BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//Antisyphon Training - ECPv6.15.17.1//NONSGML v1.0//EN
CALSCALE:GREGORIAN
METHOD:PUBLISH
X-ORIGINAL-URL:https://www.antisyphontraining.com
X-WR-CALDESC:Events for Antisyphon Training
REFRESH-INTERVAL;VALUE=DURATION:PT1H
X-Robots-Tag:noindex
X-PUBLISHED-TTL:PT1H
BEGIN:VTIMEZONE
TZID:America/Denver
BEGIN:DAYLIGHT
TZOFFSETFROM:-0700
TZOFFSETTO:-0600
TZNAME:MDT
DTSTART:20250309T090000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0600
TZOFFSETTO:-0700
TZNAME:MST
DTSTART:20251102T080000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0700
TZOFFSETTO:-0600
TZNAME:MDT
DTSTART:20260308T090000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0600
TZOFFSETTO:-0700
TZNAME:MST
DTSTART:20261101T080000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0700
TZOFFSETTO:-0600
TZNAME:MDT
DTSTART:20270314T090000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0600
TZOFFSETTO:-0700
TZNAME:MST
DTSTART:20271107T080000
END:STANDARD
END:VTIMEZONE
BEGIN:VTIMEZONE
TZID:America/New_York
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20250309T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20251102T060000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20260308T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20261101T060000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20270314T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20271107T060000
END:STANDARD
END:VTIMEZONE
BEGIN:VEVENT
DTSTART;TZID=America/Denver:20260210T083000
DTEND;TZID=America/Denver:20260211T170000
DTSTAMP:20260403T165128
CREATED:20251107T145639Z
LAST-MODIFIED:20251107T145639Z
UID:10000850-1770712200-1770829200@www.antisyphontraining.com
SUMMARY:Practical iOS Application Security Testing with Cameron Cartier and Dave Blandford
DESCRIPTION:
URL:https://www.antisyphontraining.com/event/practical-ios-application-security-testing-with-cameron-cartier-and-dave-blandford/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20260218T120000
DTEND;TZID=America/New_York:20260218T130000
DTSTAMP:20260403T165128
CREATED:20260130T090808Z
LAST-MODIFIED:20260225T160539Z
UID:10000892-1771416000-1771419600@www.antisyphontraining.com
SUMMARY:Anti-Cast: Adapting to Active Directory Security Enhancements with Eric Kuehn
DESCRIPTION:Are your go-to Active Directory attacks quietly failing without you noticing? \n\n\n\nJoin Eric Kuehn\, Principal Security Consultant at Secure Ideas\, for a free one-hour training session that takes a deep dive into the security enhancements Microsoft has introduced to Active Directory over the past few years and how they are reshaping the way penetration testers and defenders operate. \n\n\n\nYou’ll learn how long-reliable attack paths now break\, how successful attacks may leave new and unexpected traces\, and what these changes mean for staying stealthy during an engagement. \n\n\n\nEric will teach you the latest AD hardening features\, the new detection opportunities they create\, and the practical changes testers and defenders can make to improve their tradecraft right away. \n\n\n\n\nRegister Here\n\n\n\n\nJoin us for PreShow Banter™ at 11:30 AM ETChat with your fellow attendees in the BHIS Discord server:https://discord.gg/bhis in the #🔴live-chat channel \n\n\n\nStay up to date on our upcoming live Anti-Casts and more at https://poweredbybhis.com \n\n\n\nDon’t forget to check out our Course Catalog for our upcoming free and affordable cybersecurity training! \n\n\n\n 
