BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//Antisyphon Training - ECPv6.15.20//NONSGML v1.0//EN
CALSCALE:GREGORIAN
METHOD:PUBLISH
X-ORIGINAL-URL:https://www.antisyphontraining.com
X-WR-CALDESC:Events for Antisyphon Training
REFRESH-INTERVAL;VALUE=DURATION:PT1H
X-Robots-Tag:noindex
X-PUBLISHED-TTL:PT1H
BEGIN:VTIMEZONE
TZID:America/New_York
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20250309T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20251102T060000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20260308T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20261101T060000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20270314T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20271107T060000
END:STANDARD
END:VTIMEZONE
BEGIN:VTIMEZONE
TZID:Europe/Vienna
BEGIN:DAYLIGHT
TZOFFSETFROM:+0100
TZOFFSETTO:+0200
TZNAME:CEST
DTSTART:20250330T010000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:+0200
TZOFFSETTO:+0100
TZNAME:CET
DTSTART:20251026T010000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:+0100
TZOFFSETTO:+0200
TZNAME:CEST
DTSTART:20260329T010000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:+0200
TZOFFSETTO:+0100
TZNAME:CET
DTSTART:20261025T010000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:+0100
TZOFFSETTO:+0200
TZNAME:CEST
DTSTART:20270328T010000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:+0200
TZOFFSETTO:+0100
TZNAME:CET
DTSTART:20271031T010000
END:STANDARD
END:VTIMEZONE
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20260317T140000
DTEND;TZID=America/New_York:20260526T160000
DTSTAMP:20260418T075753
CREATED:20251105T172706Z
LAST-MODIFIED:20260304T155430Z
UID:10000834-1773756000-1779811200@www.antisyphontraining.com
SUMMARY:Professionally Evil CISSP Mentorship Program
DESCRIPTION:
URL:https://www.antisyphontraining.com/event/professionally-evil-cissp-mentorship-program-4/
CATEGORIES:CISSP Training,Pay What You Can,SecureIdeas
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20260406T120000
DTEND;TZID=America/New_York:20260409T160000
DTSTAMP:20260418T075753
CREATED:20251215T171155Z
LAST-MODIFIED:20260116T160331Z
UID:10000866-1775476800-1775750400@www.antisyphontraining.com
SUMMARY:SOC Core Skills with John Strand
DESCRIPTION:
URL:https://www.antisyphontraining.com/event/soc-core-skills-with-john-strand-4/
CATEGORIES:Blue Team,Fundamentals,Pay What You Can,SOC
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20260408T120000
DTEND;TZID=America/New_York:20260408T130000
DTSTAMP:20260418T075753
CREATED:20260331T150841Z
LAST-MODIFIED:20260331T150845Z
UID:10000937-1775649600-1775653200@www.antisyphontraining.com
SUMMARY:Anti-Cast: The Absolute Truths of Cybersecurity with Doc Blackburn
DESCRIPTION:DANGER AHEAD. \n\n\n\nIn this bold\, no-nonsense talk\, instructor Doc Blackburn will reveal the Absolute Truths of Cybersecurity\, hard realities that challenge everything you think you know about “being secure.” \n\n\n\nJoin us for a free one-hour training session to learn why security isn’t a product\, why prevention is a fantasy\, why encryption fixes almost nothing\, and why your biggest risk might be you. \n\n\n\nYou’ll learn to see your role differently — not as a gatekeeper\, but as a mission-enabler\, risk translator\, and resilience builder. \n\n\n\nThis Anti-Cast isn’t about firewalls or frameworks. It’s a total reset on how we view cybersecurity. \n\n\n\n\nRegister Here\n\n\n\n\nJoin us for PreShow Banter™ at 11:30 AM ETChat with your fellow attendees in the BHIS Discord server:https://discord.gg/bhis in the #🔴live-chat channel \n\n\n\nStay up to date on our upcoming live Anti-Casts and more at https://poweredbybhis.com \n\n\n\nDon’t forget to check out our Course Catalog for our upcoming free and affordable cybersecurity training! \n\n\n\n 
URL:https://www.antisyphontraining.com/event/anti-cast-the-absolute-truths-of-cybersecurity-with-doc-blackburn/
CATEGORIES:Anti-Cast
ATTACH;FMTTYPE=image/avif:https://www.antisyphontraining.com/wp-content/uploads/2026/03/The-Absolute-Truths-of-Cybersecurity-with-Doc-Blackburn.avif
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20260410T120000
DTEND;TZID=America/New_York:20260410T160000
DTSTAMP:20260418T075753
CREATED:20260115T212500Z
LAST-MODIFIED:20260115T212500Z
UID:10000876-1775822400-1775836800@www.antisyphontraining.com
SUMMARY:Workshop: SOC Detection Engineering Crash Course
DESCRIPTION:
URL:https://www.antisyphontraining.com/event/workshop-soc-detection-engineering-crash-course/
CATEGORIES:Blue Team,Pay What You Can,SOC,Workshop
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20260414T120000
DTEND;TZID=America/New_York:20260414T160000
DTSTAMP:20260418T075753
CREATED:20260218T172856Z
LAST-MODIFIED:20260218T173558Z
UID:10000918-1776168000-1776182400@www.antisyphontraining.com
SUMMARY:Professionally Evil API Testing: AAA and Keys are Not Just for Cars
DESCRIPTION:
URL:https://www.antisyphontraining.com/event/professionally-evil-api-testing-aaa-and-keys-are-not-just-for-cars/
CATEGORIES:API,Pay What You Can,PEAT,SecureIdeas,Webapp
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20260415T120000
DTEND;TZID=America/New_York:20260415T130000
DTSTAMP:20260418T075753
CREATED:20260408T142741Z
LAST-MODIFIED:20260408T142744Z
UID:10000938-1776254400-1776258000@www.antisyphontraining.com
SUMMARY:Anti-Cast: Turn Ideas into Code with GitHub Copilot with Carrie Roberts
DESCRIPTION:What if you could build tools\, automate tasks\, and write real code without ever having called yourself a developer? \n\n\n\nJoin us for a free one-hour training session with instructor Carrie Roberts\, Developer and InfoSec Engineer\, as she teaches you how GitHub Copilot is changing what it means to “know how to code” and show you how to put it to work in your browser right now\, with no setup required. \n\n\n\nYou’ll learn how to use Copilot to generate\, debug\, and refactor code through hands-on demos\, including how to assign tasks directly from GitHub without ever opening an editor\, so you can start building things that actually work faster than you ever thought possible. \n\n\n\nWhether you’re an experienced developer looking to move faster or someone who’s never written a line of code\, this Antisyphon Anti-Cast will change how you think about what you can build. \n\n\n\n\nRegister Here\n\n\n\n\nJoin us for PreShow Banter™ at 11:30 AM ETChat with your fellow attendees in the BHIS Discord server:https://discord.gg/bhis in the #🔴live-chat channel \n\n\n\nStay up to date on our upcoming live Anti-Casts and more at https://poweredbybhis.com \n\n\n\nDon’t forget to check out our Course Catalog for our upcoming free and affordable cybersecurity training! \n\n\n\n 
