detecting on chain attacks
Published 2 years ago • 330 plays • Length 28:33Download video MP4
Download video MP3
Similar videos
-
30:36
what hacking the planet taught us about defending supply chain attacks
-
1:06
combating supply chain attacks with product security testing
-
1:00:57
running your first purple team exercise - understand the cyber kill chain, emulation, & response
-
55:08
threat-informed detection engineering
-
41:13
maximizing the value of attack detection tooling with atomic purple teaming
-
37:16
keynote | memory safe languages won't save you
-
1:18:28
vulnerabilitygpt: cybersecurity in the age of llm and ai
-
36:09
red blue = purple: our journey building a dedicated purple team at meta
-
32:36
supply chain purple: simulating supply chain attacks with dll hijacking
-
56:27
detecting dcsync and dcshadow network traffic
-
1:00:14
common persistence strategies - emulating, preventing, and detecting
-
36:36
top network attacks ... and how to fix them
-
34:19
the invisible threat: ai-powered vishing attacks and defense strategies
-
23:17
attacking aws: the full cyber kill chain | sans cloud & devops security summit 2020
-
58:00
operationalized purple teaming
-
40:15
advanced purple teaming
-
58:00
sans webcast: password cracking - beyond the basics
-
37:33
offensive forensics
-
33:41
my “aha!” moment - methods, tips, & lessons learned in threat hunting - sans thir summit 2019
-
31:17
attacking and defending microsoft entra, 2024 edition