Lessons Learned from Incident Response
This talk will explore examples from real IR cases.
You will learn how threat actors can avoid AV/EDR detection, combat AD tiering, and bypass MFA authentication.
The presentation will also explain how data exfiltration can be contained and how encrypted data can be recovered (without a decryptor).