Request a Demo Contact Us
Bring the power of crowdsourcing to red teams with Bugcrowd RTaaS!
Learn More

Profiling the Attacker – Using Offender Profiling In SOC Environments

 

It’s been said ‘‘Intrusion analysis is as much about tcpdump as astronomy is about telescopes”. Understanding who is attacking your or a customer’s network and why is just as important as analyzing the packets on it. This slot will focus on a technical offender profiling framework that can be used to build a knowledge base on malicious actors. This talk will delve into the following areas: – Building an information classification for your assets – Attack significance plotting – Attack factor comparison analysis – Discerning motive – Attacker kill chain analysis – Malicious actor profile checklist – Naming conventions for malicious actors

More resources

Guide

Ultimate Guide to Crowdsourced Security in the Public Sector

Read More
eBooks

Ultimate Guide to Red Teaming

Read More
Guide

Guide to Working with Hackers

Read More

Get Started with Bugcrowd

Every minute that goes by, your unknown vulnerabilities leave you more exposed to cyber attacks.