Cyber Solutions Fest 2022: Threat Hunti...
Every year at major security conferences, you can tell the trends in security because seemingly every product and service is being positioned as “look at how we make things easier/cheaper/better.” A few years ago, that was cyber threat intelligence (CTI). Then, it inexplicably changed to threat hunting. But practitioners know that you can’t really separate threat hunting and threat intelligence any more than you can separate...
SANS Data Breach Summit 2016
For every organization, data breach is a major risk. It's not a matter of whether your organization will be breached; it's when, and - most importantly - how bad the damage will be. You likely have a response plan in place. In fact, your organization has purchased insurance against this eventuality. But your response in the first hours after initially discovering the "incident," which is later confirmed to be a "breach," will be crucial to mit...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.