How Was that Breach Detected?

Logo
Presented by

Jeff Hamm, Technical Director, Mandiant

About this talk

Mandiant has done thousands of IR investigations across multiple industry types and networks. In each case, the customer was either altered by a third party about the breach or discovered something “not quite right” in the network. In several cases the alerts the customer discovered led to discovery of a targeted attacker in the environment - and a subsequent incident response investigation. In this presentation, we will use international case examples Mandiant investigated to take a closer look at how the breach was discovered and what security lessons can be learned from the alerts - for example how a performance monitor on a domain controller spiked, which led to discovery of credential harvesting. The take away will be actionable in many environments.
Related topics:

More from this channel

Upcoming talks (4)
On-demand talks (367)
Subscribers (120093)
Mandiant is a recognized leader in dynamic cyber defense, threat intelligence and incident response services. By scaling decades of frontline experience, Mandiant helps organizations to be confident in their readiness to defend against and respond to cyber threats. Mandiant is now part of Google Cloud.