December 14, 2018
9:00am - 3:00pm
Cisco Iselin, NJ Office
111 S Wood Avenue
Iselin, NJ 08830
In this full-day workshop, you will uncover best practices for threat hunting, learn how to incorporate threat hunting into your daily workflow, network with your peers to share strategies and techniques, and execute four real-world lab scenarios:
1. Hunt and Contain
A new threat is making headlines and your executives want complete answers fast. You need to know if it is inside your organization and how to contain it.
2. Catch the Phish
You have evidence that a remote user was phished. Follow the attack from entry to execution.
3. Event Overload
Hundreds of events are clamoring for your attention, but you have a plan to prioritize and execute a response.
4. Screenshot Holds the Clue
There’s not much to go on – just a single screenshot – but that’s all you need to trace the attack back to the entry point.
Bring your laptop – we’re looking forward to seeing you there!