Profiling the Attacker – Using Offender Profiling In SOC Environments

 

It’s been said ‘‘Intrusion analysis is as much about tcpdump as astronomy is about telescopes”. Understanding who is attacking your or a customer’s network and why is just as important as analyzing the packets on it. This slot will focus on a technical offender profiling framework that can be used to build a knowledge base on malicious actors. This talk will delve into the following areas: – Building an information classification for your assets – Attack significance plotting – Attack factor comparison analysis – Discerning motive – Attacker kill chain analysis – Malicious actor profile checklist – Naming conventions for malicious actors

More resources

Guide

Ultimate Guide to Crowdsourced Security for Financial Services Organizations

Read More
eBooks

Get to know our pentesters

Read More
eBooks

Get to know the Crowd

Read More

Get Started with Bugcrowd

Every minute that goes by, your unknown vulnerabilities leave you more exposed to cyber attacks.