<

Challenges Impairing Cyber Security Operations in Threat Hunting | Muneeb Imran Shaikh

Posted on
3,110 Points
10 Views
1 Endorsement
Last Modified:
Published
Experience Level: Advanced
38:20
Muneeb Imran Shaikh
Strategy, Governance & Risk Consultant | Cyber Threat Intelligence Specialist | Privacy ISO27701 LI |ISO 27001 LI | COBIT 2019
This video is part of the recorded Webinar from Muneeb Imran Shaikh, an expert in Information Security Governance, Risk & Cyber Threat Intelligence.

The Webinar was conducted to discuss the fundamental issues that need to be resolved before team embark on their journey to Treat Hunting.

https://www.linkedin.com/in/muneebimranshaikh/
https://www.experts-exchange.com/members/MuneebImran-Shaikh.html
1
0 Comments
The following article deals with account lockout policies as you may find in (but not limited to) Windows domains.  The issues discussed apply to all Windows domains whose authentication relies on passwords alone (as opposed to multifactor authentic…
This article is about my concept of combining TPM Virtual SmartCards with standard USB sticks to achieve true 2-factor windows domain authentication at no additional cost. If you feel like trying it for yourself, you will need a domain certification…