Threat Intelligence Field of Dreams

Principal Cloud Security Researcher at Lacework Labs
May. 15, 2016
Threat Intelligence Field of Dreams
Threat Intelligence Field of Dreams
Threat Intelligence Field of Dreams
Threat Intelligence Field of Dreams
Threat Intelligence Field of Dreams
Threat Intelligence Field of Dreams
Threat Intelligence Field of Dreams
Threat Intelligence Field of Dreams
Threat Intelligence Field of Dreams
Threat Intelligence Field of Dreams
Threat Intelligence Field of Dreams
Threat Intelligence Field of Dreams
Threat Intelligence Field of Dreams
Threat Intelligence Field of Dreams
Threat Intelligence Field of Dreams
Threat Intelligence Field of Dreams
Threat Intelligence Field of Dreams
Threat Intelligence Field of Dreams
Threat Intelligence Field of Dreams
Threat Intelligence Field of Dreams
Threat Intelligence Field of Dreams
Threat Intelligence Field of Dreams
Threat Intelligence Field of Dreams
Threat Intelligence Field of Dreams
Threat Intelligence Field of Dreams
Threat Intelligence Field of Dreams
Threat Intelligence Field of Dreams
Threat Intelligence Field of Dreams
Threat Intelligence Field of Dreams
Threat Intelligence Field of Dreams
Threat Intelligence Field of Dreams
Threat Intelligence Field of Dreams
Threat Intelligence Field of Dreams
Threat Intelligence Field of Dreams
Threat Intelligence Field of Dreams
Threat Intelligence Field of Dreams
Threat Intelligence Field of Dreams
Threat Intelligence Field of Dreams
Threat Intelligence Field of Dreams
Threat Intelligence Field of Dreams
Threat Intelligence Field of Dreams
Threat Intelligence Field of Dreams
Threat Intelligence Field of Dreams
Threat Intelligence Field of Dreams
Threat Intelligence Field of Dreams
Threat Intelligence Field of Dreams
Threat Intelligence Field of Dreams
Threat Intelligence Field of Dreams
Threat Intelligence Field of Dreams
Threat Intelligence Field of Dreams
Threat Intelligence Field of Dreams
Threat Intelligence Field of Dreams
Threat Intelligence Field of Dreams
Threat Intelligence Field of Dreams
Threat Intelligence Field of Dreams
Threat Intelligence Field of Dreams
Threat Intelligence Field of Dreams
Threat Intelligence Field of Dreams
Threat Intelligence Field of Dreams
Threat Intelligence Field of Dreams
Threat Intelligence Field of Dreams
Threat Intelligence Field of Dreams
Threat Intelligence Field of Dreams
Threat Intelligence Field of Dreams
Threat Intelligence Field of Dreams
Threat Intelligence Field of Dreams
Threat Intelligence Field of Dreams
Threat Intelligence Field of Dreams
Threat Intelligence Field of Dreams
Threat Intelligence Field of Dreams
1 of 70

More Related Content

What's hot

Avoiding the Pitfalls of Hunting - BSides Charm 2016Avoiding the Pitfalls of Hunting - BSides Charm 2016
Avoiding the Pitfalls of Hunting - BSides Charm 2016Tony Cook
Practical White Hat Hacker Training -  Passive Information Gathering(OSINT)Practical White Hat Hacker Training -  Passive Information Gathering(OSINT)
Practical White Hat Hacker Training - Passive Information Gathering(OSINT)PRISMA CSI
Deploying, Managing, and Leveraging Honeypots in the Enterprise using Open So...Deploying, Managing, and Leveraging Honeypots in the Enterprise using Open So...
Deploying, Managing, and Leveraging Honeypots in the Enterprise using Open So...Jason Trost
Utilizing OSINT in Threat Analytics and Incident ResponseUtilizing OSINT in Threat Analytics and Incident Response
Utilizing OSINT in Threat Analytics and Incident ResponseChristopher Beiring
Threat hunting - Every day is hunting seasonThreat hunting - Every day is hunting season
Threat hunting - Every day is hunting seasonBen Boyd
Deception Driven Defense - Infragard 2016Deception Driven Defense - Infragard 2016
Deception Driven Defense - Infragard 2016Greg Foss

