BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//Antisyphon Training - ECPv6.15.20//NONSGML v1.0//EN
CALSCALE:GREGORIAN
METHOD:PUBLISH
X-WR-CALNAME:Antisyphon Training
X-ORIGINAL-URL:https://www.antisyphontraining.com
X-WR-CALDESC:Events for Antisyphon Training
REFRESH-INTERVAL;VALUE=DURATION:PT1H
X-Robots-Tag:noindex
X-PUBLISHED-TTL:PT1H
BEGIN:VTIMEZONE
TZID:America/New_York
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20250309T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20251102T060000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20260308T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20261101T060000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20270314T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20271107T060000
END:STANDARD
END:VTIMEZONE
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20260617T100000
DTEND;TZID=America/New_York:20260617T163000
DTSTAMP:20260427T152431
CREATED:20260324T160433Z
LAST-MODIFIED:20260424T194000Z
UID:10000936-1781690400-1781713800@www.antisyphontraining.com
SUMMARY:Threat Hunting Summit
DESCRIPTION:Summit: \n\n\n\n\nJune 17 @ 10:00 am – 4:30 pm EDT \n\n\n\n\n\nLive Training: \n\n\n\nJune 18 – 26 \n\n\n\n\n\n\n\n\n\nREGISTER FOR SUMMIT ONLY\n\n\n\nREGISTER FOR LIVE TRAINING\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n–DAYS–HOURS–MINUTES–SECONDS\n\n\n\n\nIs your security posture proactive or reactive? \n\n\n\n\n\n\n\nThreat hunting is where defenders assume compromise\, search beyond alerts\, and uncover attackers hiding in plain sight. It’s how modern security teams find what automated tools miss and stop breaches before they escalate. \n\n\n\n\n\n\n\nThe Antisyphon Training Threat Hunting Summit is a free\, six-hour\, live virtual event designed to give you a practical\, real-world look at how threat hunters detect stealthy adversaries\, investigate suspicious behavior\, and turn discoveries into stronger defenses. \n\n\n\n\n\n\n\nOn June 17\, 2026\, join thousands of security practitioners and aspiring hunters as expert speakers break down real cyber threat hunt methodologies\, essential technical skills\, and career insights to help you think like an attacker and defend with confidence.  \n\n\n\n\n\n\n\nFor those ready to go further\, five hands-on\, high-quality\, and affordable training courses for a range of skill levels will be available after the Summit give you the tools you need to help you sharpen your skills and become a more proactive\, effective defender. \n\n\n\n\n\n\n\n\n\n\n\n\n\n\nTake Your Learning Further with LIVE Hands-On Training \n\n\n\nTraining Classes Include: \n\n\n\n\n\n\n\n\n\n\nThreat Hunting on the EdgeTroy WojewodaJune 18 @ 10:00 am – 6:00 pm ET$295 \n\n\n\n\n\n\n\n\n\n\n\nLOLBINS vs. LOLBINS: Endpoint Threat HuntingPatterson CakeJune 19 @ 10:00 am – 6:00 pm ET$295 \n\n\n\n \n\n\n\n \n\n\n\n\n\n\n\n\n\n\n\nCyber Threat Intelligence 101 2 Day VersionWade WellsJune 22-23 @ 10:00 am – 6:00 pm ET$575 \n\n\n\n \n\n\n\n\n\n\n\n\n\n\n\n\n\nIntro to Network Threat HuntingJohn StrandJune 24-25 @ 10:00 am – 6:00 pm ET$295 \n\n\n\n\n\n\n\n\n\n\n\nAgentic AI for Threat Hunting Faan RossouwJune 26 @ 10:00 am – 6:00 pm ET$295 \n\n\n\n \n\n\n\n\n\n\n\n\n\n\nHave a Training Budget? \n\n\n\nWe have reimbursement form templates specially crafted for our SOC Summit training offerings! \n\n\n\n\nCybersecurity Incident Command –  Template\n\n\n\nIncident Response Simplified – Template\n\n\n\nNetwork Forensics and Incident Response – Template\n\n\n\nSecuring the Cloud Foundations –  Template\n\n\n\n\nWhy Attend Antisyphon Training Events?Antisyphon Training Summits are built on a commitment to fostering community and engagement. Our events encourage connections between attendees\, instructors\, and industry leaders. Join us to learn\, collaborate\, and grow your network in the cybersecurity community. \n\n\n\n\n\n\n\n\nSummit Schedule – All Times Eastern U.S.