It Happened: Now What?

When the attack happens, what do you do? Incident response and malware are the focus of today's quartet of Black Hat USA 2013 Trainings, and they aim to give you the skills you'll need to properly respond to incidents large and small.

Verizon's 2013 DBIR indicates that forty percent of breaches involved malware, and rapid analysis often falls to incident responders. Malware Analysis: Black Hat Edition provides a rapid intro to the tools and methodologies of Windows malware analysis. Attendees will learn how to observe malware's actions through disassembly and debugging, extract host and network-based indicators, and zeroing in on the Windows APIs most used by malware authors. Hands-on labs will abound, and everyone will receive a copy of Mike Sikorski's "Practical Malware Analysis."

Despite the staggering number of reported breaches in the past year, the typical IT staffer lacks the necessary and specialized training to properly respond. Digital Forensics and Incident Response takes up that slack, offering attendees both the theory behind digital forensics and hands-on experience with real-life situations and evidence. Upon the Training's completion, students will be able to effectively preserve and analyze a large number of digital evidence sources, skills that are immediately useful in a number of investigative scenarios.

More experienced attendees may prefer Network Forensics: Black Hat Release, an advanced-level Training that will touch on a dizzying array of network forensics topics and techniques. Taught by the authors of "Network Forensics: Tracking Hackers Through Cyberspace," the Training will teach packet analysis, statistical flow record analysis, wireless forensics, intrusion detection and analysis, network tunneling, malware network behavior, and more over four days of lecture and hands-on labs. Attendees will also receive exclusive, fully loaded portable forensics workstations.

Finally, Incident Response: Black Hat Edition is a special two-day Training that covers the fundamental and cutting-edge data collection and analysis techniques InfoSec pros need to investigate increasingly complex intrusion scenarios. The class is presented by Mandiant, well-known for its Incident Response coursework, and features case studies and hands-on lab exercises tailored to the latest real-world attack scenarios identified by Mandiant's investigators. By the end, attendees will know how to "scope" an incident, conduct rapid triage on potentially affected systems, detect attackers' attempts to manipulate evidence, and much more.

It's fair to say Black Hat USA 2013's Trainings have the incident response angle covered, yes? Be sure to check back next week for word on more key Trainings, Workshops, and Sessions, and keep an eye on the social:

Linked in

Sustaining Partners