TechTalkTuesday

HowToUseFTKImagerToTakeDiskAndMemoryImagesForFree

How To Use FTK Imager To Take Disk And Memory Images For Free

Unlock the power of digital forensics with FTK Imager! In this week’s #TechTalkTuesday, we’ll show you how to create disk and memory images using this free and versatile tool. Whether you’re a seasoned cyber investigator or just getting started, this step-by-step guide will help you acquire crucial evidence for forensic analysis, incident response, and cyber threat hunting.

Join us as we explore the best practices for imaging and learn how to extract valuable data from your captures.

Breaking Into Industrial Cybersecurity

Breaking Into Industrial Cybersecurity: What It Is, How To Get Into The Field, And Common Mistakes

Aaron Crow went from being OT tech support within a power generation facility to being responsible for cybersecurity, pivoted into consulting, and eventually became the CTO of a cybersecurity company. In this #TechTalkTuesday, he talks about industrial/OT cybersecurity, how he got into the field, how people just starting out can get into the field and common mistakes that asset owners make securing critical infrastructure facilities.

How To Detect Malicious Network Share Usage With The Windows Event Logs When Threat Hunting

How To Detect Malicious Network Share Usage With The Windows Event Logs When Threat Hunting

How To Detect Malicious Network Share Usage With The Windows Event Logs When Threat Hunting Description In this edition of #TechTalkTuesday we discuss the detection of malicious network share usage with the Windows Event Logs when threat hunting. By understanding what malicious network share activity looks like, you can quickly and easily investigate potential threats. …

How To Detect Malicious Network Share Usage With The Windows Event Logs When Threat Hunting Read More ยป

Scroll to Top