07-02-2018 ACM Webcast: Attack Tactics Part 2

Active Countermeasures Webcast


Attack Tactics: Part 2

This is the second part of John’s series about Attack Tactics. In the first part we discussed how we’d attack. Now, we cover the same attack, but this time we are covering the defensive components the organization could have implemented to stop us every step of the way.

“We cover event logs, new vendors, SIEM, UBEA and yes… I hate to say it… Cyber Kill Chain. Remember, the goal is to make your next pentester cry; to make hackers give up and most importantly to have puppies and kittens everywhere love you.” – John

Presented by: John Strand

AI-Hunter Datasheet
AI-Hunter Personal Demo
Subscribe to Our Blog

Sign up for email notifications of our new blog posts, threat hunting training, webcasts and other relevant information.

We are not spammy and you can unsubscribe at any time :)

* indicates required