Similar Tracks
A Practical Case of Threat Intelligence – From IoC to Unraveling an Attacker Infrastructure
SANS Digital Forensics and Incident Response
Edge Out Your Next BEC Adversary: Investigation and Prevention Strategies Using OSINT
SANS Cyber Defense
Why and How to Take the GCTI The Industry’s Cyber Threat Intelligence Certification
SANS Digital Forensics and Incident Response
Talking identity security and strategic vision for Cisco’s identity portfolio with Matt Caulfield
Cisco
Cybersecurity IDR: Incident Detection & Response | Google Cybersecurity Certificate
Google Career Certificates
An Introduction to the Diamond Model of Intrusion Analysis by it's Co-Author Sergio Caltagirone
Threat Intelligence Academy
Schroedinger’s Backslash: Tracking the Chinese APT Goblin Panda with RTF Metadata - SANS CTI Summit
SANS Digital Forensics and Incident Response