Keeping Up with the Adversary: Creating a Threat-Based Cyber-Team

Posted on in Presentations

With advanced cyber-actors evolving quickly and becoming more stealthy, it has become imperative to question the status quo of our existing cyber-operations. This session will outline how a case study and incident response led to changes in focus and philosophy and how that changed the structure of Defensive Cyber Operations.
Todd Kight


Defensive Cyber Operations, Johns Hopkins University Applied Physics Laboratory

Anthony Talamantes


Manager, Defensive Cyber Operations, Johns Hopkins Applied Physics Laboratory

Share With Your Community