March 31, 2023, 8:28 p.m. | SANS Digital Forensics and Incident Response

SANS Digital Forensics and Incident Response www.youtube.com

For many years, memory forensics had been the optimal method of gaining insight into a compromised machine. However, as breaches became more far-reaching and numerous computers were affected, classic memory forensics no longer proved sufficient. In this modern age, through the utilization of contemporary tools and information, memory forensics is again feasible even on a grand scale. This provides a wonderful chance to improve the tracking of attackers, understand their techniques, and support Security Operations Centers in developing specialized detection …

age attackers breaches centers compromised computers detection forensics information insight large machine memory memory forensics operations protocols respond scale security security operations support techniques tools tracking understand

CyberSOC Technical Lead

@ Integrity360 | Sandyford, Dublin, Ireland

Cyber Security Strategy Consultant

@ Capco | New York City

Cyber Security Senior Consultant

@ Capco | Chicago, IL

Sr. Product Manager

@ MixMode | Remote, US

Security Compliance Strategist

@ Grab | Petaling Jaya, Malaysia

Cloud Security Architect, Lead

@ Booz Allen Hamilton | USA, VA, McLean (1500 Tysons McLean Dr)