Blueprint: Build the Best in Cyber Defense

Blueprint Live at the SANS Blue Team Summit 2023

Jun 22, 2023
Ask episode
Chapters
Transcript
Episode notes
1
Introduction
00:00 • 2min
2
The History of MITRE
02:22 • 2min
3
The 10 Commandments of C and D
04:21 • 2min
4
How to Get Started in Security Operations
05:53 • 2min
5
The Importance of Identity in Cybersecurity
07:59 • 2min
6
The Importance of Consensus in Security Operations
09:35 • 3min
7
The Importance of Identity in Business
12:15 • 2min
8
The Importance of Identity Federation in Multi-Cloud
14:34 • 2min
9
The Importance of Identity in Security Operations
16:28 • 2min
10
The AI Factor in Cyber Defense
18:23 • 2min
11
The Future of Security
19:58 • 2min
12
How to Build the Strongest Security Operations Team
21:50 • 5min
13
How AI Can Enhance Security Operations
26:42 • 2min
14
How to Use Chat GPT to Improve Your Business
28:40 • 2min
15
The Importance of Information Linkage
30:59 • 2min
16
How to Keep Up With Detection I in the Cloud as an IAS Platform as a Service
32:46 • 3min
17
The Importance of Commoditizing Detection
35:23 • 3min
18
How to Detect Ransomware Early on in the Chain
38:01 • 2min
19
How Threat Hunting Blends With Red Teaming and SOC Operations
40:11 • 3min
20
How to Do Threat Hunting as a Side Gig
43:17 • 2min
21
The Role of Thread Hunting in Red Teaming
45:20 • 2min
22
The Importance of Threat Hunting in SOCs
47:40 • 2min
23
The Importance of Data in Hunting
49:26 • 2min
24
The Rise of Supply Chain Attacks
51:26 • 2min
25
The Importance of Software Asset Inventory in Supply Chain Attacks
53:53 • 2min
26
How to Protect Your Intellectual Property in a Supply Chain Attack
55:58 • 2min
27
The Importance of Detection in the Supply Chain
58:20 • 2min
28
The Importance of Sharing Incident Information
01:00:41 • 2min
29
The Future of Cyber Defense
01:03:07 • 2min
30
Adaptability and Resiliency: The Two Big Words
01:04:42 • 3min