URL:https://www.antisyphontraining.com/event/anti-cast-adapting-to-active-directory-security-enhancements-with-eric-kuehn/
CATEGORIES:Anti-Cast
ATTACH;FMTTYPE=image/webp:https://www.antisyphontraining.com/wp-content/uploads/2026/01/Adapting-to-Active-Directory-Security-Enhancements-with-Eric-Kuehn.webp
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20260223T120000
DTEND;TZID=America/New_York:20260226T160000
DTSTAMP:20260403T165128
CREATED:20251202T211744Z
LAST-MODIFIED:20260218T210801Z
UID:10000859-1771848000-1772121600@www.antisyphontraining.com
SUMMARY:Cybersecurity Foundations
DESCRIPTION:
URL:https://www.antisyphontraining.com/event/cybersecurity-foundations-1/
CATEGORIES:Blue Team,Fundamentals,Mitre Att&ck,Pay What You Can
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20260225T120000
DTEND;TZID=America/New_York:20260225T130000
DTSTAMP:20260403T165128
CREATED:20260130T090806Z
LAST-MODIFIED:20260130T090809Z
UID:10000893-1772020800-1772024400@www.antisyphontraining.com
SUMMARY:Anti-Cast: Red Teaming AI: OWASP LLM Top 10 with Brian and Derek
DESCRIPTION:Join AI researchers Brian Fehrman and Derek Banks for a free one-hour training session that breaks down the OWASP Top 10 AI-LLM risks clearly and practically. \n\n\n\nYou’ll learn in this Antisyphon Anti-cast how LLM security issues show up in real systems\, how attackers test them\, and what to focus on to secure AI applications with a practical\, security-first mindset. \n\n\n\n\nRegister Here\n\n\n\n\nJoin us for PreShow Banter™ at 11:30 AM ETChat with your fellow attendees in the BHIS Discord server:https://discord.gg/bhis in the #🔴live-chat channel \n\n\n\nStay up to date on our upcoming live Anti-Casts and more at https://poweredbybhis.com \n\n\n\nDon’t forget to check out our Course Catalog for our upcoming free and affordable cybersecurity training! \n\n\n\n 
URL:https://www.antisyphontraining.com/event/anti-cast-red-teaming-ai-owasp-llm-top-10-with-brian-and-derek/
CATEGORIES:Anti-Cast
ATTACH;FMTTYPE=image/webp:https://www.antisyphontraining.com/wp-content/uploads/2026/01/Red-Teaming-AI-OWASP-LLM-Top-10-with-Brian-and-Derek.webp
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20260304T120000
DTEND;TZID=America/New_York:20260304T130000
DTSTAMP:20260403T165128
CREATED:20260225T161324Z
LAST-MODIFIED:20260225T161327Z
UID:10000920-1772625600-1772629200@www.antisyphontraining.com
SUMMARY:Preparing IR for AI Incidents with Gerard Johansen
DESCRIPTION:Is your Incident Response plan AI ready? \n\n\n\nJoin us for a free one-hour training session with incident management expert and instructor Gerard Johansen\, where he’ll teach how to adapt your Incident Response plan to AI-related risks and threats. \n\n\n\nYou’ll learn how AI incidents actually happen and how to respond to them. \n\n\n\nGerard will also cover what to include in your incident response plan so you’re prepared as your organization adopts AI. \n\n\n\n\nRegister Here\n\n\n\n\nJoin us for PreShow Banter™ at 11:30 AM ETChat with your fellow attendees in the BHIS Discord server:https://discord.gg/bhis in the #🔴live-chat channel \n\n\n\nStay up to date on our upcoming live Anti-Casts and more at https://poweredbybhis.com \n\n\n\nDon’t forget to check out our Course Catalog for our upcoming free and affordable cybersecurity training! \n\n\n\n 