URL:https://www.antisyphontraining.com/event/anti-cast-turn-ideas-into-code-with-github-copilot-with-carrie-roberts/
CATEGORIES:Anti-Cast
ATTACH;FMTTYPE=image/avif:https://www.antisyphontraining.com/wp-content/uploads/2026/04/maxresdefault_live.avif
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20260417T120000
DTEND;TZID=America/New_York:20260417T160000
DTSTAMP:20260418T075753
CREATED:20260319T153734Z
LAST-MODIFIED:20260319T154102Z
UID:10000935-1776427200-1776441600@www.antisyphontraining.com
SUMMARY:Workshop: How to Think Like a Cybersecurity Defender
DESCRIPTION:
URL:https://www.antisyphontraining.com/event/workshop-how-to-think-like-a-cybersecurity-defender/
CATEGORIES:Blue Team,EDR,Fundamentals,Live,OSINT,Pay What You Can,SIEM,SOC,Virtual,Workshop,XDR
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=Europe/Vienna:20260421T090000
DTEND;TZID=Europe/Vienna:20260422T180000
DTSTAMP:20260418T075753
CREATED:20260317T130519Z
LAST-MODIFIED:20260406T205331Z
UID:10000928-1776762000-1776880800@www.antisyphontraining.com
SUMMARY:Information Security Core Skills™
DESCRIPTION:
URL:https://www.antisyphontraining.com/event/information-security-core-skills-tm/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=Europe/Vienna:20260421T090000
DTEND;TZID=Europe/Vienna:20260422T180000
DTSTAMP:20260418T075753
CREATED:20260317T130914Z
LAST-MODIFIED:20260324T154206Z
UID:10000931-1776762000-1776880800@www.antisyphontraining.com
SUMMARY:Intro to Penetration Testing of Non-Western IT Infrastructures
DESCRIPTION:
URL:https://www.antisyphontraining.com/event/advanced-penetration-testing-of-non-western-it-infrastructures/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=Europe/Vienna:20260421T090000
DTEND;TZID=Europe/Vienna:20260422T180000
DTSTAMP:20260418T075753
CREATED:20260317T133831Z
LAST-MODIFIED:20260324T154141Z
UID:10000932-1776762000-1776880800@www.antisyphontraining.com
SUMMARY:AI for Cybersecurity Professionals
DESCRIPTION:
URL:https://www.antisyphontraining.com/event/ai-for-cybersecurity-professionals/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20260422T120000
DTEND;TZID=America/New_York:20260422T130000
DTSTAMP:20260418T075753
CREATED:20260409T132710Z
LAST-MODIFIED:20260409T132714Z
UID:10000939-1776859200-1776862800@www.antisyphontraining.com
SUMMARY:Anti-Cast: Investigating Nix Endpoints for Incident Response with Patterson Cake
DESCRIPTION:How many endpoint Operating Systems are there? \n\n\n\nSPOILER alert – the answer is two! \n\n\n\nJoin Patterson Cake\, Director of Incident Response at Black Hills Infosec\, as he guides through his “rapid endpoint investigations” workflow for the “other” (not Windows) Operating System…*Nix (Linux/Mac). \n\n\n\nWe’ll learn how to select\, acquire\, and analyze Linux and Mac investigative artifacts\, using Velociraptor offline collector\, CatScale\, and UAC scripts. \n\n\n\nWindows gets a lot of attention and rightfully so! \n\n\n\nHowever\, Linux and Mac are part of every enterprise ecosystem and represent a critical attack surface. You need a simple\, effective\, repeatable plan for investigating these endpoints. \n\n\n\n\nRegister Here\n\n\n\n\nJoin us for PreShow Banter™ at 11:30 AM ETChat with your fellow attendees in the BHIS Discord server:https://discord.gg/bhis in the #🔴live-chat channel \n\n\n\nStay up to date on our upcoming live Anti-Casts and more at https://poweredbybhis.com \n\n\n\nDon’t forget to check out our Course Catalog for our upcoming free and affordable cybersecurity training! \n\n\n\n 
URL:https://www.antisyphontraining.com/event/anti-cast-investigating-nix-endpoints-for-incident-response-with-patterson-cake/
CATEGORIES:Anti-Cast
ATTACH;FMTTYPE=image/avif:https://www.antisyphontraining.com/wp-content/uploads/2026/04/maxresdefault_live-1.avif
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20260429T120000
DTEND;TZID=America/New_York:20260429T130000
DTSTAMP:20260418T075753
CREATED:20260417T215555Z
LAST-MODIFIED:20260417T215559Z
UID:10000950-1777464000-1777467600@www.antisyphontraining.com
SUMMARY:Anti-Cast: How to Break Free from the Cybersecurity Burnout Trap with Natalia Samman
DESCRIPTION:Have you ever wondered how to mentally and professionally succeed through all the stress of cybersecurity? \n\n\n\nJoin Natalia Samman\, licensed psychotherapist-turned-burnout-coach and cybersecurity specialist\, for an hour of practical tools on how to ditch the stress\, stay ahead of your workload\, and stop dreading Mondays. \n\n\n\nYou’ll learn: \n\n\n\n\nEarly signs of burnout and when it’s time to take evasive action\n\n\n\nWhy cybersecurity is uniquely vulnerable to burnout…and how to systematically neutralize the threats\n\n\n\nActionable\, science-driven tools to prevent burnout at its root causes\n\n\n\n\nThis Anti-Cast will feature a live coaching demo with a Black Hills Infosec pentester\, showcasing exactly how to implement boundaries and systems into your own life. \n\n\n\nIf stress and overwhelm are starting to seep into your career and your life\, and you’re ready to live differently\, this Anti-Cast is for you. \n\n\n\n\nRegister Here\n\n\n\n\nJoin us for PreShow Banter™ at 11:30 AM ETChat with your fellow attendees in the BHIS Discord server:https://discord.gg/bhis in the #🔴live-chat channel \n\n\n\nStay up to date on our upcoming live Anti-Casts and more at https://poweredbybhis.com \n\n\n\nDon’t forget to check out our Course Catalog for our upcoming free and affordable cybersecurity training! \n\n\n\n 
URL:https://www.antisyphontraining.com/event/anti-cast-how-to-break-free-from-the-cybersecurity-burnout-trap-with-natalia-samman/
CATEGORIES:Anti-Cast
ATTACH;FMTTYPE=image/avif:https://www.antisyphontraining.com/wp-content/uploads/2026/04/Anti-Cast-How-to-Break-Free-from-the-Cybersecurity-Burnout-Trap-with-Natalia-Samman.avif
