- Presentations
- Documents
- Infographics
Cyber Defense Matrix: Reloaded
Sounil Yu
•
5 years ago
Purple Teaming with ATT&CK - x33fcon 2018
Christopher Korban
•
6 years ago
ATT&CKing with Threat Intelligence
Christopher Korban
•
5 years ago
SOC Architecture Workshop - Part 1
Priyanka Aash
•
7 years ago
Pulling our-socs-up
Priyanka Aash
•
6 years ago
Building and Adopting a Cloud-Native Security Program
Priyanka Aash
•
6 years ago
Predicting exploitability-forecasts-for-vulnerability-management
Priyanka Aash
•
6 years ago
ChaoSlingr: Introducing Security-Based Chaos Testing
Priyanka Aash
•
6 years ago
Soc 2030-socs-are-broken-lets-fix- them
Priyanka Aash
•
6 years ago
For Critical Infrastructure Protection
Priyanka Aash
•
9 years ago
Playbook Round Table - Measuring your security program against 2018's application attacks
Priyanka Aash
•
6 years ago
Implementing An Automated Incident Response Architecture
Priyanka Aash
•
9 years ago
SACON - Incident Response Automation & Orchestration (Amit Modi)
Priyanka Aash
•
6 years ago
Incident Response: Validation, Containment & Forensics
Priyanka Aash
•
6 years ago
Office 365 Security: Top Priorities for 30 Days, 90 Days and Beyond
Priyanka Aash
•
6 years ago
Five Killer Ways to Design The Same Slide
Crispy Presentations
•
9 years ago
str-w04_next-wave-of-security-operationalization
peter lam
•
8 years ago
SANS_Minneapolis_2015_ThreatIntelligence_NeighborhoodWatchForYourNetworks
Matthew J. Harmon
•
8 years ago
Cyber threat Intelligence and Incident Response by:-Sandeep Singh
OWASP Delhi
•
8 years ago
STIX, TAXII, CISA: Impact of the Cybersecurity Information Sharing Act of 2015
Priyanka Aash
•
8 years ago