URL:https://www.antisyphontraining.com/event/preparing-ir-for-ai-incidents-with-gerard-johansen/
CATEGORIES:Anti-Cast
ATTACH;FMTTYPE=image/avif:https://www.antisyphontraining.com/wp-content/uploads/2026/02/Preparing-IR-for-AI-Incidents-with-Gerard-Johansen.avif
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20260306T120000
DTEND;TZID=America/New_York:20260306T160000
DTSTAMP:20260403T165128
CREATED:20260127T162525Z
LAST-MODIFIED:20260224T233756Z
UID:10000890-1772798400-1772812800@www.antisyphontraining.com
SUMMARY:Workshop: Hacking AI-LLM Applications
DESCRIPTION:
URL:https://www.antisyphontraining.com/event/workshop-hacking-ai-llm-applications/
CATEGORIES:Artificial Intelligence,Blue Team,Pay What You Can,Workshop
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20260310T100000
DTEND;TZID=America/New_York:20260310T160000
DTSTAMP:20260403T165128
CREATED:20260225T190517Z
LAST-MODIFIED:20260225T190517Z
UID:10000922-1773136800-1773158400@www.antisyphontraining.com
SUMMARY:Workshop: Job Hunt Like a Hacker - 2026 Edition
DESCRIPTION:
URL:https://www.antisyphontraining.com/event/workshop-job-hunt-like-a-hacker-2026-edition/
CATEGORIES:Pay What You Can,Workshop
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20260311T120000
DTEND;TZID=America/New_York:20260311T130000
DTSTAMP:20260403T165128
CREATED:20260306T145621Z
LAST-MODIFIED:20260306T145624Z
UID:10000924-1773230400-1773234000@www.antisyphontraining.com
SUMMARY:Anti-Cast: How to Detect Malicious Remote Workers with James McQuiggan
DESCRIPTION:Could a nation-state threat actor get hired and stay invisible to your SOC? \n\n\n\nJoin us for a free one-hour training session with James McQuiggan\, CISSP and Advisory CISO\, as he teaches you the full lifecycle of North Korea’s AI-enabled IT worker operation\, from AI-generated identities and U.S.-based laptop farms to the data theft and extortion that follow once they’re inside. \n\n\n\nYou’ll learn a practical detection and hunting playbook covering behavioral anomalies\, identity red flags\, and post-hire SOC indicators that catch what background checks miss. \n\n\n\nIf your SOC isn’t hunting for threats that were hired legitimately\, this Antisyphon Anti-cast will change that. \n\n\n\n\nRegister Here\n\n\n\n\nJoin us for PreShow Banter™ at 11:30 AM ETChat with your fellow attendees in the BHIS Discord server:https://discord.gg/bhis in the #🔴live-chat channel \n\n\n\nStay up to date on our upcoming live Anti-Casts and more at https://poweredbybhis.com \n\n\n\nDon’t forget to check out our Course Catalog for our upcoming free and affordable cybersecurity training! \n\n\n\n 
URL:https://www.antisyphontraining.com/event/anti-cast-how-to-detect-malicious-remote-workers-with-james-mcquiggan/
CATEGORIES:Anti-Cast
ATTACH;FMTTYPE=image/avif:https://www.antisyphontraining.com/wp-content/uploads/2026/03/maxresdefault_live.avif
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20260313T120000
DTEND;TZID=America/New_York:20260313T160000
DTSTAMP:20260403T165128
CREATED:20260210T165830Z
LAST-MODIFIED:20260210T170916Z
UID:10000916-1773403200-1773417600@www.antisyphontraining.com
SUMMARY:Workshop: Foundations of Dynamic Analysis for AppSec
DESCRIPTION:
URL:https://www.antisyphontraining.com/event/workshop-foundations-of-dynamic-analysis-for-appsec/
