
Incident response: around the Hash Table.
CISO Perspectives (public)
00:00
Using the Experts in the Security Team
When we discover something, we start asking a lot of questions about rely just on the experts our security team. Sometimes it's adjacent teams, because we are a working with customersit not really an intimate situation s more. We saw some odd traffic once, and it was related to a customer. It turned out to be normal traffic. But the delay in geting the right person at the customers site to to weigh and say, i this expected communication. Of course it was.
Transcript
Play full episode