SEE ALL EVENTS

Filters

Changing any of the form inputs will cause the list of events to refresh with the filtered results.

SOC Summit Talk: Practical Email Forensics with EML Analyzer

In this 25-minute technical presentation, Seth Williams will walk through hands-on email forensics using Sublime Security’s free EML Analyzer, teaching you how to break down raw email files to uncover the true mechanics of phishing, malware delivery, and social engineering attacks.

SOC Summit Talk: Augmented Detection Engineering

Join Wade Wells (Staff Detection & Response Engineer) for a 25-minute, conversational walk-through of how AI can boost every part of the detection lifecycle, from generating new detection ideas and tightening logic to evaluating coverage, finding blind spots, and automating documentation.

SOC Summit Talk: Static Email Analysis

Join Ched Wiggins (Security Operations Center Lead) for a 25-minute, technical presentation on how to analyze email contents for indicators and clues in order to ensure the minimal number of suspicious emails enter your user's Inbox.

SOC Summit Talk: Detecting Malware with YARA Rules

Join Troy Wojewoda (Black Hills Infosec Incident Responder/Threat Hunter/Intelligence/SOC Principal Analyst) for a 25-min technical presentation on the practical use of YARA for incident response and threat hunting.

SOC Summit Talk: Proactive Threat Prevention with Wazuh

Join Santiago Bassett (founder and CEO of Wazuh) for a 25-min deep dive into how SOC teams can prevent attacks before they happen by combining real-time vulnerability detection, security configuration assessment, and posture management

SOC Summit Talk: One Sigma to Rule Them All

Join Dan Rearden, ProCircular SOC Analyst Tier II, for a technical 25-min presentation on Sigma Rules and their application to your Security Information and Event Management (SIEM).

SOC Summit Talk: Validate Security Controls with Atomic Red Team

In this 25-minute technical presentation, Carrie Roberts (Senior Distinguished InfoSec Engineer) will teach you how to leverage the power of the open-source Atomic Red Team library to execute scripted, realistic cyber-attacks within your own environments.