Chapters
Transcript
Episode notes
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19
Introduction
00:00 • 2min
The Red Team vs the Blue Team
01:37 • 2min
Miter Attack for Defensive Countermeasures
03:49 • 2min
What Is in There and What's Not in There?
05:26 • 3min
Aa Prioritize, Kind of Like, What Applyes Here Most?
08:09 • 2min
Detection, Mitigation, Desection
10:04 • 2min
Is There a Better Way to Map Backwards?
12:00 • 3min
Is There a Revolving Door to Threat Intelligence?
14:44 • 3min
Siver Analytic Repository - What's in There?
17:18 • 2min
Blue Team Fundamentals - The Best Course Ever
19:30 • 4min
Hosspace Analytics
23:33 • 2min
Detecting Taxes
25:16 • 2min
Is There a Priorization of Things?
26:51 • 2min
How Many Different Techniques Can You Find?
29:00 • 2min
Is There a Common Choke Point?
31:12 • 2min
Is There a Choke Point in Attack Techniques?
32:42 • 2min
Is There a Way to Contribute to Miter Attack?
34:55 • 3min
The Defensive Matrix - Are We Going to Integrate It Together?
37:50 • 2min
Is There a Mitr Attack Defense Defender?
39:37 • 3min