Let’s together see how the cyberattack shows up on the console of the security administrator and how they can effectively investigate what actually happened. In the hands-on demo, we’ll have an opportunity to look up the traces of the attacker in the various event logs, re-build the chain of actions the attacker did in the environment, and we’ll also find out if any sensitive data actually leaked.
Speaker: Jakub Jiricek, Systems Engineer Specialist – Cortex, Palo Alto Networks