Posted on
in Presentations
When it comes to testing the security posture of an enterprise, those who don’t have dedicated red teams or external penetration testers are often left behind. This session will demonstrate how to use free resources that make testing security tools approachable to anyone. After abusing the target machine, attendees will look at the telemetry gathered by open source tools to detect adversarial behaviors.
Pre-Requisites: Having experience with SIEM or other logging tools will be helpful. Red-teaming experience is not needed.
Pre-Requisites: Having experience with SIEM or other logging tools will be helpful. Red-teaming experience is not needed.
Security Strategy & Architecture Hackers & Threats Analytics Intelligence & Response
SIEM threat visualization incident response forensics & e-discovery
Topic
Security Strategy & Architecture
Hackers & Threats
Analytics Intelligence & Response
Subtopic
SIEM
threat visualization
incident response
forensics & e-discovery
Share With Your Community