Phishing Emails and Web Exploits: Detection Walkthrough
Kelly Lehman
Runtime: 26:23
Phishing emails and web exploits are prevalent modes of attack encountered by all organizations. This session examines artifacts related to them, such as drive-by downloads, and focuses on telling the story with events, triage methods and scoping the campaign. Learn what data a host search, and process and host timelines, can provide and how to efficiently acquire that data. You will also learn how to navigate from a detection to an event search (Splunk) and the additional data it provides.
Please provide your feedback and be entered to win $300 on items from the CrowdStrike Swag Store! Winner will be contacted via email.
Related Videos
Frictionless Zero Trust
Security Strategy, Architecture & Operations
Frictionless Zero Trust
Multiple Speakers
CrowdStrike
18:01
Metrics That Matter: From SecOps to the Boardroom – Explaining the Risk & Impact on the Company so Everyone Understands
Security Strategy, Architecture & Operations
Metrics That Matter: From SecOps to the Boardroom – Explaining the Risk & Impact on the Company so Everyone Understands
Multiple Speakers
Consortium networks
13:14
How Does OT Security Evolve from Bolted On to Built In? Bridging the Relationship Gap to Build a Business-aligned OT Security Program
Security Strategy, Architecture & Operations
How Does OT Security Evolve from Bolted On to Built In? Bridging the Relationship Gap to Build a Business-aligned OT Security Program
Doug Clifton
EY
30:25
{Will be replaced by the modal content}