" align="alignleft" width="120"]Carlos Perez Carlos Perez - Principal Consultant, Team Lead for Research, TrustedSec.[/caption] [caption id="attachment_210" align="alignleft" width="120"]Jack Daniel Jack Daniel - Security Wizard, Co-Founder of Security BSides.[/caption] [caption id="attachment_210" align="alignleft" width="120"]Joff Thyer Joff Thyer - Security Analyst, Black Hills Information Security.[/caption] [caption id="attachment_210" align="alignleft" width="120"]Not Kevin Not Kevin - Senior Sales Engineer, Barkly.[/caption] [caption id="attachment_210" align="alignleft" width="120"]Paul Asadorian Paul Asadorian - CEO, Security Weekly.[/caption] [audio src="http://traffic.libsyn.com/pauldotcom/Beacon_Analysis_Chris_Brenton_-_Pauls_Security_Weekly_574_converted.mp3" ]
prestitial ad