What do we mean about ZTA , what are the first steps that we need to complete, and can we buy it out of the box?
Speaker Bio
What do we mean about ZTA , what are the first steps that we need to complete, and can we buy it out of the box?
Ever wanted to start threat hunting in your environment or contemplated what is required to do it? Here is a spoiler, you don't need a third party to do it for you as long as you have some necessary tools and capable personnel. Enter into the cyber wilds to get some foundational guidance on how your organization can perform the overly hyped and sensationalized art of threat hunting.
Intelligence created by an adversary through interactions with a deception assets generates real-time IOCs and TTPs that feed directly into better threat detection, threat hunting and threat modelling. In this session you will learn how to create and deploy deception campaigns that direct attackers into a deception environment that results in a stream of real-time actionable intelligence