Incident-ResponseActive Cyber Defence - Taking back controlBuilding Forensic Expertise: A Two-Part Guide to Investigating a Malicious USB Device (Part 2)Building Forensic Expertise: A Two-Part Guide to Investigating a Malicious USB Device (Part 1)Hunting the Snake: An Overview of Threat Hunting with VelociraptorButting Heads with a Threat Actor on an EngagementNo Logs? No Problem! Incident Response without Windows Event LogsPowerShell JobsRunning Once, <del>Running Twice</del>, Pwned! Windows Registry Run KeysShort introduction to Network Forensics and Indicators of Compromise (IoC)