WTolsdorf

2nd place

250 points


Awards


Solves

Challenge Category Value Time
19 - Threat Detection Incident Response: Threat Center IV 0: New-Scale 101, Compromised Insider, Malicious Insider 10
18 - Threat Detection Incident Response: Threat Center III 0: New-Scale 101, Compromised Insider, Malicious Insider 15
17 - Threat Detection Incident Response: Threat Center II 0: New-Scale 101, Compromised Insider, Malicious Insider 15
16 - Threat Detection Incident Response: Threat Center I 0: New-Scale 101, Compromised Insider, Malicious Insider 10
15 - Security Management: Threat Detection Management VI 0: New-Scale 101, Compromised Insider, Malicious Insider 10
14 - Security Management: Threat Detection Management V 0: New-Scale 101, Compromised Insider, Malicious Insider 10
13 - Security Management: Threat Detection Management IV 0: New-Scale 101, Compromised Insider, Malicious Insider 20
12 - Security Management: Threat Detection Management III 0: New-Scale 101, Compromised Insider, Malicious Insider 25
11 - Security Management: Threat Detection Management II 0: New-Scale 101, Compromised Insider, Malicious Insider 15
10 - Security Management: Threat Detection Management I 0: New-Scale 101, Compromised Insider, Malicious Insider 25
9 - Attack Surface Insights: Devices 0: New-Scale 101, Compromised Insider, Malicious Insider 10
8 - Attack Surface Insights: Users 0: New-Scale 101, Compromised Insider, Malicious Insider 10
7 - Context Management II 0: New-Scale 101, Compromised Insider, Malicious Insider 15
6 - Context Management I 0: New-Scale 101, Compromised Insider, Malicious Insider 10
5 - Log Stream: Enrichment 0: New-Scale 101, Compromised Insider, Malicious Insider 10
4 - Log Stream: Parsers II 0: New-Scale 101, Compromised Insider, Malicious Insider 15
3 - Log Stream: Parsers I 0: New-Scale 101, Compromised Insider, Malicious Insider 10
2 - Collection 0: New-Scale 101, Compromised Insider, Malicious Insider 10
1 - Platform Overview: Start Here! 0: New-Scale 101, Compromised Insider, Malicious Insider 5