Posted on
in Presentations
The session will cover identifying, tracking, and analyzing TTPs from a selected threat actor. This session will be hands on with the focus of seeing "what the defender sees" and allow for examples of granularity using ELK, Docker, and other low-cost/no-cost solutions as they sit currently.
Share With Your Community