The Enterprise's New Clothes: Fashionable IR Techniques

By DePaul Security Daemons

The Enterprise's New Clothes: Fashionable IR Techniques

Title: The Enterprise's New Clothes: Fashionable IR Techniques Abstract: When advanced attackers decide to target an organization's digital assets, they don't limit the scope of the compromise to make things easier for investigators later on. With potentially thousands of systems in an enterprise environment affected by a compromise, it is neither feasible nor desirable to perform dead disk forensics on every system that an attacker has accessed. During this presentation, Jay Taylor (Mandiant, IASE 2013) and James Espinosa (Mandiant, IASE 2013) will discuss the mindset and techniques that incident response professionals leverage to efficiently scale their investigations across modern enterprise environments.

  • 528