Anti-Cast: Threat Hunting Malware Communication over DNS with Faan Rossouw
Join instructor Faan Rossouw for a free one-hour training on hunting malware that uses DNS as a covert communication channel.
Join instructor Faan Rossouw for a free one-hour training on hunting malware that uses DNS as a covert communication channel.
Join instructor Mishaal Khan for a free one-hour hands-on training session, where you'll navigate real-world scenarios and build an investigation mind map, incorporating email addresses, phone numbers, Google Maps, APIs, and online form abuse.
Join Hayden Covington (Black Hills Infosec - SOC SecOps Lead) for a free one-hour training session to learn how to augment security analysts with AI through practical, tested workflows.
Join instructor Kevin Klingbile to learn how attackers exploit weak mail flow rules and how to stop them.
Join Patterson Cake, Black Hills Infosec Director of Incident Response, for a technical session outlining a prioritized approach to endpoint investigations, focusing on where and how unauthorized access and activity impact Windows and Linux.
In this 25-minute technical presentation, Seth Williams will walk through hands-on email forensics using Sublime Security’s free EML Analyzer, teaching you how to break down raw email files to uncover the true mechanics of phishing, malware delivery, and social engineering attacks.
Join Ashley Knowles, a Black Hills InfoSec Security Consultant, for a 25-minute technical presentation where she will draw on real-world penetration testing experience to help you close coverage gaps.
Join Wade Wells (Staff Detection & Response Engineer) for a 25-minute, conversational walk-through of how AI can boost every part of the detection lifecycle, from generating new detection ideas and tightening logic to evaluating coverage, finding blind spots, and automating documentation.
Join Ched Wiggins (Security Operations Center Lead) for a 25-minute, technical presentation on how to analyze email contents for indicators & clues in order to ensure the minimal number of suspicious emails enter your user's Inbox.
In this 25-minute technical presentation, Bruce Potter, CEO and founder of Turngate, will examine the impact of good and bad UI on security operations.
Join Troy Wojewoda (Black Hills Infosec Incident Responder/Threat Hunter/Intelligence/SOC Principal Analyst) for a 25-min technical presentation on the practical use of YARA for incident response and threat hunting.
Join Santiago Bassett (founder and CEO of Wazuh) for a 25-min deep dive into how SOC teams can prevent attacks before they happen by combining real-time vulnerability detection, security configuration assessment, and posture management
Join Dan Rearden, ProCircular SOC Analyst Tier II, for a technical 25-min presentation on Sigma Rules and their application to your Security Information and Event Management (SIEM).
Join Hayden Covington, Black Hills Infosec SOC SecOps Lead, for a technical session on the practical workflow of transforming threat intelligence into detections.
In this 25-minute technical presentation, Carrie Roberts (Senior Distinguished InfoSec Engineer) will teach you how to leverage the power of the open-source Atomic Red Team library to execute scripted, realistic cyber-attacks within your own environments.
