| |||||
| |||||
Search Irongeek.com:
Help Irongeek.com pay for bandwidth and research equipment: |
Detecting advanced threats to your organization before you file that breach report requires innovative thinking, in-depth environmental knowledge and the implementation of proactive monitoring capabilities. Let's have a discussion on what tools and techniques could be leveraged to turn network monitoring operations into pre-crime detection mechanisms that would make Tom Cruise from Minority Report blush! We will cover some tactics that have had real world success, brainstorm potential options you can implement to stay one step ahead of the adversaries, learn to embrace the attacker mindset on a daily basis and share a drink...or several.
A newcomer to the InfoSec community, cry0 is an aspiring security researcher who chose the red pill. cry0 resides on the #FF00FF team and has 2 years of experience in penetration testing, reverse engineering, threat analysis, network monitoring and headache relief. Some of cry0's hobbies include working on stained glass projects, playing video games, volunteering at animal rescues and dispensing pamphlets of The Good Morty. cry0 also has a bunch of letters behind his name, like OSCP and ACA.
Recorded at NolaCon 2016
15 most recent posts on Irongeek.com:
|
If you would like to republish one of the articles from this site on your
webpage or print journal please contact IronGeek.
Copyright 2020, IronGeek
Louisville / Kentuckiana Information Security Enthusiast