Filters

Changing any of the form inputs will cause the list of events to refresh with the filtered results.

  • SOC Summit Talk: Practical Email Forensics with EML Analyzer

    In this 25-minute technical presentation, Seth Williams will walk through hands-on email forensics using Sublime Security’s free EML Analyzer, teaching you how to break down raw email files to uncover the true mechanics of phishing, malware delivery, and social engineering attacks.

  • SOC Summit Talk: Augmented Detection Engineering

    Join Wade Wells (Staff Detection & Response Engineer) for a 25-minute, conversational walk-through of how AI can boost every part of the detection lifecycle, from generating new detection ideas and tightening logic to evaluating coverage, finding blind spots, and automating documentation.

  • SOC Summit Talk: Static Email Analysis

    Join Ched Wiggins (Security Operations Center Lead) for a 25-minute, technical presentation on how to analyze email contents for indicators & clues in order to ensure the minimal number of suspicious emails enter your user's Inbox.

  • SOC Summit Talk: Detecting Malware with YARA Rules

    Join Troy Wojewoda (Black Hills Infosec Incident Responder/Threat Hunter/Intelligence/SOC Principal Analyst) for a 25-min technical presentation on the practical use of YARA for incident response and threat hunting.

  • SOC Summit Talk: Proactive Threat Prevention with Wazuh

    Join Santiago Bassett (founder and CEO of Wazuh) for a 25-min deep dive into how SOC teams can prevent attacks before they happen by combining real-time vulnerability detection, security configuration assessment, and posture management

  • SOC Summit Talk: One Sigma to Rule Them All

    Join Dan Rearden, ProCircular SOC Analyst Tier II, for a technical 25-min presentation on Sigma Rules and their application to your Security Information and Event Management (SIEM).

  • SOC Summit Talk: Validate Security Controls with Atomic Red Team

    In this 25-minute technical presentation, Carrie Roberts (Senior Distinguished InfoSec Engineer) will teach you how to leverage the power of the open-source Atomic Red Team library to execute scripted, realistic cyber-attacks within your own environments.