Chapters
Transcript
Episode notes
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25
Introduction
00:00 • 3min
How I Learned to Hack Computer Game Hackers
02:57 • 4min
The Importance of Detection Validation
07:07 • 5min
How to Automate Responses on the Ads Release Response Section
12:03 • 3min
How to Evaluate Good EDR
14:48 • 3min
The Importance of Pre-Backed Detection in EDR
18:04 • 2min
Mitre: A Good Place to Start in Detection
20:06 • 6min
How to Evade a Vendor Detection
25:38 • 1min
How to Create Multiple Detections for Multiple Techniques
26:56 • 3min
The Importance of Automating Defensive Engagements
29:43 • 5min
How to Detect an Insider Threat With Automated Alerts
34:16 • 3min
How to Automate Alert Triage
37:10 • 4min
The Paradox of a Good ADS Being High Signal Low Noise
41:16 • 3min
How to Curb Roast a Service Ticket
44:26 • 2min
Curb Ro Service Ticket Requests: A Base Condition for Curb Roasting
46:03 • 6min
How to Improve Your Ads With Knowledge About Our Environment
51:35 • 6min
The Importance of Detection and Alert Fire
57:15 • 3min
How to Define WScript Abuse in Your Network
01:00:25 • 5min
The Importance of High Signal Detection in a Defensive Team
01:05:27 • 2min
The Role of Mark Up Chains in Detection
01:07:11 • 2min
The Importance of Prevention
01:09:13 • 5min
The Power of Sequel Light
01:13:59 • 2min
The Benefits of SACLs
01:16:11 • 4min
The Benefits of SACL for Insecurity Monitoring
01:20:21 • 3min
Open Source Extensions for Chrome Firefox on Edge
01:23:06 • 6min