CATEGORIES:Dynamic Analysis,Program Architecture
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20260316T100000
DTEND;TZID=America/New_York:20260317T180000
DTSTAMP:20260403T165128
CREATED:20260223T065621Z
LAST-MODIFIED:20260313T155508Z
UID:10000919-1773655200-1773770400@www.antisyphontraining.com
SUMMARY:Attacking\, Defending\, and Leveraging AI-LLM Systems
DESCRIPTION:
URL:https://www.antisyphontraining.com/event/attacking-defending-and-leveraging-ai-llm-systems/
CATEGORIES:Artificial Intelligence,Blue Team,LLM,Red Team
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20260317T140000
DTEND;TZID=America/New_York:20260526T160000
DTSTAMP:20260403T165128
CREATED:20251105T172706Z
LAST-MODIFIED:20260304T155430Z
UID:10000834-1773756000-1779811200@www.antisyphontraining.com
SUMMARY:Professionally Evil CISSP Mentorship Program
DESCRIPTION:
URL:https://www.antisyphontraining.com/event/professionally-evil-cissp-mentorship-program-4/
CATEGORIES:CISSP Training,Pay What You Can,SecureIdeas
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20260318T120000
DTEND;TZID=America/New_York:20260318T130000
DTSTAMP:20260403T165128
CREATED:20260303T144553Z
LAST-MODIFIED:20260303T144556Z
UID:10000923-1773835200-1773838800@www.antisyphontraining.com
SUMMARY:Anti-Cast: Securing the Cloud in the Age of AI with Andrew Krug
DESCRIPTION:Existential Courage: The Hitchhiker’s Guide to Surviving AI in Cloud \n\n\n\nCan AI really help secure the cloud\, or is it quietly making things worse? \n\n\n\nJoin Antisyphon instructor and security researcher Andrew Krug for a free one-hour Anti-cast on what really happens when AI collides with cloud security. \n\n\n\nAndrew will cut through the hype and look at how LLMs affect IAM\, monitoring\, governance\, and real-world risk. \n\n\n\nLearn where AI helps\, where it hallucinates\, and how to defend cloud environments without panic. \n\n\n\nExpect practical insights\, grounded strategy\, and a bit of cosmic humor. Bring your towel. Don’t panic. \n\n\n\n\nRegister Here\n\n\n\n\nJoin us for PreShow Banter™ at 11:30 AM ETChat with your fellow attendees in the BHIS Discord server:https://discord.gg/bhis in the #🔴live-chat channel \n\n\n\nStay up to date on our upcoming live Anti-Casts and more at https://poweredbybhis.com \n\n\n\nDon’t forget to check out our Course Catalog for our upcoming free and affordable cybersecurity training! \n\n\n\n 
URL:https://www.antisyphontraining.com/event/anti-cast-securing-the-cloud-in-the-age-of-ai-with-andrew-krug/
CATEGORIES:Anti-Cast
ATTACH;FMTTYPE=image/avif:https://www.antisyphontraining.com/wp-content/uploads/2026/02/maxresdefault_live-5.avif
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20260323T100000
DTEND;TZID=America/New_York:20260324T180000
DTSTAMP:20260403T165128
CREATED:20260218T164308Z
LAST-MODIFIED:20260218T170302Z
UID:10000917-1774260000-1774375200@www.antisyphontraining.com
SUMMARY:Red Team Fundamentals for Active Directory
DESCRIPTION:
URL:https://www.antisyphontraining.com/event/red-team-fundamentals-for-active-directory/
CATEGORIES:Fundamentals,Pay What You Can,Red Team,SecureIdeas
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20260325T100000
DTEND;TZID=America/New_York:20260325T102500
DTSTAMP:20260403T165128
CREATED:20260122T211713Z
LAST-MODIFIED:20260123T174952Z
UID:10000878-1774432800-1774434300@www.antisyphontraining.com