\n\n\n\n\n9:30 – Pre-Show Banter\n\n\n\n10:00 – Morning Keynote: David Bianco – The Hunter’s Paradox: Is It Time to Embrace Automated Threat Hunting?\n\n\n\n10:50 – BREAK AND BANTER\n\n\n\n11:00 – Faan Rossouw – How AI Agents Solve Threat Hunting’s Biggest Problem\n\n\n\n11:30 – Jamie Levy – Memory Forensics for Everyone\n\n\n\n12:00 – Sydney Marrone – Avoiding Hunt Amnesia: Building a Memory Your AI Can Use\n\n\n\n12:30 – LUNCH BREAK\n\n\n\n1:00 – Hermon Kidane – Threat Hunting with RITA: A Behavioral Analysis of C2 Traffic\n\n\n\n1:30 – Shane Hartman – Threat Hunting in the Dark: A Practical Approach\n\n\n\n2:00 – Panel: Legal Landmines\, Insurance & Incident Response\n\n\n\n2:50 – BREAK AND BANTER\n\n\n\n3:00 – Lauren Proehl – Fast-track Reports into Ready-Made Hypotheses with AI\n\n\n\n3:30 – Afternoon Keynote: Jason Haddix – Defending AI: Organized Musings on Securing AI Agents for Cybersecurity\n\n\n\n4:20 – CLOSING REMARKS\n\n\n\n\n\n\n\n\nTalk Schedule – All Times Eastern U.S.\n\n\n\n\n\n\n\n\n\n\nKeynote: The Hunter’s Paradox: Is It Time to Embrace Automated Threat Hunting?David BiancoJune 17 @ 10:00 am – 10:50 am ET \n\n\n\n \n\n\n\n\n\n\n\n\n\n\n\nTalk: How AI Agents Solve Threat Hunting’s Biggest ProblemFaan RossouwJune 17 @ 11:00 am – 11:25 am ET \n\n\n\n \n\n\n\n\n\n\n\n\n\n\n\nTalk: Memory Forensics for EveryoneJamie LevyJune 17 @ 11:30 am – 11:55 am ET \n\n\n\n \n\n\n\n\n\n\n\n\n\n\n\n\n\nTalk: Avoiding Hunt Amnesia: Building a Memory Your AI Can UseSydney MarroneJune 17 @ 12:00 pm – 12:25 pm ET \n\n\n\n \n\n\n\n\n\n\n\n\n\n\n\nTalk: Threat Hunting with RITA: A Behavioral Analysis of C2 TrafficHermon KidaneJune 17 @ 1:00 pm – 1:25 pm ET \n\n\n\n \n\n\n\n\n\n\n\n\n\n\n\nTalk: Threat Hunting in the Dark: A Practical ApproachShane HartmanJune 17 @ 1:30 pm – 1:55 pm ET \n\n\n\n \n\n\n\n\n\n\n\n\n\n\n\n\n\nPanel: Legal Landmines\, Insurance & Incident ResponseMultiple SpeakersJune 17 @ 2:00 pm – 2:50 pm ET \n\n\n\n \n\n\n\n\n\n\n\n\n\n\n\nTalk: Fast-track Reports into Ready-Made Hypotheses with AILauren ProehlJune 17 @ 3:00 pm – 3:25 pm ET \n\n\n\n \n\n\n\n\n\n\n\n\n\n\n\nKeynote: Defending AI: Organized Musings on Securing AI Agents for CybersecurityJason HaddixJune 17 @ 3:30 pm – 4:20 pm ET \n\n\n\n \n\n\n\n\n\n\nHave a Training Budget? \n\n\n\nWe’ve taken the hassle out of making the case you your manager with these reimbursement form templates specially crafted for our Threat Hunting Summit training offerings! Download the template\, fill out a few fields\, and send it on it’s way! \n\n\n\n\nAgentic AI for Threat Hunting – Reimbursement Template\n\n\n\nLOLBINS vs. LOLBINS Endpoint Threat Hunting – Reimbursement Template\n\n\n\nThreat Hunting On The Edge – Reimbursement Template\n\n\n\nIntro to Network Threat Hunting – Reimbursement Template\n\n\n\nCyber Threat Intelligence 101 – Reimbursement Template
URL:https://www.antisyphontraining.com/event/threat-hunting-summit/
CATEGORIES:Summit,Threat Hunting
ATTACH;FMTTYPE=image/avif:https://www.antisyphontraining.com/wp-content/uploads/2026/03/Threat-Hunting-Summit-Thumbnail.avif
END:VEVENT
END:VCALENDAR