50 likes | 73 Vues
Learn how to determine compromised data, map network flows, analyze sources, conduct malware analysis, leverage intelligence, and coordinate with law enforcement for a thorough incident response. Presented by Eric Gentry and Christopher J. Novak from Verizon Business.
E N D
IR/Forensics Team Tactics PanelBest Incident Response and Forensics Techniques Eric Gentry Christopher J Novak eric.gentry@verizonbusiness.com chris.novak@verizonbusiness.com
Quickly Determining What Type of Data Was Compromised Know What/Where Sensitive Data Resides in Environment Network Diagram Map Data Flows Forensic Analysis Identify / Analyze Corroborating Sources Netflows, IDS and Firewall Logs, etc. Web Server Logs Database Content
Determining How a Breach Occurred Malware Analysis Analysis in Sandbox Environment IP Addresses Filenames, Processes Hacker Handles Leverage Other Intelligence Sources Underground Monitoring Coordination with Law Enforcement e.g. Known Information Black Market forums Circumstantial Evidence Overall Security Posture
Identify Malware on Hosts Forensic Analysis Known Keywords Analysis of File Times/Dates Known “Bad” IP Addresses Known Malware Hash Values Other Evidence Sources Web Server Logs Application Logs
Thank You Eric Gentry Christopher J Novak eric.gentry@verizonbusiness.com chris.novak@verizonbusiness.com