Targeted attacks are now focus at all levels of organization, industry, people, technology, or third parties; they are stealing anything of value. Many companies spend six and seven figures a year to support defending against these organizations. But many organizations, do not have the budget, manpower, or feel the need. This presentation is about how to do this using something that you have, in house, or what you can use from open source to start defending yourself. The MacGyver approach, while not the simplest approach, it allows for this to be successful, in finding the attacks, the command and control, the trends and allows you to stay almost on par with the attacking groups. You can adapt and change approaches, without relying on a single solution or technology. We will look at Logging, of what is valuable and what is useless crap. Giving up on high-ground and focus on what you can control. Looking at target groups (Email, Drive-by, Phishing, Stalking). How best to determine and respond to the attacks. The how and why inside an organization, and how and what to track. We don't have millions to spend and money is not the answer, Not perfect but better.