Aqueduct Technologies and Cisco hosted a hands-on Threat Hunting Workshop to develop skills and test attendee’s abilities!
With an unprecedented increase in cyber attacks, coupled with an ever growing talent shortage, many organizations are put in hard to defend positions. Organizations around the world have now realized that sitting back and waiting for an alert puts them in a dangerous position.
What separates security pros from security liabilities? A plan – and practice. In this full-day workshop, attendees uncovered best practices for threat hunting, learned how to incorporate threat hunting into their daily workflow, networked with your peers to share strategies and techniques, and executed four real-world lab scenarios:
- Hunt and Contain
A new threat is making headlines and your executives want complete answers fast. You need to know if it is inside your organization and how to contain it.
- Catch the Phish
You have evidence that a remote user was phished. Follow the attack from entry to execution.
- Event Overload
Hundreds of events are clamoring for your attention, but you have a plan to prioritize and execute a response.
- Screenshot Holds the Clue
There’s not much to go on – just a single screenshot – but that’s all you need to trace the attack back to the entry point.
Date: Thursday, March 14th, 2019
Time: 9:00am-1:00pm EST
Location: 333 Wyman St, Suite 300, Waltham, MA 02451