0% found this document useful (0 votes)
37 views22 pages

Combating Exploit Kits m11 Slides PDF

The document discusses customizing cybersecurity reports for different audiences, specifically from a researcher's perspective to a Chief Information Security Officer (CISO). It covers topics such as reporting data, findings, and remediation plans, along with the importance of actionable insights. Additionally, it touches on malware analysis and the need for effective communication of technical details.

Uploaded by

Abdul Qadeer
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
37 views22 pages

Combating Exploit Kits m11 Slides PDF

The document discusses customizing cybersecurity reports for different audiences, specifically from a researcher's perspective to a Chief Information Security Officer (CISO). It covers topics such as reporting data, findings, and remediation plans, along with the importance of actionable insights. Additionally, it touches on malware analysis and the need for effective communication of technical details.

Uploaded by

Abdul Qadeer
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 22

Customizing Reports: Researcher to

CISO

Dr. Jared DeMott


SECURITY RESEARCHER AND ENGINEER

@jareddemott www.vdalabs.com
Overview
Recap
Reporting
- Data
- Written
Tesla fix?
- Yes, for versions 1-2
- 3-4, not so much
• Key destroyed in memory
§ Kept on the server side and
delivered only after payment
Common malware
A next-gen endpoint protection platform
Initial infection vector
Deobfuscation
Dynamic and static analysis
Reporting
Report Findings
High level summary
Technical details
Remediation plan
Attribution?
- Five W’s
Actionable?
Integrate into
security controls
Search (IR)
https://www.us-cert.gov/Information-Sharing-Specifications-Cybersecurity
Summary
Finished filling in the malware template
- Place it where?

You might also like