07-02-2018 ACM Webcast: Attack Tactics Part 2

Active Countermeasures Webcast


Attack Tactics: Part 2

This is the second part of John’s series about Attack Tactics. In the first part we discussed how we’d attack. Now, we cover the same attack, but this time we are covering the defensive components the organization could have implemented to stop us every step of the way.

“We cover event logs, new vendors, SIEM, UBEA and yes… I hate to say it… Cyber Kill Chain. Remember, the goal is to make your next pentester cry; to make hackers give up and most importantly to have puppies and kittens everywhere love you.” – John

Presented by: John Strand

AC-Hunter Datasheet
AC-Hunter Personal Demo
What We’re up To