If iTunes and Google Play aren't your thing, click here.
Recorded Jan. 31, 2020
When a vulnerability is released, regardless if it has a website and logo or not, we need to understand the risk to the network and what defense options are possible before the patch is ready for production. Can you defend against the vulnerability or do you go straight for known exploits? What happens if an exploit occurs? Also discussed: Talos begins releasing Threat Assessment Reports based on IR engagement data and known prevalent threats. Snort has a new series of training and lab video available for Snort 2 and Snort3.
The timeline:
01:00 – Roundtable: It’s really more of a pirate parlay this go round
08:30 – What Grinds my Gears with Craig: Vendor reports without filters and context
12:50 – Addressing vulnerabilities: Understand the risk and assess your options pre-patch
29:00 – Talos Threat Assessment Reports (TAR): Looking at IR Trends from the last quarter
35:45 – New Snort 2 and Snort 3 training videos
39:25 – Closing thoughts and parting shots
Links and resources:
==========
Support the originator by clicking the read the rest link below.