WebinarsSecurity operations
Chris Rothe

Security Operations for the Mid Enterprise

Mid-sized organizations are frequent targets of advanced attacks, but they lack the tools, time, or people to adequately defend themselves.

Comparing open source adversary emulation platforms for red teams
Invoke-Atomic leaves the nest
Testing initial access with “Generate-Macro” in Atomic Red Team
Testing the Top MITRE ATT&CK Techniques: PowerShell, Scripting, Regsvr32