CYBERSEC 2022 uses cookies to provide you with the best user experience possible. By continuing to use this site, you agree to the terms in our Privacy Policy. I Agree
This topic first discusses the various requirements of regulations, threats, and resilience that corporate blue teams need to face, and then, based on the above-mentioned requirements, if an enterprise needs to build an autonomous blue team, the capabilities and resource requirements it needs to have, and through the concepts of BAS and MITRE ATT&CK and related tools or solutions to discuss how to conduct blue team verification, and finally integrate the enterprise blue team theory of how to continuously evolve.
Jack Chou currently co-founds Gertech Technology and serves as an information security consultant. Through his own experience, he assists enterprises to introduce information security solutions and strengthen their Threat Hunting and Incident Response capabilities.
In the past, he assisted the procuratorial unit in investigating major cyber crimes and the intrusion of the CCP’s cyber army. After returning to the private enterprise, he assisted the enterprise in establishing APT protection and handling information security incidents. This page shares recent hacking trends and IR experiences.