Posted on
in Presentations
The session will cover identifying, tracking, and analyzing TTPs from a selected threat actor. This session will be hands on with the focus of seeing "what the defender sees" and allow for examples of granularity using ELK, Docker, and other low-cost/no-cost solutions as they sit currently.
Access This and Other RSAC™ Conference Presentations with Your Free RSAC Membership
Your RSAC™ Membership also includes AI-powered summaries, mind maps, and slides for Conference presentations, Group Discussions with experts, and more.
Watch Now >>
Share With Your Community