The demo shows how: * IBM's integrated SIEM and SOAR technology successfully detects phishing involving a real malware site * A Metasploit module being used in a pass-the-hash attack * The User Behaviour Analytics app automatically dashboarding internal threat * DNS Tunneling being used for C2 and exfiltration

Event Details

See how QRadar detects a real attack using the latest hacking techniques


Available On Demand until