<div dir="ltr"><div class="gmail_extra"><div class="gmail_quote">On Thu, Mar 16, 2017 at 8:43 AM, dave aitel <span dir="ltr">&lt;<a href="mailto:dave@immunityinc.com" target="_blank">dave@immunityinc.com</a>&gt;</span> wrote:<br><blockquote class="gmail_quote" style="margin:0px 0px 0px 0.8ex;border-left:1px solid rgb(204,204,204);padding-left:1ex">Everyone I know lived through the &quot;Blinken-Lights-IDS&quot; phase.</blockquote><blockquote class="gmail_quote" style="margin:0px 0px 0px 0.8ex;border-left:1px solid rgb(204,204,204);padding-left:1ex">So your entire defense was situated on &quot;Are the<br>
lights blinking when I&#39;m not typing on my computer?&quot;<br>Ask yourself: How far from that have we come, really?<br></blockquote><div><br></div><div>We can still use blinkenlights -- <a href="https://blog.cobaltstrike.com/2015/11/11/revolutionary-device-detects-mimikatz-use/">https://blog.cobaltstrike.com/2015/11/11/revolutionary-device-detects-mimikatz-use/</a><br></div><div> </div><blockquote class="gmail_quote" style="margin:0px 0px 0px 0.8ex;border-left:1px solid rgb(204,204,204);padding-left:1ex">
Honestly, the line that strikes fear into the hearts and minds of all<br>
SOC engineers is &quot;How do you measure your success?&quot;. I&#39;m on the Security<br>
Metrics mailing list, which has been around basically forever, and what<br>
they will point out is that good metrics need good data, and we have<br>
about zero of that in almost all aspects of this game.</blockquote><div><br></div><div>Maybe we know how to measure success -- <a href="https://www.blackhat.com/docs/eu-16/materials/eu-16-Hovor-Automating-Incident-Investigations-Sit-Back-And-Relax-Bots-Are-Taking-Over.pdf">https://www.blackhat.com/docs/eu-16/materials/eu-16-Hovor-Automating-Incident-Investigations-Sit-Back-And-Relax-Bots-Are-Taking-Over.pdf</a><br></div><div> </div><blockquote class="gmail_quote" style="margin:0px 0px 0px 0.8ex;border-left:1px solid rgb(204,204,204);padding-left:1ex">While attackers<br>
have real numbers, the defensive process is literally evolutionary: We<br>
try EVERYTHING and just see which companies fail due to data breaches<br>
and while we don&#39;t really learn any lessons directly, maybe the next<br>
generation of companies will be, in some way, similar to whatever<br>
mutation helped.<br></blockquote><div><br></div><div>Maybe we know how to evolve the defensive process -- <a href="http://conf.splunk.com/files/2016/slides/detecting-the-adversary-post-compromise-with-threat-models-and-behavioral-analytics.pdf">http://conf.splunk.com/files/2016/slides/detecting-the-adversary-post-compromise-with-threat-models-and-behavioral-analytics.pdf</a><br></div><div><br></div><div>dre</div><div><br></div></div></div></div>