Our presentation from 44con Cyber Security on April 28th 2015 discussing how we use public cyber data and some of the problems we have run into.
Jointly presented with Ernest Li.
5. 5
High-level
Information on
changing risk
The board
Details of a specific
Incoming attack
Defenders
Attacker
Methodologies,
Tools and tactics
Architects &
Sysadmins
Indicators of
Specific malware
SOC staff / IR
Long-TermUseShort-TermUse
Low LevelHigh Level