<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>webinar takeaway Archives - Jean-Christoph von Oertzen</title>
	<atom:link href="https://jeanchristophvonoertzen.com/tag/webinar-takeaway/feed" rel="self" type="application/rss+xml" />
	<link>https://jeanchristophvonoertzen.com/tag/webinar-takeaway</link>
	<description>Exploring the intersection of cybersecurity, psychology, and resilience.</description>
	<lastBuildDate>Wed, 07 Apr 2021 19:22:31 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://jeanchristophvonoertzen.com/wp-content/uploads/2020/10/favicon-4.png</url>
	<title>webinar takeaway Archives - Jean-Christoph von Oertzen</title>
	<link>https://jeanchristophvonoertzen.com/tag/webinar-takeaway</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Webinar Takeaway: How to Get Started in Cyber Threat Hunting</title>
		<link>https://jeanchristophvonoertzen.com/webinar-takeaway-how-to-get-started-in-cyber-threat-hunting</link>
					<comments>https://jeanchristophvonoertzen.com/webinar-takeaway-how-to-get-started-in-cyber-threat-hunting#respond</comments>
		
		<dc:creator><![CDATA[jean-christoph]]></dc:creator>
		<pubDate>Wed, 07 Apr 2021 19:15:14 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[threat hunting]]></category>
		<category><![CDATA[webinar takeaway]]></category>
		<guid isPermaLink="false">https://jeanchristophvonoertzen.com/?p=386</guid>

					<description><![CDATA[<p>My key takeaways responding to alerts, writing sig&#8217;s, checking dashboards is reactionary; threat hunting is proactive @TayandYou &#60;- nice example of an AI being out of control how can AI solve infosec problems, unless we have our processes right? ThreatH process start with the network and look for anomalies suspect system? pivot to host logs [&#8230;]</p>
<p>The post <a href="https://jeanchristophvonoertzen.com/webinar-takeaway-how-to-get-started-in-cyber-threat-hunting">Webinar Takeaway: How to Get Started in Cyber Threat Hunting</a> appeared first on <a href="https://jeanchristophvonoertzen.com">Jean-Christoph von Oertzen</a>.</p>
]]></description>
		
					<wfw:commentRss>https://jeanchristophvonoertzen.com/webinar-takeaway-how-to-get-started-in-cyber-threat-hunting/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Webinar Takeaway: How to Build a Phishing Engagement &#8211; Coding TTP´s</title>
		<link>https://jeanchristophvonoertzen.com/webinar-takeaway-how-to-build-a-phishing-engagement-coding-ttps</link>
					<comments>https://jeanchristophvonoertzen.com/webinar-takeaway-how-to-build-a-phishing-engagement-coding-ttps#respond</comments>
		
		<dc:creator><![CDATA[jean-christoph]]></dc:creator>
		<pubDate>Thu, 01 Apr 2021 18:17:02 +0000</pubDate>
				<category><![CDATA[Email]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[automation]]></category>
		<category><![CDATA[phishing]]></category>
		<category><![CDATA[webinar takeaway]]></category>
		<guid isPermaLink="false">https://jeanchristophvonoertzen.com/?p=382</guid>

					<description><![CDATA[<p>My key takeaways Automation tools like Ansilble, terraform and docker can also create a evil environment eg for phishing Don&#8217;t put sensible tokens or passwords in ainsible config files but use a cloud password manager and pull the pass as variable into ainsible Best of phishing themes: give away 2 iPhones or check a link [&#8230;]</p>
<p>The post <a href="https://jeanchristophvonoertzen.com/webinar-takeaway-how-to-build-a-phishing-engagement-coding-ttps">Webinar Takeaway: How to Build a Phishing Engagement &#8211; Coding TTP´s</a> appeared first on <a href="https://jeanchristophvonoertzen.com">Jean-Christoph von Oertzen</a>.</p>
]]></description>
		
					<wfw:commentRss>https://jeanchristophvonoertzen.com/webinar-takeaway-how-to-build-a-phishing-engagement-coding-ttps/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Event takeaway: 2. IT-Grundschutz-Tag 2021</title>
		<link>https://jeanchristophvonoertzen.com/event-takeaway-2-it-grundschutz-tag-2021</link>
					<comments>https://jeanchristophvonoertzen.com/event-takeaway-2-it-grundschutz-tag-2021#respond</comments>
		
