/// 🔗 Register for webcasts, summits, and workshops – https://blackhillsinfosec.zoom.us/ze/hub/stadium How I started my summer vacation: Navigating My First Incident in the Cloud – Josh Hankins In this presentation, I’ll share my firsthand experience managing an event entirely based in the cloud. Buckle up for “The …
/// 🔗 Register for webcasts, summits, and workshops – https://blackhillsinfosec.zoom.us/ze/hub/stadium Where Do We Begin? – Panel Discussion | I.R. Summit 2024 John Strand, Derek Banks, Troy Wojewoda, Alissa Torres, Gerry Johansen –Where do we start after an incident? –Current trends in Incident Response –Reducing False …
In this video, Whitney and Eric discuss the powerful capabilities of Velociraptor in threat hunting and incident response. They delve into its ease of deployment, versatile use-cases, and how it significantly enhances cybersecurity measures without high costs.
In this video, John Strand discusses the essential Linux commands for initial forensic analysis when suspecting a system compromise. He demonstrates how to use Lsof to identify and investigate open files and network connections, providing insights into process IDs and associated resources.
In this video, the speakers discuss the card game ‘Backdoors and Breaches’ which involves incident response and cybersecurity tactics. They explain the rules, procedures, and strategies for playing the game, using it as a tool for security training and awareness.
Join us Next Wednesday for our first ever Incident Response CTF Competition hosted by our friends at @metactf ! For more information on our FREE CTF Competition or our FREE Incident Response Summit, you visit us here: https://www.antisyphontraining.com/event/incident-response-summit/
In this video, the speakers discuss the effectiveness and accessibility of free and open-source Endpoint Detection and Response (EDR) tools. They explore the recent developments in the space, highlighting how these tools are now more accessible to smaller organizations due to their cost-effectiveness.
/// 🔗 Register for webcasts, summits, and workshops – https://blackhillsinfosec.zoom.us/ze/hub/stadium 🛝 Webcast Slides – https://www.antisyphontraining.com/wp-content/uploads/2024/05/2024_05_29_anticast_Realistic-End-to-End-Attacks-Detective-Controls_Jeff-McJunkin.pdf Jeff reveals the five ways outside attackers gain internal access and outlines three core defender objectives: Reducing initial access.Lowering detection and response time.Slowing down the attackers. Discover actionable insights through …