understanding the effectiveness of exploit mitigations for purple teams
Published 2 years ago • 786 plays • Length 47:25Download video MP4
Download video MP3
Similar videos
-
32:55
threat focused purple team exercises (non active directory edition)
-
36:45
the active directory purple team playbook
-
6:10
purple teaming explained
-
6:01
the key to cybersecurity? controlling chaos. | freethink
-
28:42
risk-based vulnerability management
-
5:55
master vulnerability management: the complete lifecycle, tools, & challenges explained! 🛡️💡
-
32:21
purple chaos - dos and don’ts of the game
-
41:38
purple teaming in an enterprise: why, who, when, and how
-
1:00:57
running your first purple team exercise - understand the cyber kill chain, emulation, & response
-
32:15
purple team war stories
-
36:15
purple team feedback loop
-
32:08
designing playbooks with purple team approach
-
46:34
sans emergency webcast: follina msdt (ms word) 0-day - analysis and remediation w/ jake williams
-
36:09
red blue = purple: our journey building a dedicated purple team at meta
-
52:24
strategies of a world-class soc
-
48:21
rsac 2021 keynote: the five most dangerous new attack techniques
-
39:46
03. x33fcon 2019 - offensive testing of ics security by joe slowik
-
4:29
what is siem?
-
28:17
purple team pirs: what adversary emulations need from cyber threat intelligence