RT @ifigeneialel: Amazing experience! Thanks @SANSEMEA @NCSC for the wonderfull oppurtunity to present @enisa_eu work!! #CyberThreat22
🐦🔗: https://n.respublicae.eu/enisa_eu/status/1616019918775894021
RT @ifigeneialel: Amazing experience! Thanks @SANSEMEA @NCSC for the wonderfull oppurtunity to present @enisa_eu work!! #CyberThreat22
🐦🔗: https://n.respublicae.eu/enisa_eu/status/1616019918775894021
Good to see Gordon Corera calling in the cybersecurity industry for FUD, alarmist stunt hacks and more at #CyberThreat22
We cannot build credibility until we start acting to deserve that
Our behaviour is what needs to change😎💫
Final day! You can still "attend" CyberThreat remotely - for free - if you can't make it in person (UK time 9-5).
https://www.sans.org/cyber-security-training-events/cyberthreat-2022/
#CyberThreat #CyberThreat2022 #SecurityConference #NCSC #SANS #InfoSec #CyberThreat22
@Mandiant talking about what can happen on locking down one method of, in this case, child-based attack on an innocent wall… “if I lock up all the crayons, what happens if they find a marker” - block a simple tool & an attacker may well find something worse to use 💯
Also loving the link analysis breaking down the attack…
Cool #DFIR tool introduced at @sansinstitute #CyberThreat22 for Enterprise IR by @nccgroupinfosec.
Check it out at https://www.fox-it.com/nl-en/dissect/
@volexity's @tlansec is in London at #CyberThreat22! His talk, "Two for One: Firewall 0-day investigations", is Tues, Jan 17 @ 16:10 UTC. Learn about 2 real-world examples of Chinese nation-state attackers using #0day exploits to compromise #firewall devices.