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20260501T120000
DTEND;TZID=America/New_York:20260501T160000
DTSTAMP:20260418T075753
CREATED:20260316T142021Z
LAST-MODIFIED:20260317T161933Z
UID:10000926-1777636800-1777651200@www.antisyphontraining.com
SUMMARY:Workshop: Rapid Endpoint Investigations for Linux and Mac
DESCRIPTION:
URL:https://www.antisyphontraining.com/event/workshop-rapid-endpoint-investigations-for-linux-and-mac/
CATEGORIES:Pay What You Can,Workshop
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20260505T100000
DTEND;TZID=America/New_York:20260505T160000
DTSTAMP:20260418T075753
CREATED:20260318T160148Z
LAST-MODIFIED:20260318T160148Z
UID:10000933-1777975200-1777996800@www.antisyphontraining.com
SUMMARY:Workshop: Job Hunt Like a Hacker - 2026 Edition
DESCRIPTION:
URL:https://www.antisyphontraining.com/event/workshop-job-hunt-like-a-hacker-2026-edition-2/
CATEGORIES:Pay What You Can,Workshop
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20260511T120000
DTEND;TZID=America/New_York:20260514T160000
DTSTAMP:20260418T075753
CREATED:20251215T172350Z
LAST-MODIFIED:20260417T150555Z
UID:10000867-1778500800-1778774400@www.antisyphontraining.com
SUMMARY:Information Security Core Skills™
DESCRIPTION:
URL:https://www.antisyphontraining.com/event/cybersecurity-foundations/
CATEGORIES:Blue Team,Fundamentals,Mitre Att&ck,Pay What You Can
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20260515T120000
DTEND;TZID=America/New_York:20260515T160000
DTSTAMP:20260418T075753
CREATED:20260414T201538Z
LAST-MODIFIED:20260414T201538Z
UID:10000947-1778846400-1778860800@www.antisyphontraining.com
SUMMARY:Workshop: Threat Actor Profiling: Know Your Enemy
DESCRIPTION:
URL:https://www.antisyphontraining.com/event/workshop-threat-actor-profiling-know-your-enemy/
CATEGORIES:Blue Team,Incident Response,Red Team,SOC,Threat Hunting
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20260602T100000
DTEND;TZID=America/New_York:20260602T160000
DTSTAMP:20260418T075753
CREATED:20260318T160600Z
LAST-MODIFIED:20260318T160600Z
UID:10000934-1780394400-1780416000@www.antisyphontraining.com
SUMMARY:Workshop: Job Hunt Like a Hacker - 2026 Edition
DESCRIPTION:
URL:https://www.antisyphontraining.com/event/workshop-job-hunt-like-a-hacker-2026-edition-3/
CATEGORIES:Pay What You Can,Workshop
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20260615T100000
DTEND;TZID=America/New_York:20260616T180000
DTSTAMP:20260418T075753
CREATED:20260316T153532Z
LAST-MODIFIED:20260316T153939Z
UID:10000927-1781517600-1781632800@www.antisyphontraining.com
SUMMARY:Defending M365 & Azure
DESCRIPTION:
URL:https://www.antisyphontraining.com/event/defending-m365-azure/
CATEGORIES:Blue Team
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20260617T100000
DTEND;TZID=America/New_York:20260617T105000
DTSTAMP:20260418T075753
CREATED:20260415T192437Z
LAST-MODIFIED:20260415T205446Z
UID:10000944-1781690400-1781693400@www.antisyphontraining.com
SUMMARY:Threat Hunting Summit Keynote: Is It Time to Embrace Automated Threat Hunting?
DESCRIPTION:With David Bianco \n\n\n\n\n\n\n\nFor over a decade\, the security community has defined threat hunting as a human‑driven process. We believed that while machines could detect\, only humans could hunt. As the architect of the Sqrrl Hunting Loop and lead author of the PEAK Threat Hunting Framework\, David Bianco helped promote this view. \n\n\n\nBut\, David says\, we’ve got a real problem today: AI‑driven attacks are transitioning from a possibility to a likelihood\, shortening attack lifecycles from days and hours to minutes and seconds. The human is starting to look like an unnecessary bottleneck. We need machine speed and scale to stay competitive. \n\n\n\nIn security\, however\, the adversary always cheats\, and even our most capable frontier models still have trouble with that. AI is fundamentally gullible\, and it’s still so new to us that we discover ways to subvert it practically every week. \n\n\n\nAnd there’s the paradox: defenders need AI to stay in the game\, but our models aren’t trustworthy enough to rely on. We need their speed\, their scale\, and even their judgment\, yet we know we can’t trust them to deliver reliable results by themselves. \n\n\n\nOur conflicting need for both AI autonomy and human accountability deserves serious thought. Join David as he invites us to re‑examine the role of the human in threat hunting. \n\n\n\nIs it time to let the machines drive? \n\n\n\n\nRegister Here\n\n\n\n\nChat with your fellow Threat Hunting Summit attendees in the Antisyphon Discord server: https://discord.gg/antisyphon \n\n\n\n\n\n\n\n This talk is part of the Antisyphon Training Threat Hunting Summit\, a free\, six-hour\, live virtual event designed to give you a practical\, real-world look at how cyber threat hunters detect stealthy adversaries\, investigate suspicious behavior\, and turn discoveries into stronger defenses. \n\n\n\nFor those who want to go further\, multiple hands-on\, high-quality\, and affordable training courses are available June 18-26 to help you sharpen your skills and become a more proactive\, effective defender. \n\n\n\n\nLearn more about the Threat Hunting Summit\n\n\n\n\nSee the entire Antisyphon Training Course Catalog for affordable cybersecurity training!  \n\n\n\n\n\n\n\n\n\nAbout the Instructor\n\n\n\nDavid Bianco\n\n\n\n\nBio\n\n\n\nDavid is a cybersecurity researcher with Cisco’s SURGe team\, where he studies practical and effective uses of AI for defensive security operations. He is also a SANS Certified Instructor\, where he teaches network forensics. David has nearly 30 years of experience in the information security field\, primarily in incident detection and response\, threat hunting\, and Cyber Threat Intelligence (CTI).  He is the creator of the Pyramid of Pain and lead author of the PEAK threat hunting framework. Really\, he just wants to make security better for everyone. You can follow David on Bluesky as @DavidJBianco.bsky.social or on Mastodon as @DavidJBianco@infosec.exchange.  \n\n\n\n\n\n\n\n\n\n\n\n\n 
URL:https://www.antisyphontraining.com/event/threat-hunting-summit-keynote-is-it-time-to-embrace-automated-threat-hunting/
CATEGORIES:Threat Hunting
