Featured image
Truesec pattern
Tech Talk

Stories From the CSIRT Front Lines

The good, the bad and the ugly, directly from the front lines of cybercrime. Real life examples of techniques and methods used by threat actors.
Share

This tech talk will include real descriptions of real scenarios and activities that has occurred during incident response engagements following a cyber breach. What happened, was it good or bad and how should it have been handled both during the crisis, but also preemptively to it breach occurring.

Stories From the CSIRT Front Lines

This tech talk will include real descriptions of real scenarios and activities that has occurring during incident response engagements, following a cyber breach. What happened, was it good or bad and how should it have been handled both during the crisis, but also preemptively to it breach occurring.

Key learnings:

  • What it really is like when a severe cyber incident happens
  • Tips and recommendations on how to act during and preemptively to a breach
  • Real life examples of techniques and methods used by threat actors

Language:

English

For Whom=

C-level, Security managers, IT managers, IT technicians, IT professionals, and for those who work in an IT department and who are interested in security issues.

Get Notified About Upcoming Tech Talks

Sign up to get updated on upcoming Tech Talks and live hacks with leading experts featuring STÖK.