We’ll start this series with a fireside chat with a seasoned threat researcher as he shares insights from behind the scenes. In addition to sharing unique experiences and regional examples he’ll discuss some of the intricacies of tracking human threat actors and our naming lore.
From unraveling complex operations to deciphering evolving tactics, this discussion promises a candid exploration into the ever-evolving landscape of cyber threats.