Anti-Cast: How to Strengthen M365 Exchange Online Configurations with Kevin Klingbile
Join instructor Kevin Klingbile to learn how attackers exploit weak mail flow rules and how to stop them.
Join instructor Kevin Klingbile to learn how attackers exploit weak mail flow rules and how to stop them.
Join Patterson Cake, Black Hills Infosec Director of Incident Response, for a technical session outlining a prioritized approach to endpoint investigations, focusing on where and how unauthorized access and activity impact Windows and Linux.
Summit: March 25 @ 10:00 am – 4:00 pm EDT Live Training: March 26 – April 10 Security Operations Centers are where defenders grow, pressure is real, and impact matters. The Antisyphon Training SOC Summit is a free, 6-hour, live virtual event designed to give ...
In this 25-minute technical presentation, Seth Williams will walk through hands-on email forensics using Sublime Security’s free EML Analyzer, teaching you how to break down raw email files to uncover the true mechanics of phishing, malware delivery, and social engineering attacks.
Join Ashley Knowles, a Black Hills InfoSec Security Consultant, for a 25-minute technical presentation where she will draw on real-world penetration testing experience to help you close coverage gaps.
Join Wade Wells (Staff Detection & Response Engineer) for a 25-minute, conversational walk-through of how AI can boost every part of the detection lifecycle, from generating new detection ideas and tightening logic to evaluating coverage, finding blind spots, and automating documentation.
Join Ched Wiggins (Security Operations Center Lead) for a 25-minute, technical presentation on how to analyze email contents for indicators and clues in order to ensure the minimal number of suspicious emails enter your user's Inbox.
In this 25-minute technical presentation, Bruce Potter, CEO and founder of Turngate, will examine the impact of good and bad UI on security operations.