		<dc:creator><![CDATA[jean-christoph]]></dc:creator>
		<pubDate>Wed, 17 Mar 2021 19:00:00 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[BSI IT-Grundschutz]]></category>
		<category><![CDATA[event]]></category>
		<category><![CDATA[webinar takeaway]]></category>
		<guid isPermaLink="false">https://jeanchristophvonoertzen.com/?p=362</guid>

					<description><![CDATA[<p>My key takeaways Digitalization and cyber secuirty goes hand in hand Hafnium BSI: about 10k Exchange server affected in DE by Hafnium Remediation advices almost everybody who exposed OWA Save personalized settings before starting! patch = Exchange admin rights required) look in IIS for Github fragments in Inetpub folder #DEVSECOPS is the mandatory development system, [&#8230;]</p>
<p>The post <a href="https://jeanchristophvonoertzen.com/event-takeaway-2-it-grundschutz-tag-2021">Event takeaway: 2. IT-Grundschutz-Tag 2021</a> appeared first on <a href="https://jeanchristophvonoertzen.com">Jean-Christoph von Oertzen</a>.</p>
]]></description>
		
					<wfw:commentRss>https://jeanchristophvonoertzen.com/event-takeaway-2-it-grundschutz-tag-2021/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Webinar Takeaway: Black Hills Infosec: Sacred Cash Cow Tipping 2021</title>
		<link>https://jeanchristophvonoertzen.com/webinar-takeaway-black-hills-infosec-sacred-cash-cow-tipping-2021</link>
					<comments>https://jeanchristophvonoertzen.com/webinar-takeaway-black-hills-infosec-sacred-cash-cow-tipping-2021#respond</comments>
		
		<dc:creator><![CDATA[jean-christoph]]></dc:creator>
		<pubDate>Thu, 11 Feb 2021 21:00:59 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[EDR]]></category>
		<category><![CDATA[webinar takeaway]]></category>
		<guid isPermaLink="false">https://jeanchristophvonoertzen.com/?p=379</guid>

					<description><![CDATA[<p>My key takeaways EDR loader: may execute shellcode Most EDR are on cloud Receipe to pwn such EDR: get IP&#8217;s for the vendors (usually whitelisted) create a windows firewall rule to block these IPs EDR pwnd EDRs are blind to WSL(2) since 2018 Files &#62;50MB are usually ignored by EDRs Rust, GoLang, Nim to bypass [&#8230;]</p>
<p>The post <a href="https://jeanchristophvonoertzen.com/webinar-takeaway-black-hills-infosec-sacred-cash-cow-tipping-2021">Webinar Takeaway: Black Hills Infosec: Sacred Cash Cow Tipping 2021</a> appeared first on <a href="https://jeanchristophvonoertzen.com">Jean-Christoph von Oertzen</a>.</p>
]]></description>
		
					<wfw:commentRss>https://jeanchristophvonoertzen.com/webinar-takeaway-black-hills-infosec-sacred-cash-cow-tipping-2021/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Webinar takeaway: A Master Class on IT Security &#8211; Roger Grimes Teaches Ransomware Mitigation</title>
		<link>https://jeanchristophvonoertzen.com/webinar-takeaway-a-master-class-on-it-security-roger-grimes-teaches-ransomware-mitigation</link>
					<comments>https://jeanchristophvonoertzen.com/webinar-takeaway-a-master-class-on-it-security-roger-grimes-teaches-ransomware-mitigation#respond</comments>
		
		<dc:creator><![CDATA[jean-christoph]]></dc:creator>
		<pubDate>Wed, 10 Feb 2021 21:00:45 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[ransomware]]></category>
		<category><![CDATA[webinar takeaway]]></category>
		<guid isPermaLink="false">https://jeanchristophvonoertzen.com/?p=375</guid>

					<description><![CDATA[<p>My key takeaways often ransomeware dwells 8mo-1yr before detection or execution since 1989 AIDS/PC Cyborg Trojan since end 2019 data exfiltration get more and more common with ransomware today access to network is more worry than encrypted files droppers are often not recognized by AV/EDR 2% of revenue is common request for ransom stolen data [&#8230;]</p>
<p>The post <a href="https://jeanchristophvonoertzen.com/webinar-takeaway-a-master-class-on-it-security-roger-grimes-teaches-ransomware-mitigation">Webinar takeaway: A Master Class on IT Security &#8211; Roger Grimes Teaches Ransomware Mitigation</a> appeared first on <a href="https://jeanchristophvonoertzen.com">Jean-Christoph von Oertzen</a>.</p>
]]></description>
		
