We received a large number of submissions, bear with us while we’re scooping across the stack!
We’ll update you on your submission status ASAP!
Thank you!
With the evolution of attack surfaces, attacker skills, zero-day exploits and supply chain attacks, it is no longer possible to solely rely on prevention to ensure a company’s security. Therefore, it is crucial to use detection mechanisms, as well as response and investigation capabilities.
After an overview of Red Team operations and the ecosystem of Blue Team defenses, we dive into complexity of stealth, detection, and response strategies. Real-world feedbacks and examples highlighting common Blue Team errors, blind spots in cybersecurity defense, and lessons learned from cybersecurity incidents will be presented.
This talk would be the opportunity for Red Teamers and pentesters to gain a better understanding of the concept of stealth and adapt their approaches accordingly. Blue Teamers will gain valuable insights to strengthen their organization’s defense capabilities. Additionally, professionals across various roles and industries will gain a comprehensive overview of stealth and detection concerns.
After many years of penetration testing and source code review, now focusing on Red Team Operations, Adversary Simulation and Purple Team exercises.
We received a large number of submissions, bear with us while we’re scooping across the stack!
We’ll update you on your submission status ASAP!
Thank you!
Early Birds had been raffled!
STANDARD TICKETS are still available but flying away, quick!
For the 20th year, leHACK will host a prestigious talk lineup.
Wether you are a security researcher, a hacker,a freak, or a unicorn, you can come on stage and share your unique knowledge with your pairs.