This talk will focus on fundamental attacker techniques that are common among many sophisticated threat actors, and the techniques that can be used to detect them without the need for IOC's.
Space is limited, please register if you would like to attend:
Please enter the text you see in the image into the text field.