Chapters
Transcript
Episode notes
1 2 3 4 5 6 7 8 9 10
Introduction
00:00 • 4min
The Trends in Incident Response
04:10 • 3min
Cloud Attacks in M365
06:55 • 2min
How to Deal With Crypto Mining Attacks
09:04 • 3min
The Rise of Social Engineering and Phishing
11:42 • 5min
The Importance of Small Business Email Compromise
17:10 • 3min
The Importance of Basic Security Controls
20:05 • 3min
Common Mistakes That End Up Being Breaches
22:35 • 3min
The Value of a Protected Access Workstation
25:30 • 4min
The Benefits of Having a Hard Technical Control
29:12 • 5min