SUMMARY:SOC Summit Talk: Needle Hunting: An Endpoint Investigation Cheat Sheet
DESCRIPTION:With Patterson Cake \n\n\n\n\n\n\n\nHow do you investigate – let alone understand – an endpoint operating system with more than 50 million lines of code? \n\n\n\nJoin Patterson Cake\, Black Hills Infosec Director of Incident Response\, for a technical session outlining a prioritized approach to endpoint investigations\, focusing on where and how unauthorized access and activity impact Windows and Linux. \n\n\n\nYou’ll learn about the endpoint “attack surface\,” prioritization of operating-system artifact selection\, suggested workflow for artifact acquisition\, and a methodology for identification of indicators of compromise. \n\n\n\n\nRegister Here\n\n\n\n\nChat with your fellow SOC Summit attendees in the Antisyphon Discord server: https://discord.gg/antisyphon \n\n\n\n\n\n This talk is part of the Antisyphon Training SOC Summit\, a free\, 6-hour\, live virtual event designed to give you an honest\, practical look at what it’s really like to work in a SOC. \n\n\n\nFor those who want to go further\, multiple hands-on\, high-quality\, and affordable training courses are available March 26-April 10 to help you deepen your skills and become more effective at protecting what matters most. \n\n\n\nPatterson Cake will be teaching his Incident Response Simplified class on April 3. \n\n\n\n\nLearn more about the SOC Summit\n\n\n\n\nSee the entire Antisyphon Training Course Catalog for affordable cybersecurity training!  \n\n\n\n\n\n\n\nAbout the Instructor\n\n\n\nPatterson Cake\n\n\n\n\nBio\n\n\n\nPatterson Cake joined the Black Hills Information Security (BHIS) pirate ship in June of 2023 as a Security Analyst focusing primarily on detection engineering and digital forensics and incident response. He chose BHIS because\, to paraphrase\, “doing cool stuff with cool people” and “making the world a better/safer place” is exactly how he wants to spend his professional time and energy. It also helps that he has a bit of history with a couple of awesome folks that have been with BHIS for many moons. Prior to joining the team\, Patterson helped build and lead a DFIR practice for an MSSP\, worked as a senior security engineer for AWS Managed Services\, and spent several years in enterprise cybersecurity\, often healthcare related\, focusing on intermingling offensive security and incident response in technical and leadership roles. Outside of work\, he enjoys spending time with his family\, which often involves motorcycles\, outdoor sports\, movies\, and music. \n\n\n\n\n\n\n\n\n\n\n\n\n 
URL:https://www.antisyphontraining.com/event/soc-summit-talk-needle-hunting-an-endpoint-investigation-cheat-sheet/
CATEGORIES:Blue Team,Incident Response,SOC
ATTACH;FMTTYPE=image/webp:https://www.antisyphontraining.com/wp-content/uploads/2026/01/Talk_Needle-Hunting-An-Endpoint-Investigation-Cheat-Sheet_Patterson-Cake.webp
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20260325T100000
DTEND;TZID=America/New_York:20260325T160000
DTSTAMP:20260403T165128
CREATED:20260123T201514Z
LAST-MODIFIED:20260327T153444Z
UID:10000889-1774432800-1774454400@www.antisyphontraining.com
SUMMARY:SOC Summit
