Customizing Reports: Researcher to
CISO
Dr. Jared DeMott
SECURITY RESEARCHER AND ENGINEER
@jareddemott www.vdalabs.com
Overview
Recap
Reporting
- Data
- Written
Tesla fix?
- Yes, for versions 1-2
- 3-4, not so much
• Key destroyed in memory
§ Kept on the server side and
delivered only after payment
Common malware
A next-gen endpoint protection platform
Initial infection vector
Deobfuscation
Dynamic and static analysis
Reporting
Report Findings
High level summary
Technical details
Remediation plan
Attribution?
- Five W’s
Actionable?
Integrate into
security controls
Search (IR)
https://www.us-cert.gov/Information-Sharing-Specifications-Cybersecurity
Summary
Finished filling in the malware template
- Place it where?