
Live-Hacking: Notes from an Incident Responder’s Diary
Take a peek behind the curtain of a cyber attack. From uncovering the traces left on the network and IT-systems to an initial analysis of the identified malware. You will get to see the attacker’s moves from the perspective of the defenders.
When & Where
Details
Format:
it-sa insights
Moderator
