際際滷shows by User: MuhammadSahputra1 / http://www.slideshare.net/images/logo.gif 際際滷shows by User: MuhammadSahputra1 / Sat, 12 Oct 2019 16:36:46 GMT 際際滷Share feed for 際際滷shows by User: MuhammadSahputra1 Afl - 4fun and pr0fit /slideshow/afl-4fun-and-pr0fit-181399533/181399533 afl-4funandpr0fit-191012163646
Fuzzing is about finding the bugs (I used to do the same for our internal apps such as Matadewa), so it can also benefit not only for security people but also for a software developer in generals.]]>

Fuzzing is about finding the bugs (I used to do the same for our internal apps such as Matadewa), so it can also benefit not only for security people but also for a software developer in generals.]]>
Sat, 12 Oct 2019 16:36:46 GMT /slideshow/afl-4fun-and-pr0fit-181399533/181399533 MuhammadSahputra1@slideshare.net(MuhammadSahputra1) Afl - 4fun and pr0fit MuhammadSahputra1 Fuzzing is about finding the bugs (I used to do the same for our internal apps such as Matadewa), so it can also benefit not only for security people but also for a software developer in generals. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/afl-4funandpr0fit-191012163646-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Fuzzing is about finding the bugs (I used to do the same for our internal apps such as Matadewa), so it can also benefit not only for security people but also for a software developer in generals.
Afl - 4fun and pr0fit from Muhammad Sahputra
]]>
216 1 https://cdn.slidesharecdn.com/ss_thumbnails/afl-4funandpr0fit-191012163646-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Content Disarm Reconstruction & Cyber Kill Chain /MuhammadSahputra1/content-disarm-reconstruction-cyber-kill-chain cdrcyberkillchain-181204225252
How to break the delivery stage of cyber kill chain was the main topic I delivered last sunday during IDSECCONF 2018 in Malang. Cyber kill chain wasnt new at all, it was there since long time, the term popularized by lockheed martin few years ago to help industry identify methodology / technology to prevent cyber attack. I covered signatured based malware detection, sandboxing, artificial intelligence, and introducing content disarm reconstruction in details. IDSECCONF is always about contributing back to community since we learnt from community many years ago. I hope what Ive learn from Industry related to CDR technology can be beneficial to the Indonesian IT security community.]]>

How to break the delivery stage of cyber kill chain was the main topic I delivered last sunday during IDSECCONF 2018 in Malang. Cyber kill chain wasnt new at all, it was there since long time, the term popularized by lockheed martin few years ago to help industry identify methodology / technology to prevent cyber attack. I covered signatured based malware detection, sandboxing, artificial intelligence, and introducing content disarm reconstruction in details. IDSECCONF is always about contributing back to community since we learnt from community many years ago. I hope what Ive learn from Industry related to CDR technology can be beneficial to the Indonesian IT security community.]]>
Tue, 04 Dec 2018 22:52:52 GMT /MuhammadSahputra1/content-disarm-reconstruction-cyber-kill-chain MuhammadSahputra1@slideshare.net(MuhammadSahputra1) Content Disarm Reconstruction & Cyber Kill Chain MuhammadSahputra1 How to break the delivery stage of cyber kill chain was the main topic I delivered last sunday during IDSECCONF 2018 in Malang. Cyber kill chain wasnt new at all, it was there since long time, the term popularized by lockheed martin few years ago to help industry identify methodology / technology to prevent cyber attack. I covered signatured based malware detection, sandboxing, artificial intelligence, and introducing content disarm reconstruction in details. IDSECCONF is always about contributing back to community since we learnt from community many years ago. I hope what Ive learn from Industry related to CDR technology can be beneficial to the Indonesian IT security community. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/cdrcyberkillchain-181204225252-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> How to break the delivery stage of cyber kill chain was the main topic I delivered last sunday during IDSECCONF 2018 in Malang. Cyber kill chain wasnt new at all, it was there since long time, the term popularized by lockheed martin few years ago to help industry identify methodology / technology to prevent cyber attack. I covered signatured based malware detection, sandboxing, artificial intelligence, and introducing content disarm reconstruction in details. IDSECCONF is always about contributing back to community since we learnt from community many years ago. I hope what Ive learn from Industry related to CDR technology can be beneficial to the Indonesian IT security community.
Content Disarm Reconstruction & Cyber Kill Chain from Muhammad Sahputra
]]>
285 1 https://cdn.slidesharecdn.com/ss_thumbnails/cdrcyberkillchain-181204225252-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Next-Gen security operation center /slideshow/nextgen-security-operation-center/124781271 next-gensecurityoperationcenter-181203134321
Talking about Next-Gen Security Operation Center for IDNIC+APJII as representative from IDSECCONF. People-Centric SOC requires lot of investment on human in terms of quantity and quality, unfortunately, (good) IT security people are getting rare these days. Organisation need to put their investments more on technology, as in Industry 4.0, machines are getting more advanced to support Human on doing continuous and repetitive task. Moving from traditional to next-gen SOC require proper plan, thats what this talk was about.]]>

Talking about Next-Gen Security Operation Center for IDNIC+APJII as representative from IDSECCONF. People-Centric SOC requires lot of investment on human in terms of quantity and quality, unfortunately, (good) IT security people are getting rare these days. Organisation need to put their investments more on technology, as in Industry 4.0, machines are getting more advanced to support Human on doing continuous and repetitive task. Moving from traditional to next-gen SOC require proper plan, thats what this talk was about.]]>
Mon, 03 Dec 2018 13:43:21 GMT /slideshow/nextgen-security-operation-center/124781271 MuhammadSahputra1@slideshare.net(MuhammadSahputra1) Next-Gen security operation center MuhammadSahputra1 Talking about Next-Gen Security Operation Center for IDNIC+APJII as representative from IDSECCONF. People-Centric SOC requires lot of investment on human in terms of quantity and quality, unfortunately, (good) IT security people are getting rare these days. Organisation need to put their investments more on technology, as in Industry 4.0, machines are getting more advanced to support Human on doing continuous and repetitive task. Moving from traditional to next-gen SOC require proper plan, thats what this talk was about. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/next-gensecurityoperationcenter-181203134321-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Talking about Next-Gen Security Operation Center for IDNIC+APJII as representative from IDSECCONF. People-Centric SOC requires lot of investment on human in terms of quantity and quality, unfortunately, (good) IT security people are getting rare these days. Organisation need to put their investments more on technology, as in Industry 4.0, machines are getting more advanced to support Human on doing continuous and repetitive task. Moving from traditional to next-gen SOC require proper plan, thats what this talk was about.
Next-Gen security operation center from Muhammad Sahputra
]]>
2371 2 https://cdn.slidesharecdn.com/ss_thumbnails/next-gensecurityoperationcenter-181203134321-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
https://public.slidesharecdn.com/v2/images/profile-picture.png https://cdn.slidesharecdn.com/ss_thumbnails/afl-4funandpr0fit-191012163646-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/afl-4fun-and-pr0fit-181399533/181399533 Afl - 4fun and pr0fit https://cdn.slidesharecdn.com/ss_thumbnails/cdrcyberkillchain-181204225252-thumbnail.jpg?width=320&height=320&fit=bounds MuhammadSahputra1/content-disarm-reconstruction-cyber-kill-chain Content Disarm Reconst... https://cdn.slidesharecdn.com/ss_thumbnails/next-gensecurityoperationcenter-181203134321-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/nextgen-security-operation-center/124781271 Next-Gen security oper...