How to Build a Cyber Defense Capability that can detect, process and remediate Cyber Security Events. Presentation starts with sourcing Threat Intelligence, then moves to Ingesting Log Sources, processing through SIEM and triage
Scott Sattler has 20 Years In Cyber Defense and currently works as a Incident Responder and Cyber Forensic Manager.