Key Learning Points
- Review the top attack vectors behind breaches
- Go through the steps of the attack chain, from Infiltration to Persistence
- Best practices for building out your IR Program – how do you demonstrate progress?
Level: Intermediate to Advance
It’s challenging to build out your Incident Detection & Response program when you’re wading in alerts and expected to cover cloud services, contractors, and remote workers. In this session, Eric Sun will cover best practices from red/blue team engagements with takeaways for your security program.
About Eric Sun
Eric Sun has expertise in the intruder attack chain and an understanding of behavior analytics & risk management from his tenure as a professional poker player (live & online).
This session sponsored by Rapid7.