Give the Gift That Unlocks Potential
Power BI Fundamentals - Create visualizations and dashboards from scratch
Overview
Google, IBM & Meta Certificates — All 10,000+ Courses at 40% Off
One annual plan covers every course and certificate on Coursera. 40% off for a limited time.
Get Full Access
Explore a comprehensive conference talk on cybersecurity strategies and defense techniques against advanced threats. Learn about building effective security programs, analyzing data sources, and implementing tools for threat detection. Discover insights on privilege management, process execution, DNS analysis, and proactive security thinking. Gain valuable knowledge from industry experts as they discuss real-world examples and provide practical tips for defending against the dark arts of cyber attacks.
Syllabus
Intro
Stephen
The Solution
The Main Point
The Endgame
Building a Security Program
Mission Overview
Data Sources
The Walls
Contact
Tools
Open Source
Analysis
Hypothesis
Examples
Cash Hall
Data Storage
Proxy Interpreter Hypothesis
Review
Privilege Management
Security
Process Execution
DNS
Thinking Ahead
System One Thinking
Questions