When it comes to testing the security posture of an enterprise, those who don’t have dedicated red teams or external penetration testers are often left behind. This session will demonstrate how to use free resources that make testing security tools approachable to anyone. After abusing the target machine, attendees will look at the telemetry gathered by open source tools to detect adversarial behaviors.
Pre-Requisites: Having experience with SIEM or other logging tools will be helpful. Red-teaming experience is not needed.
Security Strategy & Architecture Hackers & Threats Analytics Intelligence & Response
SIEM security & threat visualization incident response forensics & ediscovery
Share With Your Community