Security Reporting
Threat Hunting
Phishing/Email Security Controls
How many phishing emails we are receiving
How many detected by our email security control
How many reported by Knowbe4
How many missed by our security controls
What kind of emails
What are TTP's
What's our remediation
What kind of attacks we are targeted with
How we are doing email header analysis
How we are stopping BEC scam's
With whom we are sharing threat intel
Who/which APT groups targeting Transport industry(especially airports)
Upon our monthly review, what kind of recommendations can we give to Gary to run Phishing email training campaign (template selection)
Network/IOT/OT/SCADA
Detect persistence mechanisms
Detect data exfiltrate
Detect deployment of payloads (ransomware)
Detect DDOS
Identify Cloud Assets
Continuous asset discovery
Risk Analysis
What are our threats ?
Where is our weakest link ?
Who targets us ?
What are critical applications for our org and operations ?
How fast can we restore services ?
What is our incident response plan ?
Cyber Gaps/Investigations:
Misconfigured firewall rules
Azure DC
Vcenter server
Which schedule tasks running
RDP connections
SSH Tunneling
Git hub plain test passwords
Lack of SSL internal applications
Multi cloud presence
Attack/Threat vector
Azure AD
Azure ADFS
Internal Pentest and Adversary Emulation: Run Responder/similar tools internally
Atomic Red simulation:
Create vm instance
Install aw
Install syslog
Threat Research Integration:
-Tools
https://msticpy.readthedocs.io/en/latest/
Key Logger
Research
Last updated
Was this helpful?