Part 1 - The Achilles Systems Hack Assessment Series: Breach or Blueprint?

  Рет қаралды 463

SANS Institute

SANS Institute

Ай бұрын

Achilles Systems, a fictitious IT service provider to human resources teams in medium and large businesses, has fallen victim to an attack in which sensitive customer data and, potentially, customer networks, have been compromised. Achilles has a small security team who has historically focused on basic controls and compliance. However, it seems clear this attack was the work of a sophisticated adversary capable of circumventing the controls in place.
Much of Achilles' security has not been maintained since an initial push many years ago, and newer controls were bypassed or disabled by the attacker. Some examples of these are multi-factor authentication, which the attacker bypassed in part by impersonating a Achilles executive in a call to the Service Desk. Later in the intrusion, the attacker disabled Achilles' endpoint detection and response agents while moving through the internal network. Once the attacker achieved access, they quickly moved to systems containing sensitive data and parts of the network where direct customer access was possible.
As Achilles works to recover from the attack and regain customer trust, it seeks to invest in a more advanced defense able to withstand a more capable and determined attacker. Achilles management is committed to revisiting its security controls, devising better ways to proactively identify and remediate vulnerabilities, and investing in ongoing efforts to identify and respond to attacks before the damage is done.
Part 1 of 4
In this webcast, we will quickly review the breach at Achilles Systems and discuss why their existing security capabilities weren't enough to prevent the attack from being successful. We will then discuss a blueprint for continuous detection and response via security operations, and how Achilles might leverage the lessons learned from this breach to combat even the most sophisticated attacker in the future. We will cover topics such as:
SOC planning and functional design including people, process, and technology
Using intelligence to build collection, detection, and response capabilities
Incident detection and response
This webcast supports concepts from LDR551: Building and Leading Security Operations Centers. Learn more: www.sans.org/cyber-security-c...
Learn more about the Operational Triad: www.sans.org/cybersecurity-le...

Пікірлер
Cybersecurity and Zero Trust
17:59
IBM Technology
Рет қаралды 80 М.
ВОДА В СОЛО
00:20
⚡️КАН АНДРЕЙ⚡️
Рет қаралды 28 МЛН
Llegó al techo 😱
00:37
Juan De Dios Pantoja
Рет қаралды 52 МЛН
Best KFC Homemade For My Son #cooking #shorts
00:58
BANKII
Рет қаралды 61 МЛН
Understanding the New NIS2 Directive: Compliance for EU Businesses
50:27
Best Practices for Generative AI Risk Management and Prevention
1:00:20
Robust Intelligence
Рет қаралды 1,9 М.
EDR, MDR & XDR Explained
10:33
Pro Tech Show
Рет қаралды 33 М.
Cybersecurity Architecture: Five Principles to Follow (and One to Avoid)
17:34
A TYPICAL Day in the LIFE of a SOC Analyst
1:01:55
TechTual Chatter
Рет қаралды 114 М.
The moment we stopped understanding AI [AlexNet]
17:38
Welch Labs
Рет қаралды 782 М.
BEKMOBILDA Tecno Camon 30 smartfoni🔥🤩 #bekmobil
1:01
Bekmobil shorts
Рет қаралды 2,3 МЛН
Cheapest gaming phone? 🤭 #miniphone #smartphone #iphone #fy
0:19
Pockify™
Рет қаралды 4,4 МЛН