

The Art of Threat Detection Engineering
Aug 9, 2022
Chapters
Transcript
Episode notes
1 2 3 4 5 6 7 8 9
Introduction
00:00 • 3min
How to Detonate a Melver in an Attack Chain?
02:58 • 4min
How to Create Signatures on an Attack Chain?
06:58 • 5min
Detecting and Blocking Thread Actor Activity
11:51 • 2min
I Clod Is at Work in Detection
13:56 • 3min
Is There a Pyramid of Pain?
16:50 • 4min
Automated Miter Attack Detection at Proof Point
21:18 • 3min
Miter Attack Framework - What Are the Most Commonly Used TTPs?
24:41 • 3min
Proof Point Detection Strategy - The Pyramid of Pain
28:08 • 2min