#cognito-Stream

Description of tag.

Discovering your own security posture and knowing what to triage

How often do you wonder: what should I triage? This decision isn't binary. There isn't a right or wrong answer. We can, however, talk about all the factors that need to go into your decision and provide you some structure around the decisions.

You have data - now what do you do with it?

Ground yourself in the mindset of an analyst and an incident responder. This isn't just a talk about sources of information or the tools to use. It is a talk which tells you which artifacts you need to think about in the grand scheme of an attack.

Cybersecurity D&D

You can keep the d20s at home, but table-topping is a great way to train and develop processes. Using a real-world attack to guide us, we'll work together as a blue team to put the pieces of the puzzle together.

Conference Day 1

You have data - now what do you do with it?

Ground yourself in the mindset of an analyst and an incident responder. This isn't just a talk about sources of information or the tools to use. It is a talk which tells you which artifacts you need to think about in the grand scheme of an attack.

Conference Day 2

Discovering your own security posture and knowing what to triage

How often do you wonder: what should I triage? This decision isn't binary. There isn't a right or wrong answer. We can, however, talk about all the factors that need to go into your decision and provide you some structure around the decisions.

Cybersecurity D&D

You can keep the d20s at home, but table-topping is a great way to train and develop processes. Using a real-world attack to guide us, we'll work together as a blue team to put the pieces of the puzzle together.