Personal Information
Organização/Local de trabalho
Singapore Singapore
Cargo
Development Programme Manager (Cyber Sensemaking) at DSTA
Sobre
Incident Response, Log Analysis, Cyber Monitoring, Intrusion Detection, Vulnerability Assessment, Security Infrastructure, Threat Intelligence
- Apresentações
- Documentos
- Infográficos
Introduction to Web Application Security - Blackhoodie US 2018
Niranjanaa Ragupathy
•
Há 5 anos
BlueHat v18 || First strontium uefi rootkit unveiled
BlueHat Security Conference
•
Há 5 anos
BlueHat v18 || Killsuit the equation group's swiss army knife for persistence, evasion, and data exfil
BlueHat Security Conference
•
Há 5 anos
BlueHat v18 || Tales from the soc - real-world attacks seen through azure atp and windows defender atp
BlueHat Security Conference
•
Há 5 anos
OWASP AppSecEU 2018 – Attacking "Modern" Web Technologies
Frans Rosén
•
Há 5 anos
CONFidence 2018: Who and why should fear hardware trojans? (Adam Kostrzewa)
PROIDEA
•
Há 5 anos
Malware Evasion Techniques
Thomas Roccia
•
Há 6 anos
42 - Malware - Understand the Threat and How to Respond
Thomas Roccia
•
Há 6 anos
Designing the Future: When Fact Meets Fiction
Dean Johnson
•
Há 8 anos
The AI Rush
Jean-Baptiste Dumont
•
Há 6 anos
Targeted attacks on major industry sectors in south korea 20171201 cha minseok_avar 2017 beijing_full version
Minseok(Jacky) Cha
•
Há 6 anos
10(?) holiday gifts for the SOC who has everything
Ryan Kovar
•
Há 6 anos
Adversarial Simulation Nickerson/Gates Wild West Hacking Fest Oct 2017
Chris Gates
•
Há 6 anos
Three Considerations To Amplify Your Detection and Response Program
Morphick
•
Há 7 anos
Examining Malware with Python
mrphilroth
•
Há 8 anos
Threat Hunting
Splunk
•
Há 6 anos