top of page
![](https://static.wixstatic.com/media/6d64a8_83d7bb6ae88b4b73afd7ec8b86157812~mv2.png/v1/fill/w_96,h_47,al_c,q_85,usm_0.66_1.00_0.01,blur_2,enc_auto/6d64a8_83d7bb6ae88b4b73afd7ec8b86157812~mv2.png)
Time is TBD
|Virtual
RECAST: ICS SecOps: Active Defense with Effective Incident Response, with Can Kurnaz
The active defense concept combines threat intelligence, asset identification, network security monitoring, incident response and taking advantage of found threats.
![RECAST: ICS SecOps: Active Defense with Effective Incident Response, with Can Kurnaz](https://static.wixstatic.com/media/6d64a8_07ab6a753a24494fbdcf9786cf861bd5~mv2.png/v1/fill/w_72,h_72,al_c,q_85,usm_0.66_1.00_0.01,blur_2,enc_auto/6d64a8_07ab6a753a24494fbdcf9786cf861bd5~mv2.png)
![RECAST: ICS SecOps: Active Defense with Effective Incident Response, with Can Kurnaz](https://static.wixstatic.com/media/6d64a8_07ab6a753a24494fbdcf9786cf861bd5~mv2.png/v1/fill/w_72,h_72,al_c,q_85,usm_0.66_1.00_0.01,blur_2,enc_auto/6d64a8_07ab6a753a24494fbdcf9786cf861bd5~mv2.png)
bottom of page