BEGIN:VCALENDAR
PRODID:-//vBulletin 6//EN
VERSION:2.0
CALSCALE:GREGORIAN
BEGIN:VEVENT
UID:3000220d-3e9f-4157-9272-7d9132532637
DTSTAMP:20260418T224453Z
SUMMARY:Intrusion Analysis and Threat Hunting with Open Source Tools
DESCRIPTION:In today's threat landscape\, sophisticated adversaries have ro
 utinely demonstrated the ability to compromise enterprise networks and rem
 ain hidden for extended periods of time. In Intrusion Analysis and Threat 
 Hunting with Open Source Tools\, you will learn how to dig deep into netwo
 rk traffic to identify key evidence that a compromise has occurred\, learn
  how to deal with new forms of attack\, and develop the skills necessary t
 o proactively search for evidence of new breaches. We will explore key pha
 ses of adversary tactics and techniques - from delivery mechanisms to post
 -infection traffic to get hands-on analysis experience. Open-source tools 
 such as Suricata and Moloch will be utilized to generate data\, perform ex
 haustive traffic analysis\, and develop comprehensive threat hunting strat
 egies. By the end of this workshop\, you will have the knowledge and skill
 s necessary to discover new threats in your network.\n\nSpeaker(s): Jack M
 ott\, Jason Williams\, Josh Stroschein\n\nLocation: Packet Hacking Vlg\n\n
 Discord: https://discord.com/channels/708208267699945503/70824237688330652
 6\n\nEvent starts: 2020-08-07 13:00 (01:00 PM) PDT (UTC -07:00)\n\nEvent e
 nds: 2020-08-07 15:00 (03:00 PM) PDT (UTC -07:00)\n\nFor the most up-to-da
 te information\, please either visit https://info.defcon.org\, or use Hack
 erTracker\, which is available for iOS and Android. This is an automated m
 essage\, and this data was last modified 2020-07-29T01:18 (UTC).
URL:https://forum.defcon.org/node/234258
DTSTART:20200807T210000Z
DTEND:20200807T230001Z
LOCATION:Packet Hacking Vlg
END:VEVENT
END:VCALENDAR
