Keeping Up with the Adversary: Creating a Threat-Based Cyber-Team


Posted on in Presentations

With advanced cyber-actors evolving quickly and becoming more stealthy, it has become imperative to question the status quo of our existing cyber-operations. This session will outline how a case study and incident response led to changes in focus and philosophy and how that changed the structure of Defensive Cyber Operations.
Participants
Todd Kight

Participant

Defensive Cyber Operations, Johns Hopkins University Applied Physics Laboratory

Anthony Talamantes

Participant

Manager, Cybersecurity Operations, JHUAPL


Share With Your Community