ATTACH;FMTTYPE=image/avif:https://www.antisyphontraining.com/wp-content/uploads/2026/04/TH-Summit-Keynote_David-Bianco_The-Hunters-Paradox.avif
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20260617T100000
DTEND;TZID=America/New_York:20260617T163000
DTSTAMP:20260418T075753
CREATED:20260324T160433Z
LAST-MODIFIED:20260417T184715Z
UID:10000936-1781690400-1781713800@www.antisyphontraining.com
SUMMARY:Threat Hunting Summit
DESCRIPTION:Summit: \n\n\n\n\nJune 17 @ 10:00 am – 4:30 pm EDT \n\n\n\n\n\nLive Training: \n\n\n\nDates coming soon! \n\n\n\n\n\n\n\n\n\nREGISTER FOR SUMMIT ONLY\n\n\n\n\n\n\n\n\n\n \n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\nIs your security posture proactive or reactive? \n\n\n\n\n\n\n\nThreat hunting is where defenders assume compromise\, search beyond alerts\, and uncover attackers hiding in plain sight. It’s how modern security teams find what automated tools miss and stop breaches before they escalate. \n\n\n\n\n\n\n\nThe Antisyphon Training Threat Hunting Summit is a free\, six-hour\, live virtual event designed to give you a practical\, real-world look at how threat hunters detect stealthy adversaries\, investigate suspicious behavior\, and turn discoveries into stronger defenses. \n\n\n\n\n\n\n\nOn June 17\, 2026\, join thousands of security practitioners and aspiring hunters as expert speakers break down real cyber threat hunt methodologies\, essential technical skills\, and career insights to help you think like an attacker and defend with confidence.  \n\n\n\n\n\n\n\nFor those ready to go further\, five hands-on\, high-quality\, and affordable training courses for a range of skill levels will be available after the Summit give you the tools you need to help you sharpen your skills and become a more proactive\, effective defender. \n\n\n\n\n\n\n\n\n\nSummit Schedule – All Times Eastern U.S.\n\n\n\n\n9:30 – Pre-Show Banter\n\n\n\n10:00 – Morning Keynote: David Bianco – The Hunter’s Paradox: Is It Time to Embrace Automated Threat Hunting?\n\n\n\n10:50 – BREAK AND BANTER\n\n\n\n11:00 – Faan Rossouw – How AI Agents Solve Threat Hunting’s Biggest Problem\n\n\n\n11:30 – Jamie Levy – Memory Forensics for Everyone\n\n\n\n12:00 – Sydney Marrone – Avoiding Hunt Amnesia: Building a Memory Your AI Can Use\n\n\n\n12:30 – LUNCH BREAK\n\n\n\n1:00 – Hermon Kidane – Threat Hunting with RITA: A Behavioral Analysis of C2 Traffic\n\n\n\n1:30 – Shane Hartman – Threat Hunting in the Dark: A Practical Approach\n\n\n\n2:00 – Panel: Legal Landmines\, Insurance & Incident Response\n\n\n\n2:50 – BREAK AND BANTER\n\n\n\n3:00 – Lauren Proehl – Fast-track Reports into Ready-Made Hypotheses with AI\n\n\n\n3:30 – Afternoon Keynote: Jason Haddix – Defending AI: Organized Musings on Securing AI Agents for Cybersecurity\n\n\n\n4:20 – CLOSING REMARKS\n\n\n\n\n\n\n\n\nTalk Schedule – All Times Eastern U.S.\n\n\n\n\n\n\n\n\n\n\nKeynote: The Hunter’s Paradox: Is It Time to Embrace Automated Threat Hunting?David BiancoJune 17 @ 10:00 am – 10:50 am ET \n\n\n\n \n\n\n\n\n\n\n\n\n\n\n\nTalk: How AI Agents Solve Threat Hunting’s Biggest ProblemFaan RossouwJune 17 @ 11:00 am – 11:25 am ET \n\n\n\n \n\n\n\n\n\n\n\n\n\n\n\nTalk: Memory Forensics for EveryoneJamie LevyJune 17 @ 11:30 am – 11:55 am ET \n\n\n\n \n\n\n\n\n\n\n\n\n\n\n\n\n\nTalk: Avoiding Hunt Amnesia: Building a Memory Your AI Can UseSydney MarroneJune 17 @ 12:00 pm – 12:25 pm ET \n\n\n\n \n\n\n\n\n\n\n\n\n\n\n\nTalk: Threat Hunting with RITA: A Behavioral Analysis of C2 TrafficHermon KidaneJune 17 @ 1:00 pm – 1:25 pm ET \n\n\n\n \n\n\n\n\n\n\n\n\n\n\n\nTalk: Threat Hunting in the Dark: A Practical ApproachShane HartmanJune 17 @ 1:30 pm – 1:55 pm ET \n\n\n\n \n\n\n\n\n\n\n\n\n\n\n\n\n\nPanel: Legal Landmines\, Insurance & Incident ResponseMultiple SpeakersJune 17 @ 2:00 pm – 2:50 pm ET \n\n\n\n \n\n\n\n\n\n\n\n\n\n\n\nTalk: Fast-track Reports into Ready-Made Hypotheses with AILauren ProehlJune 17 @ 3:00 pm – 3:25 pm ET \n\n\n\n \n\n\n\n\n\n\n\n\n\n\n\nKeynote: Defending AI: Organized Musings on Securing AI Agents for CybersecurityJason HaddixJune 17 @ 3:30 pm – 4:20 pm ET
URL:https://www.antisyphontraining.com/event/threat-hunting-summit/
CATEGORIES:Summit,Threat Hunting
ATTACH;FMTTYPE=image/avif:https://www.antisyphontraining.com/wp-content/uploads/2026/03/Threat-Hunting-Summit-Thumbnail.avif
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20260617T110000
DTEND;TZID=America/New_York:20260617T112500
DTSTAMP:20260418T075753
CREATED:20260415T192725Z
LAST-MODIFIED:20260415T205436Z
UID:10000940-1781694000-1781695500@www.antisyphontraining.com
SUMMARY:Threat Hunting Summit Talk: How AI Agents Solve Threat Hunting’s Biggest Problem
DESCRIPTION:With Faan Rossouw \n\n\n\n\n\n\n\nIs AI the force multiplier threat hunters have been waiting for—or just another buzzword? \n\n\n\nJoin Faan Rossouw\, creator of aionsec.ai\, as he walks you through how agentic AI frameworks can automate the grind\, expand your investigative reach\, and help you operate at a scale no individual threat hunter can match. \n\n\n\nYou’ll learn how to build and orchestrate teams of agents\, design the supporting structures that make them effective\, and apply them to real threat‑hunting workflows without losing control or context. \n\n\n\nWhether you’re new to agents or looking to optimize your existing process\, this session gives you a practical roadmap for hunting with AI today and a glimpse of what the next generation of threat hunting will look like. \n\n\n\n\nRegister Here\n\n\n\n\nChat with your fellow Threat Hunting Summit attendees in the Antisyphon Discord server: https://discord.gg/antisyphon \n\n\n\n\n\n\n\n This talk is part of the Antisyphon Training Threat Hunting Summit\, a free\, six-hour\, live virtual event designed to give you a practical\, real-world look at how cyber threat hunters detect stealthy adversaries\, investigate suspicious behavior\, and turn discoveries into stronger defenses. \n\n\n\nFor those who want to go further\, multiple hands-on\, high-quality\, and affordable training courses are available June 18-26 to help you sharpen your skills and become a more proactive\, effective defender. \n\n\n\nFaan Rossouw will be teaching Agentic AI for Threat Hunting on June 26. \n\n\n\n\nLearn more about the Threat Hunting Summit\n\n\n\n\nSee the entire Antisyphon Training Course Catalog for affordable cybersecurity training!  \n\n\n\n\n\n\n\n\n\nAbout the Instructor\n\n\n\nFaan Rossouw\n\n\n\n\nBio\n\n\n\nFaan Rossouw is a security researcher focused on the intersection of threat hunting and agentic AI. Faan is currently working on aionsec.ai\, a complete educational ecosystem that helps threat hunters master AI agents – from using them effectively\, to building their own\, to securing them. He also has a deep interest in developing robust systems that produce coherent synthetic telemetry for security model training at scale. In his free time\, Faan likes to hang out with his family and go for forest runs with his dog. \n\n\n\n\n\n\n\n\n\n\n\n\n 
