Featured image
Truesec pattern
Tech Talk

Stories From the CSIRT Front Lines

The good, the bad, and the ugly, directly from the front lines of cybercrime. Real life examples of techniques and methods used by threat actors.
Share

This tech talk will include real descriptions of real scenarios and activities that have occurred during incident response engagements following a cyber breach. What happened, was it good or bad, and how should it have been handled, both during the crisis and preemptively to the breach occurring.

Stories From the CSIRT Front Lines

This tech talk will include descriptions of real scenarios and activities that have occurred during incident response engagements following a cyber breach. What happened, was it good or bad, and how should it have been handled during the crisis and preemptively before the breach occurred.

Key Learnings

  • What it's really like when a severe cyber incident occurs.
  • Tips and recommendations on how to act during and preemptively to a breach.
  • Real-life examples of techniques and methods used by threat actors.

Language

English

Who It's For

C-Levels, Security managers, IT managers, IT technicians, IT professionals, and those who work in an IT department and are interested in security issues.

Get Notified About Upcoming Tech Talks

Stay ahead in cyber

Join 1000+ other cyber professionals that get monthly updates from us with the key things to know.