Otto Kekäläinen: How to investigate and recover from a security breach – real-life experiences

Continue the discussion

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

Published

November 10, 2019

Sometimes the bad guys get in, despite all the protections and precautions. If that happens, there are many techniques that can be used to stop further damage, track down what the intruder did and how they got in. Finally the site needs to be cleaned up and re-opened for visitors. In this talk the most important techniques are presented along with real-life examples when they were used.

Presentation Slides »

Rate this:

Event

WordCamp Stuttgart 2019 26

Speakers

Otto Kekäläinen 12

Tags

common security bugs 3
security 292
Security Checkup 2
Security Planning 4

Language

English 9738

Download
MP4: Low, Med, High, Original
OGG: Low
Subtitles
Subtitle this video →
Producer
%d bloggers like this: