March 7, 2019 1:10 PM
There seems to be an impression that detecting advanced attacker techniques has to involve a full re-architecture of your network and hundreds of thousands of dollars. This is just not true. This presentation will cover new attack tools and endpoint bypass techniques and free techniques to detect them. Come for the new “hacks.” Stay for the detection techniques!
Black Hills Information Security
John has both consulted and taught hundreds of organizations in the areas of security, regulatory compliance, and penetration testing. He is a coveted speaker and much loved SANS teacher. John is a contributor to the industry shaping Penetration Testing Execution Standard and 20 Critical Controls frameworks.