From Breach to Blueprint: Building a Resilient Future

By Amit Ghodekar on 28 Nov 2024 @ Blackhat
🔗 Link
incident-response vulnerability-management pentesting threat-hunting threat_modeling security-architecture
Focus Areas: Defensive Security , Incident Response , Penetration Testing , Security Architecture , Threat Intelligence , Vulnerability Management

Abstract

Cyberattacks are no longer isolated incidents but interconnected chapters in an ongoing narrative. This session dissects high-profile breaches to extract actionable intelligence for building robust defenses. We’ll examine the evolution of attack methodologies, from early-stage reconnaissance to post-exploitation phases. By understanding adversary tactics, techniques, and procedures (TTPs), attendees will gain insights into the mindset of the attacker. The session will delve into specific case studies, demonstrating how to convert breach data into actionable intelligence. Ultimately, we’ll explore how to translate these lessons into a comprehensive security strategy, encompassing threat intelligence, incident response, and vulnerability management. Attendees will leave equipped with practical frameworks to transform past failures into future-proof security blueprints.