All Articles (384)
Advanced threats can evade detection for months — and the longer they spend in the network, the more damage they can do. It leverages machine analytics and human-led intelligence analysis to proactively search for and find threats before they can c
Session Brief
This session was co-presented by 2speakers.
The first part by Wasim Halani included fundamentals, threat hunting approaches, elastic stack primer (elastic search, log stash, kibana, beats), concepts (nodes & cluster, index & shards,
Sponsor Collateral & Insert Guideline by 11th February, Monday
- Please provide 150 pieces of collateral to the address mentioned below
- You may provide 1 piece of collateral (as per service agreement) as delegate kit insert.
- You may provide 1 piece of
CISO Platform
A global community of 5K+ Senior IT Security executives and 40K+ subscribers with the vision of meaningful collaboration, knowledge, and intelligence sharing to fight the growing cyber security threats.
Join The Community View CISO Blogs
Atlanta Chapter Meet: Build the Pen Test Maturity Model (Virtual Session)
- Description:
The Atlanta Pen Test Chapter has officially begun and is now actively underway.
Atlanta CISOs and security teams have kicked off Pen Test Chapter #1…
- Created by: Biswajit Banerjee
- Tags: ciso, pen testing, red team, security leadership
The Insider Risk Summit (West)
- Description:
- Created by: pritha
- Tags: insider risk summit, monterey, california