					<wfw:commentRss>https://jeanchristophvonoertzen.com/webinar-takeaway-a-master-class-on-it-security-roger-grimes-teaches-ransomware-mitigation/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Webinar takeaway: Atomic Red Team Hands-on Getting Started Guide</title>
		<link>https://jeanchristophvonoertzen.com/webinar-takeaway-atomic-red-team-hands-on-getting-started-guide</link>
					<comments>https://jeanchristophvonoertzen.com/webinar-takeaway-atomic-red-team-hands-on-getting-started-guide#respond</comments>
		
		<dc:creator><![CDATA[jean-christoph]]></dc:creator>
		<pubDate>Thu, 28 Jan 2021 23:00:33 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[blue team]]></category>
		<category><![CDATA[simulation]]></category>
		<category><![CDATA[webinar takeaway]]></category>
		<guid isPermaLink="false">https://jeanchristophvonoertzen.com/?p=368</guid>

					<description><![CDATA[<p>My key takeaways The Atomic Red Team Project (ART) is a open source library of scripted attacks ART uses the MITRE ATT&#38;CK Matrix as structure ART emulates what an Attacker might do after compromise; msf tries to make use of vulns in software Emulating attacks helps to improve detection of attacks and comparing security products [&#8230;]</p>
<p>The post <a href="https://jeanchristophvonoertzen.com/webinar-takeaway-atomic-red-team-hands-on-getting-started-guide">Webinar takeaway: Atomic Red Team Hands-on Getting Started Guide</a> appeared first on <a href="https://jeanchristophvonoertzen.com">Jean-Christoph von Oertzen</a>.</p>
]]></description>
		
					<wfw:commentRss>https://jeanchristophvonoertzen.com/webinar-takeaway-atomic-red-team-hands-on-getting-started-guide/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Webinar takeaway: Releasing Your First (Python) Open Source Project to the Masse</title>
		<link>https://jeanchristophvonoertzen.com/webinar-takeaway-releasing-your-first-python-open-source-project-to-the-masse</link>
					<comments>https://jeanchristophvonoertzen.com/webinar-takeaway-releasing-your-first-python-open-source-project-to-the-masse#respond</comments>
		
		<dc:creator><![CDATA[jean-christoph]]></dc:creator>
		<pubDate>Wed, 13 Jan 2021 21:00:55 +0000</pubDate>
				<category><![CDATA[Code]]></category>
		<category><![CDATA[git]]></category>
		<category><![CDATA[webinar takeaway]]></category>
		<guid isPermaLink="false">https://jeanchristophvonoertzen.com/?p=352</guid>

					<description><![CDATA[<p>My key takeaways Version control is not for dev only. eg filename for docs 😉 Fear of Git is quite common great way of explaining git: staging: collect changes to track if you get it on the CLI it is much easier to understand it in any other tool remove the file due to pw-oopsie: [&#8230;]</p>
<p>The post <a href="https://jeanchristophvonoertzen.com/webinar-takeaway-releasing-your-first-python-open-source-project-to-the-masse">Webinar takeaway: Releasing Your First (Python) Open Source Project to the Masse</a> appeared first on <a href="https://jeanchristophvonoertzen.com">Jean-Christoph von Oertzen</a>.</p>
]]></description>
		
					<wfw:commentRss>https://jeanchristophvonoertzen.com/webinar-takeaway-releasing-your-first-python-open-source-project-to-the-masse/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Webinar takeaway: Discussing Implications of the SolarWinds Breach(es)</title>
		<link>https://jeanchristophvonoertzen.com/webinar-takeaway-discussing-implications-of-the-solarwinds-breaches</link>
					<comments>https://jeanchristophvonoertzen.com/webinar-takeaway-discussing-implications-of-the-solarwinds-breaches#respond</comments>
		
		<dc:creator><![CDATA[jean-christoph]]></dc:creator>
		<pubDate>Wed, 23 Dec 2020 19:26:05 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[solarburst]]></category>
		<category><![CDATA[threat hunting]]></category>
		<category><![CDATA[webinar takeaway]]></category>
		<guid isPermaLink="false">https://jeanchristophvonoertzen.com/?p=303</guid>

