160x Filetype PPTX File size 2.03 MB Source: cybersecmentorship.org
Cybersecurity is a team sport 08/26/2022 Created by Noureen Njoroge | Cybersecurity Consulting Engineer Cisco Systems | Global Mentoring Ep#10 Slides • Independent OPFOR “opposing force” • (0rganic groups that challenge the org to improve its effectiveness by pretending to be the opposing force) The RED • They are also known as Alternative analysis: Teaming Where the team test the assumptions of the org and potentially expose the weaknesses. They are experienced security professional that often perform pen testing in accordance of rules of engagement of the organization. 08/26/2022 Created by Noureen Njoroge | Cybersecurity Consulting Engineer Cisco Systems | Global Mentoring Ep#10 Slides 08/26/2022 Created by Noureen Njoroge | Cybersecurity Consulting Engineer Cisco Systems | Global Mentoring Ep#10 Slides What makes a Blue Team vs. just doing defensive The BLUE things is the mentality. Team The distinction is as follows • A proactive vs. reactive mindset • Endless curiosity regarding things that are out of the ordinary • Continuous improvement in detection and response • It’s not about whether someone is a self-taught tier-1 SOC analyst or some hotshot former Red Teamer from Carnegie Mellon. It’s about curiosity and a desire to constantly improve. 08/26/2022 Created by Noureen Njoroge | Cybersecurity Consulting Engineer Cisco Systems | Global Mentoring Ep#10 Slides • What makes a blue team different is that once a red team imitates an attacker and attacks with characteristic tactics and techniques, a blue team is there to find ways to defend, change and re-group defense mechanisms to make incident response much stronger. • The BLUE Team needs to be aware of the same malicious tactics, techniques and procedures in order to build response strategies around them. And blue team activity isn’t exclusive to attacks. They’re continuously involved to The BLUE strengthen the entire digital security infrastructure, using software like an IDS (intrusion detection system) that Team provides them with an ongoing analysis of unusual and suspicious activity. • Some tasks include: DDOS Testing, tabletop exercises, Reverse engineer, events logs analysis, security audits etc.. 08/26/2022 Created by Noureen Njoroge | Cybersecurity Consulting Engineer Cisco Systems | Global Mentoring Ep#10 Slides
no reviews yet
Please Login to review.