Detection Engineering: The Blue Team Cheat Code | Host: Mark Orlando | September 12, 2023

Subscribers:
64,000
Published on ● Video Link: https://www.youtube.com/watch?v=jL44ZbEUwr8



Category:
Guide
Duration: 52:41
1,730 views
75


Detection engineering requires a unique combination of technical skills, threat research, and scientific method. Done properly, it allows us to better sift through the noise and identify information we can use to save time and manual effort.\n \nIn this episode of Wait Just an Infosec, SANS Certified Instructor Mark Orlando welcomes Zack Allen and Scott Poley, experts in the field, for a discussion on common challenges in detection engineering, what it takes to get started, and why detection engineering done well can be your blue team “cheat code!”\n\nLearn more about Wait Just an Infosec: sans.org/wjai

___________________________
2023 SANS Survey: Detection Engineering

There are two cybersecurity truisms: You can’t prevent attacks you can’t detect and Attacks you can’t prevent turn into incidents you need to detect before you can respond to them. In our latest SANS survey, we will gather data on the state of the practice in “detection engineering” and provide guidance on how to improve your capabilities in keeping up with rapidly changing threats. Share your thoughts with us for a chance to win a $250 Amazon gift card!

Take the survey: https://survey.sans.org/jfe/form/SV_3LeCYmgjWSALNmC\n\n#WJAI #InfoSec #Cybersecurity #BlueTeamers #CyberDefense #WaitJustAnInfoSec #InformationSecurity #DetectionEngineering




Other Videos By SANS Institute


2023-10-02SANS Institute
2023-09-28Tackling Cyber Threats in Healthcare | 2023 SANS Healthcare Forum
2023-09-26Cybersecurity Catalysts: The Difference Makers | Host: Rob T. Lee
2023-09-22What's new with SANS SEC301 Introduction to Cyber Security?
2023-09-21SANS Threat Analysis Rundown (STAR) | Live Stream
2023-09-20Cybersecurity Standards Scorecard | 2023 Edition
2023-09-19Threat Actor Tool Analysis at Enterprise Scale | Host: Ryan Chapman | September 19, 2023
2023-09-18You came with *that* plan? You're braver than I thought!
2023-09-18FEATURE SEGMENT: Detection Engineering: The Blue Team Cheat Code
2023-09-14SANS Cyber Defense Initiative® 2023 in Washington, DC
2023-09-12Detection Engineering: The Blue Team Cheat Code | Host: Mark Orlando | September 12, 2023
2023-09-05CryptOSINT | Host: Sadie Gauthier | September 5, 2023
2023-08-31SANS Threat Analysis Rundown (STAR) with Katie Nickels | August 2023
2023-08-31FEATURE SEGMENT: Inside SANS Holiday Hack Challenge 2023 | Host: Ed Skoudis
2023-08-29Inside SANS Holiday Hack Challenge 2023 | Host: Ed Skoudis | August 29, 2023
2023-08-22In Hot Pursuit: Tracking Ransomware Actors | Ryan Chapman | Aug 22, 2023
2023-08-17Analysis on legit tools abused in human-operated ransomware
2023-08-17Lessons from the Frontlines: Ransomware Attacks, New Techniques, and Old Tricks
2023-08-17Panel | Going Dark: DOS’ing Yourself for the Better
2023-08-17Cracking Ransomware: Bypassing Anti-Analysis Techniques and Decrypting LockBit Black Ransomware
2023-08-17Jackpot! Three Years Of ESXi Ransomware Incidents



Tags:
detection engineering training
detection engineering
cyber defense operations
cyber security operations center
security operations center (soc)
security operations center - soc training
cybersecurity training
information security training
information security course
security operations analyst