About 23 results for "UCwSo89W3KgPrid41vskBDYA"
Featured Results

Handling Ransomware Incidents: What YOU Need to Know!
SANS Digital Forensics and Incident ResponseNov 22, 2023
PT1H26M9S
The Truth about Ransomware: Its not Complicated!
SANS Digital Forensics and Incident ResponseJan 12, 2023
Threat Intel for Everyone: Writing Like A Journalist To Produce Clear, Concise Reports
SANS Digital Forensics and Incident ResponseNov 23, 2021
PT1H16M5S
DFIR 101: Digital Forensics Essentials | Kathryn Hedley
SANS Digital Forensics and Incident ResponseAug 24, 2021
Understanding & Managing Collection to Support Threat Intelligence Analysis - SANS CTI Summit
SANS Digital Forensics and Incident ResponseNov 23, 2020
Threat Intelligence and the Limits of Malware Analysis with Joe Slowik - SANS CTI Summit 2020
SANS Digital Forensics and Incident ResponseNov 23, 2020
Hack the Reader: Writing Effective Threat Reports with Lenny Zeltser - SANS CTI Summit
SANS Digital Forensics and Incident ResponseNov 23, 2020
ATT&CK™ Your CTI w/ Lessons Learned from 4 Years in the Trenches - SANS CTI Summit 2019
SANS Digital Forensics and Incident ResponseNov 23, 2019
Triage Collection and Timeline Analysis with KAPE
SANS Digital Forensics and Incident ResponseOct 26, 2019
Survival Heuristics: My Favorite Techniques for Avoiding Intelligence Traps - SANS CTI Summit 2018
SANS Digital Forensics and Incident ResponseNov 22, 2018
What Event Logs? Part 1: Attacker Tricks to Remove Event Logs
SANS Digital Forensics and Incident ResponseOct 26, 2018
What Event Logs Part 2 Lateral Movement without Event Logs
SANS Digital Forensics and Incident ResponseOct 26, 2018
Threat Hunting in Security Operation - SANS Threat Hunting Summit 2017
SANS Digital Forensics and Incident ResponseNov 22, 2017
SANS DFIR Webcast - Memory Forensics for Incident Response
SANS Digital Forensics and Incident ResponseOct 26, 2015
PT48M50S








