<span class="translation_missing" title="translation missing: en.options.talk">talk</span>: Things I've seen as a Security consultant
What do consultants also do?
As a cyber security consultant that worked in the industry for a long time, I would like to share some insights into this broad field based on two of my favorite projects:
1. Evaluation of a threat intelligence provider, including definition of cases like data or credential leaks and performing an RFP.
2. Evaluation of a deception solution including requirements definition and doing a comprehensive proof of value.
You will also see why companies need these types of solutions.
"A consultant is a professional who provides advice or services in an area of specialization". The definition of what a consultant does in daily life is as broad as it may get and could mean everything and nothing.
My talk will be about my experience as a cyber security consultant on client projects. I will provide an insight into the daily work with a focus on two of my favorite projects:
1. Evaluation of a threat intelligence provider: a customer had a threat intelligence provider with a contract that ran out and wanted to evaluate different providers to see what is in the market.
This is a common project: We started with the definition of cases (data leaks, credential leaks, brand abuse, etc.) and sources (clear web, dark web, messaging apps, etc.) as well as additional requirements like covered language, API access, web interface, etc.
In the end we created a "Request for Proposals" documentation, reviewed and assessed offers to decide for on threat intelligence provider.
2. Evaluation of a deception solution: this project included market research including presentations from different providers, defining requirements, doing a proof-of-concept in the client’s infrastructure, evaluating the benefits, and choosing a product. The proof-of-concept, however, was remarkably interesting as it involved testing all the features in a real environment, including creation of tokens via API, WireShark analysis, creation of fake login pages, and more.
These sourcing projects are very standard procedures, so why do I still enjoy it? Because it provided more surprises than anticipated.
Info
Day:
2023-10-21
Start time:
14:50
Duration:
00:40
Room:
HG E 1.2
Links:
Feedback
Click here to let us know how you liked this event.
Concurrent Events
Speakers
Daniel Kaufmann |