Designing security scenarios for capturing suspicious activities - yes it's possible

Most of the applications are fully of bugs or maintenance hooks. In opposition to reverse engineering there is proper log designing process which allow to model security scenarios for detection hacking activities in heterogeneous application environment. During the lecture, interested will learn about:

- How proper application logs should be designed;

- How to create security scenarios for detection suspicious processes, services or user activities in application environment;

- What are the most useful security scenarios in use in SIEM platforms (analysing logical structure for selected examples);

- How spotify engineering culture, gamification, brainstorm sessions and war games help with creation action flow useful during hacking attacks;

Język prezentacji: angielski