URL:https://www.antisyphontraining.com/event/threat-hunting-summit-talk-how-ai-agents-solve-threat-huntings-biggest-problem/
CATEGORIES:Threat Hunting
ATTACH;FMTTYPE=image/avif:https://www.antisyphontraining.com/wp-content/uploads/2026/04/TH-Summit-Talk_Faan-Rossouw_How-AI-Agents-Solve.avif
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20260617T113000
DTEND;TZID=America/New_York:20260617T115500
DTSTAMP:20260418T075753
CREATED:20260415T193622Z
LAST-MODIFIED:20260415T205427Z
UID:10000946-1781695800-1781697300@www.antisyphontraining.com
SUMMARY:Threat Hunting Summit Talk: Memory Forensics for Everyone
DESCRIPTION:With Jamie Levy \n\n\n\n\n\n\n\nHave you ever wondered how to conduct an investigation using only RAM? \n\n\n\nJoin Jamie Levy\, Senior Director of Adversary Tactics at Huntress and Core Developer of the Volatility project\, for a technical session outlining how to analyze memory samples of infected machines quickly and efficiently. \n\n\n\nShe’ll show you how to efficiently conduct your own investigations using Volatility and confidently analyze malware running in memory. You’ll learn how to automate your workflow to work quickly through several memory samples at once. \n\n\n\nWalk away with the skills to pull truth out of RAM—even when nothing else remains. \n\n\n\n\nRegister Here\n\n\n\n\nChat with your fellow Threat Hunting Summit attendees in the Antisyphon Discord server: https://discord.gg/antisyphon \n\n\n\n\n\n\n\n This talk is part of the Antisyphon Training Threat Hunting Summit\, a free\, six-hour\, live virtual event designed to give you a practical\, real-world look at how cyber threat hunters detect stealthy adversaries\, investigate suspicious behavior\, and turn discoveries into stronger defenses. \n\n\n\nFor those who want to go further\, multiple hands-on\, high-quality\, and affordable training courses are available June 18-26 to help you sharpen your skills and become a more proactive\, effective defender. \n\n\n\n\nLearn more about the Threat Hunting Summit\n\n\n\n\nSee the entire Antisyphon Training Course Catalog for affordable cybersecurity training!  \n\n\n\n\n\n\n\n\n\nAbout the Instructor\n\n\n\nJamie Levy\n\n\n\n\nBio\n\n\n\nJamie Levy is the Senior Director of Adversary Tactics at Huntress. Jamie is also a researcher\, developer\, and board member of the Volatility Foundation. She has worked over 15 years in the digital forensics industry\, conducting investigations as well as building software solutions. Jamie is also a co-author of The Art of Memory Forensics\, the first book of its kind covering various facets of how to investigate RAM artifacts.  \n\n\n\n\n\n\n\n\n\n\n\n\n 
URL:https://www.antisyphontraining.com/event/threat-hunting-summit-talk-memory-forensics-for-everyone/
CATEGORIES:Threat Hunting
ATTACH;FMTTYPE=image/avif:https://www.antisyphontraining.com/wp-content/uploads/2026/04/TH-Summit-Talk_Jamie-Levy_Memory-Forensics-For-Everyone.avif
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20260617T120000
DTEND;TZID=America/New_York:20260617T122500
DTSTAMP:20260418T075753
CREATED:20260415T195557Z
LAST-MODIFIED:20260415T205419Z
UID:10000941-1781697600-1781699100@www.antisyphontraining.com
SUMMARY:Threat Hunting Summit Talk: Avoiding Hunt Amnesia: Building a Memory Your AI Can Use
DESCRIPTION:With Sydney Marrone \n\n\n\n\n\n\n\nWhat if your next threat hunt could start with a simple question to your AI assistant: “What did we find last time we investigated lateral movement?” \n\n\n\nJoin Sydney Marrone\, Head of Threat Hunting at Nebulock\, as she introduces the LOCK pattern (Learn\, Observe\, Check\, Keep)\, a lightweight framework for turning every investigation into a persistent\, markdown‑based record your AI can actually use. \n\n\n\nYou’ll learn how to build a hunt repository that preserves institutional knowledge\, accelerates future investigations\, and gives both humans and AI assistants a shared memory to work from. \n\n\n\nGive your hunting program a durable memory and watch your mean time to hypothesis drop. \n\n\n\n\nRegister Here\n\n\n\n\nChat with your fellow Threat Hunting Summit attendees in the Antisyphon Discord server: https://discord.gg/antisyphon \n\n\n\n\n\n\n\n This talk is part of the Antisyphon Training Threat Hunting Summit\, a free\, six-hour\, live virtual event designed to give you a practical\, real-world look at how cyber threat hunters detect stealthy adversaries\, investigate suspicious behavior\, and turn discoveries into stronger defenses. \n\n\n\nFor those who want to go further\, multiple hands-on\, high-quality\, and affordable training courses are available June 18-26 to help you sharpen your skills and become a more proactive\, effective defender. \n\n\n\n\nLearn more about the Threat Hunting Summit\n\n\n\n\nSee the entire Antisyphon Training Course Catalog for affordable cybersecurity training!  \n\n\n\n\n\n\n\n\n\nAbout the Instructor\n\n\n\nSydney Marrone\n\n\n\n\nBio\n\n\n\nSydney Marrone is a threat hunter\, cybersecurity professional\, co-founder of THOR Collective\, author of the Agentic Threat Hunting Framework\, and co-author of the PEAK Threat Hunting Framework. She is passionate about making security knowledge accessible and actionable through hands-on research\, open-source collaboration\, and community-driven projects like HEARTH (Hunting Exchange And Research Threat Hub). Sydney creates resources\, leads workshops\, and shares insights that spark curiosity and empower defenders. Outside of work\, she writes for THOR Collective Dispatch\, lifts weights\, and makes cyber-themed music using AI to blend creativity and hacker culture.  \n\n\n\n\n\n\n\n\n\n\n\n\n 
