Setting up and maintaining the right security measures is a hard task and in many cases usually costs a lot of time and money. Bypassing these measures is usually much easier. After all, the attackers have exactly the same means that companies use to protect themselves. So, it is very often a matter of time. For a correct holistic approach is it therefore important to think like a hacker and to understand the process followed by a hacker. During this session it will be explained how you can obtain the right threat intelligence with the information from your own environment, specific to your organization. And all of this completely agentless and for many different operating systems including Windows, Linux, iOS, etc..