Waiting for a cyber range exercise is not enough | SANS@MIC Talk

Subscribers:
64,000
Published on ● Video Link: https://www.youtube.com/watch?v=AWXHCiVsrQw



Duration: 1:00:09
424 views
7


In this talk, Olaf will elaborate on typical tasks related to incident response and why it is possible to practice them without the need for complex cybersecurity ranges or cybersecurity drills. He will also discuss what cyber ranges should be used for and why they should not be the starting point in preparing for incident response.

Speaker Bio
Olaf Schwarz joined nic.at in March 2017 and serves as a Senior IT Security Analyst for the Austrian Energy CERT and CERT.at, the national CERT of Austria. Beforehand he worked with national and international scope in the field of Information Security within the finance sector. In this time, Olaf worked on InfoSec daily business challenges and in various projects, like launching and securing an in-house developed core banking system, working on corporate wide security standards/architectures and developing and running awareness programs for employees and customers.

Olaf started as an autodidact in Information Security, and meanwhile about 10 years of experience in the field, Olaf added a bunch of security related certifications to his CV. Olaf helped organize BSidesVienna from 2013 to 2019 as a way to give back to the security community. Further he tries to give back to the community by publishing tools like smbtimeline, a tool to generate typical text-based timelines out of SMB traffic, and sharing experience through free-to-access talks.




Other Videos By SANS Institute


2020-06-18Maldocs: A Bit of Blue, A Bit of Red | SANS@MIC Talk
2020-06-18Catch and Release: Phishing Techniques for the Good Guys | SANS@MIC Talk
2020-06-16Arcane Web and Mobile Application Vulnerabilities | SANS@MIC Talk
2020-06-16A Walk Through Logs Hell | SANS@MIC Talk
2020-06-12Shellcode Analysis 101 | SANS@MIC Talk
2020-06-09SANS Live Online Interactive Remote Lab and Range Demo – SEC599: Defeating Advanced Adversaries
2020-06-09SANS Live Online Interactive Local Lab Demo – FOR508: Advanced Incident Response
2020-06-09SANS Live Online Interactive Live Lab Environment Demo: Slack, Local and Remote Lab Demonstrations
2020-06-09CYA by Using CIA -- Correctly For a Change | SANS@MIC Talk
2020-06-09Remote Forensic Investigations in the Context of COVID-19 | SANS@MIC Talk
2020-06-05Waiting for a cyber range exercise is not enough | SANS@MIC Talk
2020-06-03Case Study: Airbus
2020-06-02WinSCP: Yeah you know me! | SANS@MIC Talk
2020-05-28Prioritizing OT Security Efforts: The Five Tactical Things to Accomplish | SANS@MIC Talk
2020-05-28Introduction to Docker for security work | SANS@MIC Talk
2020-05-27Threat Hunting and the Rise of Targeted eCrime Intrusions | STAR Webcast
2020-05-21Moving Past Just Googling It: Harvesting and Using OSINT | SANS@MIC Talk
2020-05-20Find_Evil - Threat Hunting | SANS@MIC Talk
2020-05-18Tricking modern endpoint security products | SANS@MIC Talk
2020-05-18Modern Domain Deception - The risk, issues and potentiality | SANS@MIC Talk
2020-05-14Cloud Native Payloads: A Matryoshka Doll of Exploits | SANS@MIC Talk



Tags:
sans institute
information security
cyber security
cybersecurity
information security training
cybersecurity training
cyber security training
cyber range