Personal Information
Ocupación
Principal Security Author
Sector
Technology / Software / Internet
Sitio web
www.devaultsecurity.com
Etiquetas
cybersecurity
conference
threat hunting
elastic stack
log4j
log4shell
zeek
incident response
infosec
emulation
vulnerability
open source
circlecitycon
elasticsearch
scheduled tasks
fin7
pluralsight
hacking
purpleteam
suricata
rocknsm
bsides
information security
blueteam
microsoft
security engineering
security operations
adversary emulation
toolkit
windows
persistence
shmoocon
wireshark
c2
exfiltration
smtp
lateral movement
phishing
apt
suricon
dashboards
grrcon
mitre
training
education
devsecops
isf
texas
development
heartbleed
shellshock
exploit
code
alamo ace
air force
dcerpc
mitm
sccm
Ver más
Presentaciones
(14)Recomendaciones
(1)Automated, Collection, and Enrichment (ACE)
Jared Atkinson
•
Hace 6 años
Personal Information
Ocupación
Principal Security Author
Sector
Technology / Software / Internet
Sitio web
www.devaultsecurity.com
Etiquetas
cybersecurity
conference
threat hunting
elastic stack
log4j
log4shell
zeek
incident response
infosec
emulation
vulnerability
open source
circlecitycon
elasticsearch
scheduled tasks
fin7
pluralsight
hacking
purpleteam
suricata
rocknsm
bsides
information security
blueteam
microsoft
security engineering
security operations
adversary emulation
toolkit
windows
persistence
shmoocon
wireshark
c2
exfiltration
smtp
lateral movement
phishing
apt
suricon
dashboards
grrcon
mitre
training
education
devsecops
isf
texas
development
heartbleed
shellshock
exploit
code
alamo ace
air force
dcerpc
mitm
sccm
Ver más