-
-
-
-
-
-
Professionally Evil CISSP Mentorship Program
$100 – $1000 -
SOC Summit Talk: Needle Hunting: An Endpoint Investigation Cheat Sheet
Join Patterson Cake, Black Hills Infosec Director of Incident Response, for a technical session outlining a prioritized approach to endpoint investigations, focusing on where and how unauthorized access and activity impact Windows and Linux.
-
SOC Summit
Summit: March 25 @ 10:00 am – 4:00 pm EDT Live Training: March 26 – April 10 Security Operations Centers are where defenders grow, pressure is real, and impact matters. The Antisyphon Training SOC Summit is a free, 6-hour, live virtual event designed to give ...
-
SOC Summit Talk: Practical Email Forensics with EML Analyzer
In this 25-minute technical presentation, Seth Williams will walk through hands-on email forensics using Sublime Security’s free EML Analyzer, teaching you how to break down raw email files to uncover the true mechanics of phishing, malware delivery, and social engineering attacks.
-
SOC Summit Talk: Using Pentest Findings to Improve Detections
Join Ashley Knowles, a Black Hills InfoSec Security Consultant, for a 25-minute technical presentation where she will draw on real-world penetration testing experience to help you close coverage gaps.
-
SOC Summit Talk: Augmented Detection Engineering
Join Wade Wells (Staff Detection & Response Engineer) for a 25-minute, conversational walk-through of how AI can boost every part of the detection lifecycle, from generating new detection ideas and tightening logic to evaluating coverage, finding blind spots, and automating documentation.
-
SOC Summit Talk: Static Email Analysis
Join Ched Wiggins (Security Operations Center Lead) for a 25-minute, technical presentation on how to analyze email contents for indicators and clues in order to ensure the minimal number of suspicious emails enter your user's Inbox.
-
SOC Summit Talk: How UI/UX Impacts SOC Performance
In this 25-minute technical presentation, Bruce Potter, CEO and founder of Turngate, will examine the impact of good and bad UI on security operations.
-
SOC Summit Talk: Detecting Malware with YARA Rules
Join Troy Wojewoda (Black Hills Infosec Incident Responder/Threat Hunter/Intelligence/SOC Principal Analyst) for a 25-min technical presentation on the practical use of YARA for incident response and threat hunting.
