| |||||
| |||||
Search Irongeek.com: ![]() ![]()
Help Irongeek.com pay for bandwidth and research equipment: |
In this talk, John will cover some of the more entertaining and enlightening examples of a year of running cyber attribution and deception campaigns.The goal of this presentation is to equip the attendees with real-life examples of how these technologies work and how they can provide immediate value to an organization.He will also provide free tools and techniques that can be implemented immediately upon returning to work. John has both consulted and taught hundreds of organizations in the areas of security, regulatory compliance, and penetration testing.He is a coveted speaker and much loved SANS teacher. John is a contributor to the industry shaping Penetration Testing Execution Standard and 20 Critical Controls frameworks.
15 most recent posts on Irongeek.com:
|
If you would like to republish one of the articles from this site on your
webpage or print journal please contact IronGeek.
Copyright 2020, IronGeek
Louisville / Kentuckiana Information Security Enthusiast