Cloud and Security Architect, Trend Micro
This module will demonstrate various techniques employed by hackers and cyber criminals. This session will allow attendees to understand typical attack flows and often overlooked security gaps and highlight the simple and fundamental steps that and organisation can take securing their environments while also highlighting some very basic items all organisations can pay attention.
There has been a notable paradigm shift in the cyber security landscape in recent times. Cyber security professionals are adopting a proactive threat hunting approach in place of the more conventional and often passive cyber surveillance approach. The increasing volume of attacks on IT networks and systems make it imperative that companies implement robust threat hunting systems and procedures.
This workshop will demonstrate how to conduct threat hunting activities highlighting the methods and techniques on how to implement such practices in your organisation.