When it comes to dealing with cyber threats, we all speak about security operations, incident response, threat hunting, forensics, reverse engineering, threat intelligence, indicator of compromise, etc. But how all these, sometimes, 'buzzwords ' can come to life within your organization? How can you effectively, if needed, perform those actions with a 5-man team?
The active cyber defense cycle is a way of connecting the dots between all those terms. We will go through the cycle, making them relevant and actionable with concrete examples that can be applied within your organization.