URL:https://www.antisyphontraining.com/event/threat-hunting-summit-talk-avoiding-hunt-amnesia-building-a-memory-your-ai-can-use/
CATEGORIES:Threat Hunting
ATTACH;FMTTYPE=image/avif:https://www.antisyphontraining.com/wp-content/uploads/2026/04/TH-Summit-Talk_Sydney-Marrone_Avoiding-Hunt-Amnesia.avif
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20260617T130000
DTEND;TZID=America/New_York:20260617T132500
DTSTAMP:20260418T075753
CREATED:20260415T200942Z
LAST-MODIFIED:20260415T205606Z
UID:10000942-1781701200-1781702700@www.antisyphontraining.com
SUMMARY:Threat Hunting Summit Talk: Threat Hunting with RITA: A Behavioral Analysis of C2 Traffic
DESCRIPTION:With Hermon Kidane \n\n\n\n\n\n\n\nHow do you catch an attacker when their malware is specifically designed to blend in with everyday network noise? \n\n\n\nJoin Hermon Kidane\, Network Threat Hunter at Active Countermeasures\, as he walks you through a practical approach to finding covert command and control channels using RITA and Zeek telemetry. \n\n\n\nYou’ll learn how to analyze connection durations\, beaconing cadences\, and key metrics like network prevalence and first-seen behavior to spot DNS tunnels and persistent threats\, cutting through the raw data to find the actual compromise. \n\n\n\nWalk away with a downloadable custom dataset and some bonus hunting scripts\, so you can immediately start practicing these techniques on your own. \n\n\n\n\nRegister Here\n\n\n\n\nChat with your fellow Threat Hunting Summit attendees in the Antisyphon Discord server: https://discord.gg/antisyphon \n\n\n\n\n\n This talk is part of the Antisyphon Training Threat Hunting Summit\, a free\, six-hour\, live virtual event designed to give you a practical\, real-world look at how cyber threat hunters detect stealthy adversaries\, investigate suspicious behavior\, and turn discoveries into stronger defenses. \n\n\n\nFor those who want to go further\, multiple hands-on\, high-quality\, and affordable training courses are available June 18-26 to help you sharpen your skills and become a more proactive\, effective defender. \n\n\n\n\nLearn more about the Threat Hunting Summit\n\n\n\n\nSee the entire Antisyphon Training Course Catalog for affordable cybersecurity training!  \n\n\n\n\n\n\n\nAbout the Instructor\n\n\n\nHermon Kidan\n\n\n\n\nBio\n\n\n\nHermon is a Network Threat Hunter at Active Countermeasures where he does behavioral analysis of network traffic to expose covert infrastructure. His daily work centers on translating raw Zeek telemetry into actionable threat intelligence to track down persistent\, low-and-slow threats. Prior to hunting\, he spent two years at a help desk and another two years as a systems administrator. In his spare time\, he likes to tinker with his homelab\, follow Formula 1\, and watch movies.  \n\n\n\n\n\n\n\n\n\n\n\n\n 
URL:https://www.antisyphontraining.com/event/threat-hunting-summit-talk-threat-hunting-with-rita-a-behavioral-analysis-of-c2-traffic/
CATEGORIES:Threat Hunting
ATTACH;FMTTYPE=image/avif:https://www.antisyphontraining.com/wp-content/uploads/2026/04/TH-Summit-Talk_Hermon-Kidane_Threat-Hunting-With-RITA.avif
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20260617T133000
DTEND;TZID=America/New_York:20260617T135500
DTSTAMP:20260418T075753
CREATED:20260415T201301Z
LAST-MODIFIED:20260415T205821Z
UID:10000943-1781703000-1781704500@www.antisyphontraining.com
SUMMARY:Threat Hunting Summit Talk: Threat Hunting in the Dark: A Practical Approach
DESCRIPTION:With Shane Hartman \n\n\n\n\n\n\n\nYou know threats exist on your network—but where do you begin looking? Which direction should you go\, and do you even have the data you need to find them? \n\n\n\nJoin Shane Hartman\, Principal IR Consultant at TrustedSec\, as he turns threat hunting from guesswork into a disciplined\, hypothesis‑driven process. \n\n\n\nYou’ll learn how to cast a wide net\, refine your hypotheses\, validate suspicious behavior with real telemetry\, and convert findings into actionable detections. \n\n\n\nBy the end of this session\, you’ll have a repeatable method for creating\, assessing\, and executing hunts—so the next time you’re hunting in the dark\, you won’t be going in blind. \n\n\n\n\nRegister Here\n\n\n\n\nChat with your fellow Threat Hunting Summit attendees in the Antisyphon Discord server: https://discord.gg/antisyphon \n\n\n\n\n\n\n\n This talk is part of the Antisyphon Training Threat Hunting Summit\, a free\, six-hour\, live virtual event designed to give you a practical\, real-world look at how cyber threat hunters detect stealthy adversaries\, investigate suspicious behavior\, and turn discoveries into stronger defenses. \n\n\n\nFor those who want to go further\, multiple hands-on\, high-quality\, and affordable training courses are available June 18-26 to help you sharpen your skills and become a more proactive\, effective defender. \n\n\n\n\nLearn more about the Threat Hunting Summit\n\n\n\n\nSee the entire Antisyphon Training Course Catalog for affordable cybersecurity training!  \n\n\n\n\n\n\n\n\n\nAbout the Instructor\n\n\n\nShane Hartman\n\n\n\n\nBio\n\n\n\nShane Hartman is a Principal Incident Response Consultant at TrustedSec\, specializing in advanced threat hunting\, forensic triage\, and intrusion analysis. With over 30 years in IT and two decades in information security\, Shane helps organizations detect\, investigate\, and contain targeted attacks against critical systems and intellectual property. His previous roles at FireEye\, Fortinet\, and RSA focused on malware reverse engineering\, threat intelligence production\, and adversary tradecraft analysis. He frequently presents and teaches at the University of South Florida on topics including Digital Forensics\, Ethical Hacking\, and Offensive Operations.  \n\n\n\n\n\n\n\n\n\n\n\n\n 
URL:https://www.antisyphontraining.com/event/threat-hunting-summit-talk-threat-hunting-in-the-dark-a-practical-approach/
CATEGORIES:Threat Hunting
ATTACH;FMTTYPE=image/avif:https://www.antisyphontraining.com/wp-content/uploads/2026/04/TH-Summit-Talk_Shane-Hartman_Threat-Hunting-in-the-Dark.avif