					<description><![CDATA[<p>My key takeaways stop panicking, the Solarwind hack is over. C2 channels are dead. Party is over. don&#8217;t poke at the IOC&#8217;s * focus on the fundamentals and how to avoid it happen again Fundamentals: DNS most valuable hunting artefacts Know what you have where Know all your software Where are the blind spots? &#60;- [&#8230;]</p>
<p>The post <a href="https://jeanchristophvonoertzen.com/webinar-takeaway-discussing-implications-of-the-solarwinds-breaches">Webinar takeaway: Discussing Implications of the SolarWinds Breach(es)</a> appeared first on <a href="https://jeanchristophvonoertzen.com">Jean-Christoph von Oertzen</a>.</p>
]]></description>
		
					<wfw:commentRss>https://jeanchristophvonoertzen.com/webinar-takeaway-discussing-implications-of-the-solarwinds-breaches/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Webinar takeaway: Upping Your Defenses and Detections For the Low Low Price of FREEEEE</title>
		<link>https://jeanchristophvonoertzen.com/webinar-takeaway-upping-your-defenses-and-detections-for-the-low-low-price-of-freeeee</link>
					<comments>https://jeanchristophvonoertzen.com/webinar-takeaway-upping-your-defenses-and-detections-for-the-low-low-price-of-freeeee#respond</comments>
		
		<dc:creator><![CDATA[jean-christoph]]></dc:creator>
		<pubDate>Fri, 18 Dec 2020 08:11:58 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[purple team]]></category>
		<category><![CDATA[tools]]></category>
		<category><![CDATA[webinar takeaway]]></category>
		<guid isPermaLink="false">https://jeanchristophvonoertzen.com/?p=296</guid>

					<description><![CDATA[<p>My key takeaways Almost everybody get&#8217;s popped, a matter of time and ressources even with low budgets there are a lot of tools that help to make it harder for the attackers Doing some OSINT for the own organization might bring up a lot of information that attackers will use Webapp pentesting is basic security [&#8230;]</p>
<p>The post <a href="https://jeanchristophvonoertzen.com/webinar-takeaway-upping-your-defenses-and-detections-for-the-low-low-price-of-freeeee">Webinar takeaway: Upping Your Defenses and Detections For the Low Low Price of FREEEEE</a> appeared first on <a href="https://jeanchristophvonoertzen.com">Jean-Christoph von Oertzen</a>.</p>
]]></description>
		
					<wfw:commentRss>https://jeanchristophvonoertzen.com/webinar-takeaway-upping-your-defenses-and-detections-for-the-low-low-price-of-freeeee/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Webinar takeaway: Deutsches Cyber Threat Briefing mit Anomali, RiskIQ und CrowdStrike</title>
		<link>https://jeanchristophvonoertzen.com/webinar-takeaway-deutsches-cyber-threat-briefing-mit-anomali-riskiq-und-crowdstrike</link>
					<comments>https://jeanchristophvonoertzen.com/webinar-takeaway-deutsches-cyber-threat-briefing-mit-anomali-riskiq-und-crowdstrike#respond</comments>
		
		<dc:creator><![CDATA[jean-christoph]]></dc:creator>
		<pubDate>Thu, 19 Nov 2020 18:41:38 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[threat hunting]]></category>
		<category><![CDATA[webinar takeaway]]></category>
		<guid isPermaLink="false">https://jeanchristophvonoertzen.com/?p=263</guid>

					<description><![CDATA[<p>My key takeaways Anomali it takes up to 200+ days on average before a breach might be detected one challenge in many SOCs is to find relevant information in a growing &#34;data lake&#34;; this is where tools are needed wannacry example: blocking the kill switch domain as suspicious would have helped the worm spread; getting [&#8230;]</p>
<p>The post <a href="https://jeanchristophvonoertzen.com/webinar-takeaway-deutsches-cyber-threat-briefing-mit-anomali-riskiq-und-crowdstrike">Webinar takeaway: Deutsches Cyber Threat Briefing mit Anomali, RiskIQ und CrowdStrike</a> appeared first on <a href="https://jeanchristophvonoertzen.com">Jean-Christoph von Oertzen</a>.</p>
]]></description>
		
					<wfw:commentRss>https://jeanchristophvonoertzen.com/webinar-takeaway-deutsches-cyber-threat-briefing-mit-anomali-riskiq-und-crowdstrike/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
