Tarot (Taz) Wake
Certified InstructorManaging Director (Information Security) at Halkyn Consulting Ltd
Specialities
Digital Forensics and Incident Response, Offensive Operations
Experience SANS training through course previews.
Learn MoreLet us help.
Contact usConnect, learn, and share with other cybersecurity professionals
Engage, challenge, and network with fellow CISOs in this exclusive community of security leaders
Become a member for instant access to our free resources.
Sign UpMission-focused cybersecurity training for government, defense, and education
Explore industry-specific programming and customized training solutions
Sponsor a SANS event or research paper
We're here to help.
Contact UsDigital Forensics and Incident Response, Offensive Operations
Taz is the author the FOR577: LINUX Incident Response & Threat Hunting course, and he also teaches the FOR508: Advanced Incident Response, Threat Hunting and Digital Forensics course. Like many in security, Tarot (Taz) started off in the military working in various Intelligence roles covering from SIGINT/Electronic Warfare (EW) and HUMINT activities in an offensive role to running Counterintelligence (CI) tasks protecting national assets. As the threat of Internet-delivered attacks increased, this became a greater area of focus of his as he realized how dangerous these were, not just to Governments, but to everyone.
Here are upcoming opportunities to train with this expert instructor.
Explore content featuring this instructor’s insights and expertise.
A lot of effort is put into building and configuring preventative controls for our IT environments. The idea makes sense, we want to prevent attacks. However, is this always the best option?
The increased size and complexity of enterprise networks, combined with the increasing scale of attacks means that we need to develop new ways to respond to our adversaries. In this talk we will look at the challenges faced during enterprise IR and how we can use triage & automation to help speed up our response.
A lot of the traditional techniques we use for incident response, and digital forensics, are too slow when dealing with the challenges of scale and time in a modern intrusion.
Time is critical during incident response. One way we can speed up is by becoming more efficient; this is definitely an area where AI (or really "LLM") technology can help. In this session, we will look at some of the areas where our DFIR teams can quickly use AI assistance to speed up their incident scoping and threat-hunting activities.
People often believe that Linux is a “secure” operating system or that they “don’t have much Linux” in their environment, so they “don’t need to worry about it.”
Review relevant educational resources made with contribution from this instructor.