Learn the basics and use Command and Control (C2)
Consume Cyber Threat Intelligence from a known adversary
Extract adversary behaviors/TTPs and map to MITRE ATT&CK
Play the Red Team by creating and executing adversary emulation plans
Emulate the adversary behaviors in a small environment consisting of a domain controller, member server, and a Linux system
Play the role of the Blue Team and look for Indicators of Compromise and Behaviors
Use Wireshark to identify heartbeat and jitter
Enable Sysmon configurations to detect adversary behavior
Have FUN!
EXCLUSIVE VIP EVENTS SPONSORED BY IANS SOLD OUT!
Our exclusive VIP events are SOLD OUT! We look forward to connecting with everyone who registered!
Breakfast Mixers:
7:30 AM - 9:00 AM (PDT)
8/8, 8/9 and 8/10
Happy Hours:
4:30 PM - 7:00 PM (PDT)
8/7 & 8/9
8/8 --> *Happy Hour slated to begin around 6 PM - following the Founders Panel)
💥 BREAKING NEWS! Tonight's VIP Happy Hour is postponed until around 6 PM due to our Founders Panel, with an invite-only live audience. 🦄 Following the taping, look for a SCYTHE team member in the Mandalay Bay lobby by the elevators around 6 PM; she will bring you to the suite. We appreciate your patience, and we look forward to another fantastic event!
About the Founders Panel
The Founders Panel is moderated by SCYTHE CEO Bryson Bort. Join us as thought leaders share lessons learned from founding and running a cybersecurity startup. The invite-only event with a live audience will be hosted in the SCYTHE suite in Mandalay Bay!
Bios: