Events
-
-
-
Anti-Cast: Red Teaming AI: OWASP LLM Top 10 with Brian and Derek
Join AI researchers Brian Fehrman and Derek Banks for a free one-hour training session that breaks down the OWASP Top 10 AI-LLM risks clearly and practically.
-
-
Preparing IR for AI Incidents with Gerard Johansen
Join us for a free one-hour training session with incident management expert and instructor Gerard Johansen, where he'll teach how to adapt your Incident Response plan to AI-related risks and threats.
-
-
Workshop: Job Hunt Like a Hacker – 2026 Edition
Free – $25 -
Anti-Cast: How to Detect Malicious Remote Workers with James McQuiggan
Join us for a free one-hour training session with James McQuiggan, CISSP and Advisory CISO, as he teaches you the full lifecycle of North Korea’s AI-enabled IT worker operation, from AI-generated identities and U.S.-based laptop farms to the data theft and extortion that follow once they’re inside.
-
Workshop: Foundations of Dynamic Analysis for AppSec
$25 – $300 -
-
-
Anti-Cast: Securing the Cloud in the Age of AI with Andrew Krug
Join Antisyphon instructor and security researcher Andrew Krug for a free one-hour Anti-cast on what really happens when AI collides with cloud security.
-
Red Team Fundamentals for Active Directory
$25 – $300 -
SOC Summit Talk: Needle Hunting: An Endpoint Investigation Cheat Sheet
Join Patterson Cake, Black Hills Infosec Director of Incident Response, for a technical session outlining a prioritized approach to endpoint investigations, focusing on where and how unauthorized access and activity impact Windows and Linux.
-
SOC Summit
Summit: March 25 @ 10:00 am – 4:00 pm EDT Live Training: March 26 – April 10 Security Operations Centers are where defenders grow, pressure is real, and impact matters. The Antisyphon Training SOC Summit is a free, 6-hour, live virtual event designed to give ...
-
SOC Summit Talk: Practical Email Forensics with EML Analyzer
In this 25-minute technical presentation, Seth Williams will walk through hands-on email forensics using Sublime Security’s free EML Analyzer, teaching you how to break down raw email files to uncover the true mechanics of phishing, malware delivery, and social engineering attacks.
-
SOC Summit Talk: Using Pentest Findings to Improve Detections
Join Ashley Knowles, a Black Hills InfoSec Security Consultant, for a 25-minute technical presentation where she will draw on real-world penetration testing experience to help you close coverage gaps.
-
SOC Summit Talk: Augmented Detection Engineering
Join Wade Wells (Staff Detection & Response Engineer) for a 25-minute, conversational walk-through of how AI can boost every part of the detection lifecycle, from generating new detection ideas and tightening logic to evaluating coverage, finding blind spots, and automating documentation.
-
SOC Summit Talk: Static Email Analysis
Join Ched Wiggins (Security Operations Center Lead) for a 25-minute, technical presentation on how to analyze email contents for indicators and clues in order to ensure the minimal number of suspicious emails enter your user's Inbox.
-
SOC Summit Talk: How UI/UX Impacts SOC Performance
In this 25-minute technical presentation, Bruce Potter, CEO and founder of Turngate, will examine the impact of good and bad UI on security operations.
-
SOC Summit Talk: Detecting Malware with YARA Rules
Join Troy Wojewoda (Black Hills Infosec Incident Responder/Threat Hunter/Intelligence/SOC Principal Analyst) for a 25-min technical presentation on the practical use of YARA for incident response and threat hunting.
-
SOC Summit Talk: Proactive Threat Prevention with Wazuh
Join Santiago Bassett (founder and CEO of Wazuh) for a 25-min deep dive into how SOC teams can prevent attacks before they happen by combining real-time vulnerability detection, security configuration assessment, and posture management
-
SOC Summit Talk: One Sigma to Rule Them All
Join Dan Rearden, ProCircular SOC Analyst Tier II, for a technical 25-min presentation on Sigma Rules and their application to your Security Information and Event Management (SIEM).
-
SOC Summit Talk: From Cyber Threat Intelligence (CTI) to Detection
Join Hayden Covington, Black Hills Infosec SOC SecOps Lead, for a technical session on the practical workflow of transforming threat intelligence into detections.
-
SOC Summit Talk: Validate Security Controls with Atomic Red Team
In this 25-minute technical presentation, Carrie Roberts (Senior Distinguished InfoSec Engineer) will teach you how to leverage the power of the open-source Atomic Red Team library to execute scripted, realistic cyber-attacks within your own environments.
-
-
-
-
-
How to Write SOC Tickets That Build Trust and Drive Action with Dan Rearden
Join SOC Analyst Dan Rearden for a free one-hour Antisyphon Anti-cast on using soft skills to level up your tickets.
-
-
SOC Core Skills with John Strand
$25 – $300 -
Workshop: SOC Detection Engineering Crash Course
$25 – $300 -
-
-
-
-
-
-
-
Workshop: Job Hunt Like a Hacker – 2026 Edition
Free – $25 -
Information Security Core Skills™
$25 – $300 -
-
Workshop: Job Hunt Like a Hacker – 2026 Edition
Free – $25 -
-
Threat Hunting Summit
Summit: June 17 @ 10:00 am – 4:30 pm EDT Live Training: Dates coming soon! Is your security posture proactive or reactive? Threat hunting is where defenders assume compromise, search beyond alerts, and uncover attackers hiding in plain sight. It’s how modern security teams find ...
-
Active Defense and Cyber Deception with John Strand
$25 – $300 -
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
