0:00:30.206,0:00:37.260 Hello and good evening on day two of the chaos communication Camp 2023 Translated by {Yang}{Li} (ITKST56 course assignment at JYU.FI)] 0:00:37.260,0:00:42.187 it's late in the evening this is meleeway stage in case you're wondering 0:00:42.230,0:00:48.176 and the next talk is going to be about incident report responses 0:00:48.476,0:00:59.520 so if you're curious about how to even get there to have an incident response how you could [br]prepare for an incident response and how you could support a new organization 0:00:59.520,0:01:07.258 uh, the incident response team in doing the job and trying to fix whatever broke 0:01:07.258,0:01:11.677 let's put it that way um we have the right talk for you 0:01:11.677,0:01:17.352 this is stories from the life of an incident from incident responders Harry and Chris 0:01:17.352,0:01:23.500 please a very warm Round of Applause [Applause] 0:01:28.925,0:01:36.675 so, good evening and thank you for joining us today um we will tell you a little bit of our 0:01:36.675,0:01:43.664 life as incident responders and I'm Chris I did my computer science 0:01:43.664,0:01:48.784 studies at the University of alang and Nuremberg I do this security stuff for 0:01:48.784,0:01:55.394 over 10 years now so my CV is a little bit longer at the moment I'm a detection 0:01:55.415,0:02:01.425 engineer before that I was a long time working in dfir so digital forensic incident 0:02:01.425,0:02:06.062 response in different organizations and 0:02:07.411,0:02:12.388 yeah I'm Harryr I studied electrical and computer engineering at RWTH 0:02:12.395,0:02:18.165 University and I played a lot of CTF and did some hacking stuff at chaos computer club RWTH 0:02:18.165,0:02:24.523 during my masters I worked at x41 dsac doing pen testing patch analysis 0:02:24.589,0:02:32.359 so I also have some kind of offensive security background on for around one year now I'm working at G data Advanced 9:59:59.000,9:59:59.000 analytics doing digital forensics and incident handling