"Crispy" Talks about the steps attackers use along the way of their attack and give insight into how to prevent or detect their steps and process
Up Next in Season 1
-
COUNTERING THE CYBER THREAT TO CRITIC...
Hardening U.S. critical infrastructure sectors against network attacks and vulnerabilities is a national security priority, but a comprehensive plan of action remains elusive. The key to meeting this challenge is forging a national consensus on roles and missions within government and between gov...
-
MAKING CYBER THREAT INTEL (CTI) ACTIO...
A conceptual architecture (not a sales pitch/tech agnostic) to address two key concepts: First to bring external CTI (Cyber Threat Intel) into your environment (security infrastructure) and converting it into a machine-actionable format. Second, to set up sensors and instrumentation to match even...
-
ESCAPING THE CREATIVE GRIND
We will take a look into the creative process from Undercroft Co-Founder Chris Machowski’s perspective. Just like most projects, there is a specific workflow and method to the madness. We will touch on digital artwork and video editing.