00:00 - Introduction01:22 - The Scenario02:50 - First Steps03:48 - Endpoint Analysis Roll04:22 - Logon Scripts Were installed05:09 - I.R. Team Introductions07:17 - Second Step10:32 - Network Threat Hunting Roll11:36 - Third Step15:12 - Anyway Here’s Firewall Roll15:43 - Fourth Step18:26 - SIEM Roll19:41 - Fifth Step20:47 - UEBA Roll21:19 - Senario Recap22:20 - Senario Plausibility?25:51 - Wrap-up Takeaways
00:00 - Introduction
01:22 - The Scenario
02:50 - First Steps
03:48 - Endpoint Analysis Roll
04:22 - Logon Scripts Were installed
05:09 - I.R. Team Introductions
07:17 - Second Step
10:32 - Network Threat Hunting Roll
11:36 - Third Step
15:12 - Anyway Here’s Firewall Roll
15:43 - Fourth Step
18:26 - SIEM Roll
19:41 - Fifth Step
20:47 - UEBA Roll
21:19 - Senario Recap
22:20 - Senario Plausibility?
25:51 - Wrap-up Takeaways
A weekly Podcast with BHIS and Friends. We discuss notable Infosec, and infosec-adjacent news stories gathered by our community news team.
Join us live on YouTube, Monday's at 4:30PM ET