Personal Information
Entreprise/Lieu de travail
Singapore Singapore
Profession
Development Programme Manager (Cyber Sensemaking) at DSTA
À propos
Incident Response, Log Analysis, Cyber Monitoring, Intrusion Detection, Vulnerability Assessment, Security Infrastructure, Threat Intelligence
- Présentations
- Documents
- Infographies
Building a Cyber Threat Intelligence Knowledge Management System (Paris August 2019)
Vaticle
•
il y a 4 ans
Introduction to Web Application Security - Blackhoodie US 2018
Niranjanaa Ragupathy
•
il y a 5 ans
BlueHat v18 || First strontium uefi rootkit unveiled
BlueHat Security Conference
•
il y a 5 ans
BlueHat v18 || Killsuit the equation group's swiss army knife for persistence, evasion, and data exfil
BlueHat Security Conference
•
il y a 5 ans
BlueHat v18 || Tales from the soc - real-world attacks seen through azure atp and windows defender atp
BlueHat Security Conference
•
il y a 5 ans
OWASP AppSecEU 2018 – Attacking "Modern" Web Technologies
Frans Rosén
•
il y a 5 ans
CONFidence 2018: Who and why should fear hardware trojans? (Adam Kostrzewa)
PROIDEA
•
il y a 5 ans
CONFidence 2018: Everything’s Connected aka Threat Intelligence 102 (Marcin Siedlarz)
PROIDEA
•
il y a 5 ans
Malware Evasion Techniques
Thomas Roccia
•
il y a 6 ans
42 - Malware - Understand the Threat and How to Respond
Thomas Roccia
•
il y a 6 ans
Designing the Future: When Fact Meets Fiction
Dean Johnson
•
il y a 8 ans
The AI Rush
Jean-Baptiste Dumont
•
il y a 6 ans
Targeted attacks on major industry sectors in south korea 20171201 cha minseok_avar 2017 beijing_full version
Minseok(Jacky) Cha
•
il y a 6 ans
10(?) holiday gifts for the SOC who has everything
Ryan Kovar
•
il y a 6 ans
Adversarial Simulation Nickerson/Gates Wild West Hacking Fest Oct 2017
Chris Gates
•
il y a 6 ans
Three Considerations To Amplify Your Detection and Response Program
Morphick
•
il y a 7 ans
Examining Malware with Python
mrphilroth
•
il y a 8 ans
Threat Hunting
Splunk
•
il y a 6 ans