Blueprint: Build the Best in Cyber Defense cover image

Strategy 5: Prioritize Incident Response

Blueprint: Build the Best in Cyber Defense

00:00

How to Convince a Root Compromise

The first thing I'll talk about is following various threads. You start with one and you trace it to where they may have, you know, infiltrated something else. If there was lateral movement, this is where the kill chain comes in handy. Oh, here's where they were looking. Here's where they're taking some data out. And so it is that kill chain, but that's a real shorthand that we always use.

Transcript
Play full episode

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app