Your Search

  • Date

    • 5th June 2019 (Wednesday) Remove
  • Topic Area

    • Threats, exploits and vulnerabilities Remove
Reset Search

Filter by

 

Content: Incident Response & Security Operations

Search

  1. #
  2. A
  3. B
  4. C
  5. D
  6. E
  7. F
  8. G
  9. H
  10. I
  11. J
  12. K
  13. L
  14. M
  15. N
  16. O
  17. P
  18. Q
  19. R
  20. S
  21. T
  22. U
  23. V
  24. W
  25. X
  26. Y
  27. Z
  28. Show all

Results

1 - 6 of 6 results

|

Items per page:

Sort By
  • Anatomy of a Cyber Attack: DNSpionage

    Wednesday11:20 - 11:4505 Jun 2019
    Tech Talks

    Threat actors continuously search for new techniques to compromise their victims. Recently, Cisco Talos identified a new malicious campaign named “DNSpionage”. ...

    • Language: English

  • Cryptography & Malware: How Crooks Hide & How to Spot Them Anyway

    Wednesday10:40 - 11:0505 Jun 2019
    Technology Showcase

    Encryption is a vital part of anyone's cloud security toolkit. It means you can safely use other people's networks and servers to handle even most personal stuf...

    • Language: English

  • How to Succeed at Threat Hunting & IR: Think Differently About Data

    Wednesday12:00 - 12:2505 Jun 2019
    Technology Showcase

    Two pillars of a successful and proactive SOC are threat hunting and incident response. The use of network traffic analysis can help improve performance in thes...

    • Language: English

  • Phishing & OOB Exfiltration Through Purple Tinted Glasses

    Wednesday14:15 - 15:0005 Jun 2019
    Geek Street

    The proliferation of client-side attacks continues to grow, as attackers are increasingly aware their chances of success are increased if they can get the victi...

    • Language: English

  • Unleash the Power of Your SOC: How to Measure Effectiveness & Mature Your Capabilities

    Wednesday15:30 - 16:3005 Jun 2019
    Information Security Exchange

    Despite the average organisation deploying dozens of security tools and products, major breaches are still happening.  In order to reduce the risk of experienc...

    • Language: English

  • Workshop 3: Discover the Secrets of the SOC & How to Build a Threat Hunting Team

    Wednesday14:00 - 16:0005 Jun 2019
    Security Workshop

    In the first half of this interactive workshop, we’ll talk about what goes into making a SOC work effectively. As well as providing the core monitoring and inci...

    • Language: English

We use cookies to operate this website and to improve its usability. Full details of what cookies are, why we use them and how you can manage them can be found by reading our Privacy & Cookies page. Please note that by using this site you are consenting to the use of cookies.