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20260617T140000
DTEND;TZID=America/New_York:20260617T145000
DTSTAMP:20260418T075753
CREATED:20260415T204342Z
LAST-MODIFIED:20260417T135833Z
UID:10000948-1781704800-1781707800@www.antisyphontraining.com
SUMMARY:Threat Hunting Summit Panel: Legal Landmines\, Insurance & Incident Response
DESCRIPTION:With Patterson Cake\, Troy Wojewoda\, John Danyluk and David Vanalek \n\n\n\n\n\n\n\nWhen should you call your cyber insurance provider\, and when should you bring in outside legal counsel? And does privilege actually protect your incident communications from discoverability during litigation? \n\n\n\nJoin Patterson Cake (Director of IR\, BHIS)\, Troy Wojewoda (Incident Responder\, Threat Hunter\, and SOC Principal Analyst\, BHIS)\, John Danyluk (Partner\, Gentry Locke)\, and David Vanalek (Chief Legal and Compliance Officer\, Richmond National Insurance) for a fast‑paced\, candid panel discussion that demystifies the legal and insurance decisions every defender eventually faces. \n\n\n\nYou’ll learn how incident responders\, insurers\, and attorneys think about notification timelines\, privilege\, documentation\, and the real‑world consequences of calling—or not calling—the right people at the right time. \n\n\n\nBring your toughest questions: the panel will open the floor for live Q&A so you can finally get straight answers to the insurance and legal questions no one ever explains. \n\n\n\n  \n\n\n\n\nRegister Here\n\n\n\n\nChat with your fellow Threat Hunting Summit attendees in the Antisyphon Discord server: https://discord.gg/antisyphon \n\n\n\n\n\n This talk is part of the Antisyphon Training Threat Hunting Summit\, a free\, six-hour\, live virtual event designed to give you a practical\, real-world look at how cyber threat hunters detect stealthy adversaries\, investigate suspicious behavior\, and turn discoveries into stronger defenses. \n\n\n\nFor those who want to go further\, multiple hands-on\, high-quality\, and affordable training courses are available June 18-26 to help you sharpen your skills and become a more proactive\, effective defender. \n\n\n\nTroy Wojeowda will teach Threat Hunting on the Edge on June 18. \n\n\n\nPatterson Cake will be teaching LOLBINS vs. LOLBINS: Endpoint Threat Hunting on June 19. \n\n\n\n\nLearn more about the Threat Hunting Summit\n\n\n\n\nSee the entire Antisyphon Training Course Catalog for affordable cybersecurity training!  \n\n\n\n\n\n\n\n\nAbout the Instructors\n\n\n\nPatterson Cake\n\n\n\n\nBio\n\n\n\nPatterson Cake has worked in cybersecurity for more than two decades\, specializing in the development of incident-response teams\, programs\, and processes. He is currently the Director of Incident Response for Black Hills Information Security\, holds more than twenty-five industry certifications\, is a former SANS instructor\, teaches for Antisyphon\, and has trained law enforcement\, military\, and national cybersecurity organizations on four continents. Patterson is the creator of the “Incident Response Capabilities Matrix Model\,” developed “Rapid Triage Workflow” for IR investigations\, is a prolific speaker\, and is actively involved in the cybersecurity community. \n\n\n\n\n\n\n\n\n\n\n\n\n  \n\n\n\n\n\nTroy Wojewoda\n\n\n\n\nBio\n\n\n\nTroy Wojewoda is a Security Analyst at Black Hills Information Security (BHIS). Prior to joining BHIS\, Troy has held roles in application and system administration\, host and network intrusion detection\, wireless security\, penetration testing\, digital forensics\, malware analysis\, threat hunting\, and incident response. In addition to earning several professional certifications\, Troy has a BS in Computer Engineering and Computer Science. \n\n\n\n\n\n\n\n\n\n\n\n\n\n\nDavid T. Vanalek\n\n\n\n\nBio\n\n\n\nDavid T. Vanalek is the Chief Legal and Compliance Officer and Corporate Secretary of Richmond National\, a specialty excess and surplus lines insurance company dedicated to writing hard to place risks for small and mid-sized businesses across the country headquartered in Richmond\, Virginia. David is responsible for all corporate governance\, regulatory\, compliance\, claims law\, and litigation activities of the company and its affiliates\, and serves as legal advisor to the leadership team\, business units\, and board of directors. Prior to joining Richmond National\, David served as the Claims Chief Operating Officer at a global Fortune 500 insurance carrier\, where he led the day to day operational support for all claims divisions responsible for all lines of business throughout North America and Bermuda. David also served for years in various claims leadership roles in the professional liability\, cyber liability and management liability product lines. Prior to joining the insurance industry\, Mr. Vanalek was in private practice as a commercial litigator\, serving clients throughout California and Illinois. He received his Bachelor’s degree from the University of California\, Los Angeles\, and his law degree from the University of California\, Davis\, where he served as an Editor on Law Review\, as well as a judicial extern for an associate justice of the California Supreme Court. Mr. Vanalek is a frequent speaker on insurance\, claims\, technology\, professional liability\, cyber liability and management liability issues. \n\n\n\n\n\n\n\n\n\n\n\n\n\n\nJohn Danyluk\n\n\n\n\nBio\n\n\n\nJohn Danyluk is a partner at Gentry Locke and a member of its Band‑1‑ranked White Collar Defense\, Investigations & Compliance practice group. He represents corporate and individual clients through all phases of the criminal process and advises highly regulated industries—including government contractors\, healthcare\, and critical infrastructure—on compliance and risk. A Certified Information Privacy Professional (CIPP/US)\, he guides organizations through complex data‑privacy and cybersecurity obligations\, conducts internal investigations\, and helps clients navigate cyber incidents and regulatory scrutiny. John draws on his experience as an Army JAG Officer and former Special Assistant U.S. Attorney\, where he litigated more than 1\,000 cases and advised senior leaders on procurement\, trade regulations\, and national‑security matters. 