What's hot(20)

Viewers also liked

Physically Unclonable Random PermutationsPhysically Unclonable Random Permutations
Physically Unclonable Random PermutationsRiccardo Bernardini
Rtos amebaRtos ameba
Rtos amebaJou Neo
A Threat Hunter HimselfA Threat Hunter Himself
A Threat Hunter HimselfSergey Soldatov
PHDays '14   Cracking java pseudo random sequences by egorov & soldatovPHDays '14   Cracking java pseudo random sequences by egorov & soldatov
PHDays '14 Cracking java pseudo random sequences by egorov & soldatovSergey Soldatov
Generalized Elias Schemes for Truly Random BitsGeneralized Elias Schemes for Truly Random Bits
Generalized Elias Schemes for Truly Random BitsRiccardo Bernardini
Io t security-ameba-pptIo t security-ameba-ppt
Io t security-ameba-pptJou Neo

Similar to Threat Intelligence Field of Dreams

All your logs are belong to you!All your logs are belong to you!
All your logs are belong to you!Security BSides London
All Your Security Events Are Belong to ... You!All Your Security Events Are Belong to ... You!
All Your Security Events Are Belong to ... You!Xavier Mertens
Cyber threat-hunting---part-2-25062021-095909pmCyber threat-hunting---part-2-25062021-095909pm
Cyber threat-hunting---part-2-25062021-095909pmMuhammadJalalShah1
Computer Forensics – What Every Lawyer Needs to KnowComputer Forensics – What Every Lawyer Needs to Know
Computer Forensics – What Every Lawyer Needs to KnowWinston & Strawn LLP
Operational Security IntelligenceOperational Security Intelligence
Operational Security IntelligenceSplunk
Information security - what is going on 2016Information security - what is going on 2016
Information security - what is going on 2016Tomppa Järvinen

More from Greg Foss

Cloud Crime OpsCloud Crime Ops
Cloud Crime OpsGreg Foss
Future of Destructive MalwareFuture of Destructive Malware
Future of Destructive MalwareGreg Foss
Crypto Hacks - Quit your Job and Become a Crypto FarmerCrypto Hacks - Quit your Job and Become a Crypto Farmer
Crypto Hacks - Quit your Job and Become a Crypto FarmerGreg Foss
PIE - BSides Vancouver 2018PIE - BSides Vancouver 2018
PIE - BSides Vancouver 2018Greg Foss
Security Automation and OrchestrationSecurity Automation and Orchestration
Security Automation and OrchestrationGreg Foss
SecureSet WarGames - Logging and Packet Capture TrainingSecureSet WarGames - Logging and Packet Capture Training
SecureSet WarGames - Logging and Packet Capture TrainingGreg Foss

Recently uploaded

Experts Live Europe 2023 - Ensure your compliance in Microsoft Teams with Mic...Experts Live Europe 2023 - Ensure your compliance in Microsoft Teams with Mic...
Experts Live Europe 2023 - Ensure your compliance in Microsoft Teams with Mic...Jasper Oosterveld
Product Research Presentation-Maidy Veloso.pptxProduct Research Presentation-Maidy Veloso.pptx
Product Research Presentation-Maidy Veloso.pptxMaidyVeloso
Mitigating Third-Party Risks: Best Practices for CISOs in Ensuring Robust Sec...Mitigating Third-Party Risks: Best Practices for CISOs in Ensuring Robust Sec...
Mitigating Third-Party Risks: Best Practices for CISOs in Ensuring Robust Sec...TrustArc
Product Research Presentation-Maidy Veloso.pptxProduct Research Presentation-Maidy Veloso.pptx
Product Research Presentation-Maidy Veloso.pptxMaidyVeloso
Netwitness RT - Don’t scratch that patch.pptxNetwitness RT - Don’t scratch that patch.pptx
Netwitness RT - Don’t scratch that patch.pptxStefano Maccaglia
Orchestration, Automation and Virtualisation Maturity ModelOrchestration, Automation and Virtualisation Maturity Model
Orchestration, Automation and Virtualisation Maturity ModelCSUC - Consorci de Serveis Universitaris de Catalunya

Recently uploaded(20)

Threat Intelligence Field of Dreams