Speaker

Miriam Wiesner

Miriam Wiesner

Microsoft

Freiburg, Germany

Actions

Miriam C. Wiesner is a Sr. Security Research Program Manager at Microsoft, with more than 15 years of experience in IT and IT Security. She has held various positions, including Administrator/System Engineer, Software Developer, Premier Field Engineer, Program Manager, Security Consultant & Pentester, and Security Researcher.

She is also a renowned creator of open-source tools based in PowerShell, including EventList and JEAnalyzer. She was invited multiple times to present her research behind her tools at international conferences like Black Hat (USA, Europe & Asia), BlueHat, PSConf EU, MITRE ATT&CK workshop, and more.

Miriam is the author of the book "PowerShell Automation and Scripting for CyberSecurity: Hacking and Defense for Red and Blue Teamers", which was released in August 2023.

Area of Expertise

  • Information & Communications Technology

Topics

  • Security
  • IT Security
  • cyber security
  • Information Security
  • just enough administration
  • JEA
  • Event Log
  • security operations center
  • PowerShell
  • PAW
  • Tiering
  • Secure Infrastructure
  • Log Analytics
  • Azure Log Analytics
  • EventList
  • MITRE ATT&CK

When Defenders think in Graphs: Unveiling Attack Paths with PowerShell

Attackers look for the shortest path to compromise your environment. Within no time they know what vulnerabilities and flaws exist. How quickly can you detect and mitigate those risks in your network?

In this session we will explore how to use PowerShell to navigate Microsoft's Attack Graph, enabling security professionals to proactively identify and respond to vulnerabilities and malicious behaviors across all entities in the network.

Whether you are managing a single network or large-scale enterprise, join us to enhance your defense strategy to stay on top of potential attackers.

Find your North Star goal: Unlocking the Secrets to Success for your career

Career development can sometimes feel overwhelming, especially when you’re unsure of the next step to take.

Whether you’re starting out or planning a career change, this session will provide you with strategies that have helped both me and my mentees. We’ll explore how to stay motivated through challenges, evaluate opportunities, and ensure that your next move aligns with your long-term career vision.

By the end of this session, you will have a clearer, more confident approach to navigating your career journey, along with actionable steps to move forward.

Practical PowerShell Empowerment For Protectors (Blue Team)

Attention, blue team heroes! Are you seeking to elevate your cybersecurity defense game with cutting-edge automation? Prepare to revolutionize your Digital Forensics and Incident Response (DFIR) toolkit!

In this session, Miriam Wiesner, author of "PowerShell Automation and Scripting for CyberSecurity: Hacking and Defense for Red and Blue Teamers," unveils a curated collection of scripts tailored specifically for blue team practitioners. While offering insights and scripts from her book, Miriam also introduces brand new blue team practitioner scripts fresh off the keyboard to amplify your efficiency and effectiveness.

Join us to empower yourself with the tools needed to fortify your defenses, optimize incident response workflows, and conquer the challenges of cybersecurity with unparalleled efficiency.

Echoes of Intrusion: Demystifying commonly used MS Graph API Attacks

Take a peak behind the curtains of how adversaries (ab)use MS Graph API to breach corporate defenses, implant persistence mechanisms, and exfiltrate sensitive data. Through live demonstrations, we will simulate the execution of potential attack scenarios, providing invaluable insights into the adversary's playbook.

Explore attack scenarios from the field and learn how to detect such an attack by using MS Graph logs. Are you ready to dive into real world threat actors' tactics and how to defend your environment?

What the log?! So many events, so little time…

Detecting adversaries is not always easy. Especially when it comes to correlating Windows Event Logs to real-world attack patterns and techniques.

Join me to find out how to match Windows Event Log IDs with the MITRE ATT&CK framework and methods to simplify the detection in your environment.

Miriam Wiesner

Microsoft

Freiburg, Germany

Actions

Please note that Sessionize is not responsible for the accuracy or validity of the data provided by speakers. If you suspect this profile to be fake or spam, please let us know.

Jump to top