WebinarsSecurity operations
Chris Rothe

Security Operations for the Mid Enterprise

Mid-sized organizations are frequent targets of advanced attacks, but they lack the tools, time, or people to adequately defend themselves.

 
 
Comparing open source adversary emulation platforms for red teams
 
Invoke-Atomic leaves the nest
 
Testing initial access with “Generate-Macro” in Atomic Red Team
 
Testing the Top MITRE ATT&CK Techniques: PowerShell, Scripting, Regsvr32