![Talkin' Bout [Infosec] News cover image](https://share.snipd.com/share-image/resize?url=https%3A%2F%2Fimg.transistorcdn.com%2FUAhpjUNHpNuybv4SblS0r2QDlIgiJh1YYqyW2ffruGg%2Frs%3Afill%3A0%3A0%3A1%2Fw%3A1400%2Fh%3A1400%2Fq%3A60%2Fmb%3A500000%2FaHR0cHM6Ly9pbWct%2FdXBsb2FkLXByb2R1%2FY3Rpb24udHJhbnNp%2Fc3Rvci5mbS8yMzEy%2FZTE3ZDNlNjI5YTcw%2FZjAzNzNmOWQ4OGRm%2FMWRiZS5qcGc.jpg&width=320&height=320)
Talkin’ About Infosec News – 6/21/2023
Talkin' Bout [Infosec] News
00:00
How to Prevent and Prioritize Attacks
Bryce: I have an analogy when it comes to preparing for attacks and prioritizing attacks. So if somebody wants me to say, let's consider all the risk in all, all the attacks that are happening,. And let's spend a couple months prioritizing. He says instead we could take tools like the minor attack framework that have played out the swole matrix of here's things the attackers do. Bryce: Do you know of anything that anybody has done like a post exploitation heat map?
Play episode from 20:21
Transcript


