Latest Talk
Be The Hacker, Beat The Hacker
Go behind the scenes of a simulated targeted attack and witness typical steps carried out by attackers from their perspective of attack tools, techniques, and procedures. Once we achieve our attack objectives, we’ll switch sides to investigate malicious behavior detections and perform a ‘leadless’ threat hunt guided by the Mitre ATT&CK framework using Sophos EDR.
On-demand Talks
Related topics: