Video On Demand
Phishing Emails and Web Exploits: Detection Walkthrough
Kelly Lehman
Kelly Lehman
Runtime: 26:23
Phishing emails and web exploits are prevalent modes of attack encountered by all organizations. This session examines artifacts related to them, such as drive-by downloads, and focuses on telling the story with events, triage methods and scoping the campaign. Learn what data a host search, and process and host timelines, can provide and how to efficiently acquire that data. You will also learn how to navigate from a detection to an event search (Splunk) and the additional data it provides.

Related Videos

Security Strategy, Architecture & Operations Frictionless Zero Trust
Multiple Speakers CrowdStrike 18:01
Security Strategy, Architecture & Operations Metrics That Matter: From SecOps to the Boardroom – Explaining the Risk & Impact on the Company so Everyone Understands
Multiple Speakers Consortium networks 13:14
Security Strategy, Architecture & Operations How Does OT Security Evolve from Bolted On to Built In? Bridging the Relationship Gap to Build a Business-aligned OT Security Program
Doug Clifton EY 30:25