Stories From the CSIRT Front Lines

This tech talk will include descriptions of real scenarios and activities that have occurred during incident response engagements following a cyber breach. What happened, was it good or bad, and how should it have been handled during the crisis and preemptively before the breach occurred.

Key Learnings

  • What it's really like when a severe cyber incident occurs.
  • Tips and recommendations on how to act during and preemptively to a breach.
  • Real-life examples of techniques and methods used by threat actors.


Who It's For
C-Levels, Security managers, IT managers, IT technicians, IT professionals, and those who work in an IT department and are interested in security issues.