Presentation is loading. Please wait.

Presentation is loading. Please wait.

Confidential and proprietary material for authorized Verizon Business personnel only. Use, disclosure or distribution of this material is not permitted.

Similar presentations


Presentation on theme: "Confidential and proprietary material for authorized Verizon Business personnel only. Use, disclosure or distribution of this material is not permitted."— Presentation transcript:

1 Confidential and proprietary material for authorized Verizon Business personnel only. Use, disclosure or distribution of this material is not permitted to any unauthorized persons or third parties except by written agreement. IR/Forensics Team Tactics Panel Best Incident Response and Forensics Techniques Eric GentryChristopher J Novak eric.gentry@verizonbusiness.com chris.novak@verizonbusiness.com

2 Confidential and proprietary material for authorized Verizon Business personnel only. Use, disclosure or distribution of this material is not permitted to any unauthorized persons or third parties except by written agreement. Quickly Determining What Type of Data Was Compromised Know What/Where Sensitive Data Resides in Environment  Network Diagram  Map Data Flows Forensic Analysis Identify / Analyze Corroborating Sources  Netflows, IDS and Firewall Logs, etc.  Web Server Logs  Database Content

3 Confidential and proprietary material for authorized Verizon Business personnel only. Use, disclosure or distribution of this material is not permitted to any unauthorized persons or third parties except by written agreement. Determining How a Breach Occurred Malware Analysis  Analysis in Sandbox Environment  IP Addresses  Filenames, Processes  Hacker Handles Leverage Other Intelligence Sources  Underground Monitoring  Coordination with Law Enforcement  e.g. Known Information Black Market forums Circumstantial Evidence  Overall Security Posture

4 Confidential and proprietary material for authorized Verizon Business personnel only. Use, disclosure or distribution of this material is not permitted to any unauthorized persons or third parties except by written agreement. Identify Malware on Hosts Forensic Analysis  Known Keywords  Analysis of File Times/Dates  Known “Bad” IP Addresses  Known Malware Hash Values Other Evidence Sources  Web Server Logs  Application Logs

5 Confidential and proprietary material for authorized Verizon Business personnel only. Use, disclosure or distribution of this material is not permitted to any unauthorized persons or third parties except by written agreement. Thank You Eric GentryChristopher J Novak eric.gentry@verizonbusiness.com chris.novak@verizonbusiness.com


Download ppt "Confidential and proprietary material for authorized Verizon Business personnel only. Use, disclosure or distribution of this material is not permitted."

Similar presentations


Ads by Google