BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//Antisyphon Training - ECPv6.15.20//NONSGML v1.0//EN
CALSCALE:GREGORIAN
METHOD:PUBLISH
X-WR-CALNAME:Antisyphon Training
X-ORIGINAL-URL:https://www.antisyphontraining.com
X-WR-CALDESC:Events for Antisyphon Training
REFRESH-INTERVAL;VALUE=DURATION:PT1H
X-Robots-Tag:noindex
X-PUBLISHED-TTL:PT1H
BEGIN:VTIMEZONE
TZID:America/New_York
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20240310T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20241103T060000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20250309T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20251102T060000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20260308T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20261101T060000
END:STANDARD
END:VTIMEZONE
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20250616T110000
DTEND;TZID=America/New_York:20250619T160000
DTSTAMP:20260429T085358
CREATED:20250314T163654Z
LAST-MODIFIED:20250609T201120Z
UID:10000749-1750071600-1750348800@www.antisyphontraining.com
SUMMARY:Active Defense and Cyber Deception with John Strand
DESCRIPTION:
URL:https://www.antisyphontraining.com/event/active-defense-and-cyber-deception-with-john-strand-3/
CATEGORIES:Blue Team,Featured,Pay What You Can
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20250618T120000
DTEND;TZID=America/New_York:20250618T130000
DTSTAMP:20260429T085358
CREATED:20250520T234719Z
LAST-MODIFIED:20250520T234724Z
UID:10000790-1750248000-1750251600@www.antisyphontraining.com
SUMMARY:Anti-Cast: Hacking Humans: Social Engineering & Elicitation Tactics with Dorota Kozłowska
DESCRIPTION:Join us for a free one-hour Antisyphon Anticast with Dorota Kozłowska\, on the human side of hacking.  \n\n\n\nLearn how attackers exploit trust through elicitation\, pretexting\, and manipulation—and how to protect against it. \n\n\n\n Topics include: \n\n\n\n\nWhat is social engineering?\n\n\n\nPretexting: Becoming anyone you want to be\n\n\n\nFour phases of a social engineering attack\n\n\n\nElicitation techniques and countermeasures\n\n\n\nBuilding rapport to gain access\n\n\n\nReal-world examples of human hacks\n\n\n\nSkills every social engineer (and defender) should know\n\n\n\nDiscover how to think like an attacker. \n\n\n\n\n \n\n\n\n\nRegister Here\n\n\n\n\nJoin us for PreShow Banter™ at 11:30 AM ETChat with your fellow attendees in the BHIS Discord server:https://discord.gg/bhis in the #🔴live-chat channel \n\n\n\nStay up to date on our upcoming live Anti-Casts and more at https://poweredbybhis.com \n\n\n\nDon’t forget to check out our Course Catalog for our upcoming free and affordable cybersecurity training!
URL:https://www.antisyphontraining.com/event/anti-cast-hacking-humans-social-engineering-elicitation-tactics-with-dorota-kozlowska/
CATEGORIES:Anti-Cast
ATTACH;FMTTYPE=image/webp:https://www.antisyphontraining.com/wp-content/uploads/2025/05/Hacking-Humans-Social-Engineering-Elicitation-Tactics-w-Dorota-Kozlowska-MAIN.webp
END:VEVENT
END:VCALENDAR