BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//pretalx//sched.securitybsides.org.uk//bsides-london-2023//talk//Y
 Z3RT7
BEGIN:VTIMEZONE
TZID:GMT
BEGIN:STANDARD
DTSTART:20001029T030000
RRULE:FREQ=YEARLY;BYDAY=-1SU;BYMONTH=10
TZNAME:GMT
TZOFFSETFROM:+0100
TZOFFSETTO:+0000
END:STANDARD
BEGIN:DAYLIGHT
DTSTART:20000326T020000
RRULE:FREQ=YEARLY;BYDAY=-1SU;BYMONTH=3
TZNAME:BST
TZOFFSETFROM:+0000
TZOFFSETTO:+0100
END:DAYLIGHT
END:VTIMEZONE
BEGIN:VEVENT
UID:pretalx-bsides-london-2023-YZ3RT7@sched.securitybsides.org.uk
DTSTART;TZID=GMT:20231209T145000
DTEND;TZID=GMT:20231209T153500
DESCRIPTION:Threat Actors employ anti-forensics techniques that obscure som
 e of their activity and make it more difficult to determine what actions t
 heir have performed on compromised systems. Investigators need to be aware
  of these techniques\, and be equipped with solutions (or detection ideas)
  to defeat the anti-forensics measures they take.
DTSTAMP:20260418T200716Z
LOCATION:Clappy Monkey Track
SUMMARY:Anti-forensics techniques used by Threat Actors in the Wild - Hela 
 Lucas
URL:https://sched.securitybsides.org.uk/bsides-london-2023/talk/YZ3RT7/
END:VEVENT
END:VCALENDAR
