Identity-First Security: A 10-Minute Primer
A 10-minute video explaining why identity is the new perimeter, with three concrete control patterns: just-in-time access, conditional access, and continuous verification.
Browse
6 certifications. Updated daily.
Showing 4 opportunities
A 10-minute video explaining why identity is the new perimeter, with three concrete control patterns: just-in-time access, conditional access, and continuous verification.
A 15-minute primer on running Atomic Red Team tests safely against your own detections. Covers test selection, scoping, and how to feed results back into detection engineering.
How to author, test, and tune Sigma detections that survive contact with reality. Covers ATT&CK alignment, false-positive triage, and a CI pipeline for detections-as-code.
A half-day workshop walking through the full CTI lifecycle — direction, collection, processing, analysis, dissemination — with templates for stakeholder PIRs and finished products.