Description
Imagine if you could watch every step they taken… Unmasking a threat actor activity is sometime like deciphering an ancient manuscript, but what if you can see every move and control when to strike the pause.
This session is not about log analysis, or following the breadcrumbs left by an elusive adversary. It is about having a full timeline of the threat actors machine and knowing exactly what was done without assumptions or guessing!
Optional: Speaker / convener biography
Hasain, also known as "The Wolf", is an industry-leading cyber security expert with more than 30 years of experience.
He has extensive and deep expertise from numerous design projects, security audits, advanced implementation projects, incident response, digital forensic, threat hunting and penetration testing. He helps customers understand and build solutions to protect, detect and respond to cyber threats for enterprises, government agencies, banks, military organizations among others.
Length | 60 minutes |
---|