This tech talk will include real descriptions of real scenarios and activities that have occurred during incident response engagements following a cyber breach. What happened, was it good or bad, and how should it have been handled, both during the crisis and preemptively to the breach occurring.
Stories From the CSIRT Front Lines
This tech talk will include descriptions of real scenarios and activities that have occurred during incident response engagements following a cyber breach. What happened, was it good or bad, and how should it have been handled during the crisis and preemptively before the breach occurred.
Key Learnings
- What it's really like when a severe cyber incident occurs.
- Tips and recommendations on how to act during and preemptively to a breach.
- Real-life examples of techniques and methods used by threat actors.
Language
English
Who It's For
C-Levels, Security managers, IT managers, IT technicians, IT professionals, and those who work in an IT department and are interested in security issues.