Quickly and efficiently build the materials you need to support your inbound marketing strategy. Drag and drop building blocks including testimonials, forms, calls-to-action, and more.
We look forward to uniting visionary leaders to examine the industry's challenges and most pressing issues, insights regarding the recent SEC incident reporting regulations, and strategies to bolster your organization's cyber defenses. RSVP today for an exclusive, invite-only dining experience with cybersecurity leadership.
As an intimate, executive-level event, attendance is reserved for C-Suite, Operational executives, Directors, Senior Managers and Risk Management Security Leaders.
Learn the basics and use Command and Control (C2)
Consume Cyber Threat Intelligence from a known adversary
Extract adversary behaviors/TTPs and map to MITRE ATT&CK
Play the Red Team by creating and executing adversary emulation plans
Emulate the adversary behaviors in a small environment consisting of a domain controller, member server, and a Linux system
Play the role of the Blue Team and look for Indicators of Compromise and Behaviors
Use Wireshark to identify heartbeat and jitter
Enable Sysmon configurations to detect adversary behavior
Have FUN!
Quickly and efficiently build the materials you need to support your inbound marketing strategy. Drag and drop building blocks including testimonials, forms, calls-to-action, and more.