URL:https://www.antisyphontraining.com/event/threat-hunting-summit-panel-legal-landmines-insurance-incident-response/
CATEGORIES:Threat Hunting
ATTACH;FMTTYPE=image/avif:https://www.antisyphontraining.com/wp-content/uploads/2026/04/TH-Summit-Panel-and-QA_Legal-Landmines.avif
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20260617T150000
DTEND;TZID=America/New_York:20260617T152500
DTSTAMP:20260418T075753
CREATED:20260416T192108Z
LAST-MODIFIED:20260416T192112Z
UID:10000945-1781708400-1781709900@www.antisyphontraining.com
SUMMARY:Threat Hunting Summit Talk: Fast-track Reports into Ready-Made Hypotheses with AI
DESCRIPTION:With Lauren Proehl \n\n\n\n\n\n\n\nWhat if every intelligence report instantly became a ready‑to‑run hypothesis — instead of dying in a Slack channel? \n\n\n\nIn this talk\, Lauren Proehl\, Global Head of Detection and Response at Marsh and co‑founder of THOR Collective\, walks through a practical\, repeatable workflow for using large language models to convert published threat reports into structured\, testable hunt hypotheses. \n\n\n\nShe’ll break down how to extract attacker tradecraft\, map TTPs\, scope data sources\, and generate analytic logic hunters can run immediately. Real examples will help you explore how crafted prompts can surface detection gaps\, enrich investigations\, and produce hypotheses that go far beyond IOC matching. \n\n\n\nExamine how AI‑assisted workflows are reshaping the future of threat hunting and leave with a method you can put to work\, whether you’re a solo hunter or running a mature program. \n\n\n\n\nRegister Here\n\n\n\n\nChat with your fellow Threat Hunting Summit attendees in the Antisyphon Discord server: https://discord.gg/antisyphon \n\n\n\n\n\n\n\n This talk is part of the Antisyphon Training Threat Hunting Summit\, a free\, six-hour\, live virtual event designed to give you a practical\, real-world look at how cyber threat hunters detect stealthy adversaries\, investigate suspicious behavior\, and turn discoveries into stronger defenses. \n\n\n\nFor those who want to go further\, multiple hands-on\, high-quality\, and affordable training courses are available June 18-26 to help you sharpen your skills and become a more proactive\, effective defender. \n\n\n\n\nLearn more about the Threat Hunting Summit\n\n\n\n\nSee the entire Antisyphon Training Course Catalog for affordable cybersecurity training!  \n\n\n\n\n\n\n\n\n\nAbout the Instructor\n\n\n\nLauren Proehl\n\n\n\n\nBio\n\n\n\nLauren Proehl leads detection and response globally at Marsh\, overseeing the full lifecycle from threat intelligence through incident response and red teaming. She is co-founder of THOR Collective\, a practitioner-driven cybersecurity collective\, and has spent her career identifying and disrupting cyber adversaries across Fortune 500 networks — from data breaches to targeted intrusions. She now works to define some part of the limitless unknowns in cyberspace and make cybersecurity less abstract and more tangible. Lauren sits on the CFP board for BSides Kansas City\, serves on the board of Urban Trail Co.\, and tries to escape computers by running long distances in the woods.  \n\n\n\n\n\n\n\n\n\n\n\n\n 
URL:https://www.antisyphontraining.com/event/threat-hunting-summit-talk-fast-track-reports-into-ready-made-hypotheses-with-ai/
CATEGORIES:Threat Hunting
ATTACH;FMTTYPE=image/avif:https://www.antisyphontraining.com/wp-content/uploads/2026/04/TH-Summit-Talk_Lauren-Proehl_Fast-track-Reports.avif
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20260617T153000
DTEND;TZID=America/New_York:20260617T162000
DTSTAMP:20260418T075753
CREATED:20260416T194823Z
LAST-MODIFIED:20260417T135734Z
UID:10000949-1781710200-1781713200@www.antisyphontraining.com
SUMMARY:Threat Hunting Summit Keynote: Defending AI: Organized Musings on Securing AI Agents for Cybersecurity
DESCRIPTION:With Jason Haddix \n\n\n\n\n\n\n\nAre you securing your AI agents\, or just hoping the system prompt holds? \n\n\n\nAs AI agents move from prototypes into production\, most security programs are still treating them like traditional apps or opaque black boxes – and that gap is where real risk is emerging. \n\n\n\nJoin Jason Haddix\, CEO and “Hacker in Charge” at Arcanum Information Security\, as he lays out a practical architecture for defending AI agents based on real-world assessments and organizing controls across the full ecosystem: application design and tool boundaries\, system prompt hardening\, and intermediate guardrails and classifier-based protections. \n\n\n\nHe’ll cover how attacks actually manifest across these layers\, the best security practices and common missteps seen in development teams\, and where open-source defensive tooling fits today. \n\n\n\nThe focus of this talk is pragmatic: giving defenders a usable mental model\, concrete configurations\, and the tradeoffs they need to understand to make AI systems survivable in production. \n\n\n\nIf you’re building or defending AI systems\, this is the playbook you’ll want to have. \n\n\n\n\nRegister Here\n\n\n\n\nChat with your fellow Threat Hunting Summit attendees in the Antisyphon Discord server: https://discord.gg/antisyphon \n\n\n\n\n\n This talk is part of the Antisyphon Training Threat Hunting Summit\, a free\, six-hour\, live virtual event designed to give you a practical\, real-world look at how cyber threat hunters detect stealthy adversaries\, investigate suspicious behavior\, and turn discoveries into stronger defenses. \n\n\n\nFor those who want to go further\, multiple hands-on\, high-quality\, and affordable training courses are available June 18-26 to help you sharpen your skills and become a more proactive\, effective defender. \n\n\n\n\nLearn more about the Threat Hunting Summit\n\n\n\n\nSee the entire Antisyphon Training Course Catalog for affordable cybersecurity training!  \n\n\n\n\n\n\n\nAbout the Instructor\n\n\n\nJason Haddix\n\n\n\n\nBio\n\n\n\nJason Haddix\, also known as jhaddix\, is the CEO and “Hacker in Charge” at Arcanum Information Security. Arcanum is a world-class assessment and training company.  \n\n\n\nJason has had a distinguished 20-year career in cybersecurity\, previously serving as CISO of FLARE\, CISO of Buddobot\, CISO of Ubisoft\, Head of Trust/Security/Operations at Bugcrowd\, Director of Penetration Testing at HP\, and Lead Penetration Tester at Redspin. He has also held positions doing mobile penetration testing\, network/infrastructure security assessments\, and static analysis. Jason is a hacker and bug hunter and is currently ranked 57th all-time on Bugcrowd’s bug bounty leaderboards. Currently\, he specializes in recon\, web application analysis\, and emerging technologies. Jason has also authored many talks on offensive security methodology\, including speaking at conferences such as DEFCON\, Bsides\, BlackHat\, RSA\, OWASP\, Nullcon\, SANS\, IANS\, BruCon\, Toorcon and many more.   \n\n\n\n\n\n\n\n\n\n\n\n\n 
URL:https://www.antisyphontraining.com/event/threat-hunting-summit-keynote-defending-ai-organized-musings-on-securing-ai-agents-for-cybersecurity/
CATEGORIES:Threat Hunting
ATTACH;FMTTYPE=image/avif:https://www.antisyphontraining.com/wp-content/uploads/2026/04/TH-Summit-Keynote_Jason-Haddix_Defending-AI.avif
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20260629T120000
DTEND;TZID=America/New_York:20260702T160000
DTSTAMP:20260418T075753
CREATED:20251215T173433Z
LAST-MODIFIED:20260116T164801Z
UID:10000868-1782734400-1783008000@www.antisyphontraining.com
SUMMARY:Active Defense and Cyber Deception with John Strand
DESCRIPTION:
URL:https://www.antisyphontraining.com/event/active-defense-and-cyber-deception-with-john-strand-6/
CATEGORIES:Blue Team,Featured,Pay What You Can
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20260901T140000
DTEND;TZID=America/New_York:20260906T160000
DTSTAMP:20260418T075753
CREATED:20251107T141232Z
LAST-MODIFIED:20260304T155435Z
UID:10000835-1788271200-1788710400@www.antisyphontraining.com
SUMMARY:Professionally Evil CISSP Mentorship Program
DESCRIPTION:
URL:https://www.antisyphontraining.com/event/professionally-evil-cissp-mentorship-program-5/
CATEGORIES:CISSP Training,Pay What You Can,SecureIdeas
END:VEVENT
END:VCALENDAR