Keeping Up with the Adversary: Creating a Threat-Based Cyber-Team


Posted on in Presentations

With advanced cyber-actors evolving quickly and becoming more stealthy, it has become imperative to question the status quo of our existing cyber-operations. This session will outline how a case study and incident response led to changes in focus and philosophy and how that changed the structure of Defensive Cyber Operations.

Participants
Anthony Talamantes

Participant

Manager, Defensive Cyber Operations, Johns Hopkins Applied Physics Laboratory

Todd Kight

Participant

Defensive Cyber Operations, Johns Hopkins University Applied Physics Laboratory


Share With Your Community