DESCRIPTION:Summit: \n\n\n\n\nMarch 25 @ 10:00 am – 4:00 pm EDT \n\n\n\n\n\nLive Training: \n\n\n\nMarch 26 – April 10 \n\n\n\n\n\n\n\n\n\nREGISTER FOR SUMMIT ONLY\n\n\n\nREGISTER FOR LIVE TRAINING\n\n\n\n\n\n\n\n\n\n \n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\nSecurity Operations Centers are where defenders grow\, pressure is real\, and impact matters. \n\n\n\n \n\n\n\nThe Antisyphon Training SOC Summit is a free\, 6-hour\, live virtual event designed to give you an honest\, practical look at what it’s really like to work in a SOC. \n\n\n\n \n\n\n\nOn March 25th\, 2026\, join thousands of security practitioners and aspiring defenders from across the community as experienced professionals break down day-to-day SOC life\, essential technical skills\, and career insights to help you break in\, level up\, or pivot with confidence. \n\n\n\n \n\n\n\nFor those who want to go further\, multiple hands-on\, high-quality\, and affordable training courses will be available after the Summit to help you deepen your skills and become more effective at protecting what matters most. \n\n\n\n\n\n\n\n\nSummit Schedule – All Times Eastern U.S.\n\n\n\n\n9:30 – PreShow Banter\n\n\n\n10:00 – Patterson Cake – Needle Hunting: An Endpoint Investigation Cheat Sheet\n\n\n\n10:30 – Seth Williams – Practical Email Forensics with EML Analyzer\n\n\n\n11:00 – Ashley Knowles – Using Pentest Findings to Improve Detections\n\n\n\n11:30 – Wade Wells – Augmented Detection Engineering\n\n\n\n12:00 – Ched Wiggins – Static Email Analysis\n\n\n\n12:30 – Bruce Potter – How UI/UX Impacts SOC Performance\n\n\n\n1:00 – Troy Wojewoda – Detecting Malware with YARA Rules\n\n\n\n1:30 – LUNCH BREAK\n\n\n\n2:00 – Santiago Bassett – Proactive Threat Prevention with Wazuh\n\n\n\n2:30 – Dan Rearden – One Sigma to Rule Them All\n\n\n\n3:00 – Hayden Covington – From Cyber Threat Intelligence (CTI) to Detection\n\n\n\n3:30 – Carrie Roberts – Validate Security Controls with Atomic Red Team\n\n\n\n4:00 – CLOSING REMARKS\n\n\n\n\n\n\n\n\nTalk Schedule – All Times Eastern U.S.\n\n\n\n\n\n\n\n\n\n\nSOC Summit Talk: Needle Hunting: An Endpoint Investigation Cheat SheetPatterson CakeMarch 25 @ 10:00 am – 10:25 am EDT \n\n\n\n \n\n\n\n\n\n\n\n\n\n\n\nSOC Summit Talk: Practical Email Forensics with EML AnalyzerSeth WilliamsMarch 25 @ 10:30 am – 10:55 am EDT \n\n\n\n \n\n\n\n\n\n\n\n\n\n\n\nSOC Summit Talk: Using Pentest Findings to Improve DetectionsAshley KnowlesMarch 25 @ 11:00 am – 11:25 am EDT \n\n\n\n \n\n\n\n\n\n\n\n\n\n\n\n\n\nSOC Summit Talk: Augmented Detection EngineeringWade WellsMarch 25 @ 11:30 am – 11:55 am EDT \n\n\n\n \n\n\n\n\n\n\n\n\n\n\n\nSOC Summit Talk: Static Email AnalysisChed WigginsMarch 25 @ 12:00 pm – 12:25 pm EDT \n\n\n\n \n\n\n\n\n\n\n\n\n\n\n\nSOC Summit Talk: How UI/UX Impacts SOC PerformanceBruce PotterMarch 25 @ 12:30 pm – 12:55 pm EDT \n\n\n\n \n\n\n\n\n\n\n\n\n\n\n\n\n\nSOC Summit Talk: Detecting Malware with YARA RulesTroy WojewodaMarch 25 @ 1:00 pm – 1:25 pm EDT \n\n\n\n \n\n\n\n\n\n\n\n\n\n\n\nSOC Summit Talk: Proactive Threat Prevention with WazuhSantiago BassetMarch 25 @ 2:00 pm – 2:25 pm EDT \n\n\n\n \n\n\n\n\n\n\n\n\n\n\n\nSOC Summit Talk: One Sigma to Rule Them AllDan ReardenMarch 25 @ 2:30 pm – 2:55 pm EDT \n\n\n\n \n\n\n\n\n\n\n\n\n\n\n\n\n\nSOC Summit Talk: From Cyber Threat Intelligence (CTI) to DetectionHayden CovingtonMarch 25 @ 3:00 pm – 3:25 pm EDT \n\n\n\n \n\n\n\n\n\n\n\n\n\n\n\nSOC Summit Talk: Validate Security Controls with Atomic Red TeamCarrie RobertsMarch 25 @ 3:30 pm – 3:55 pm EDT \n\n\n\n \n\n\n\n\n\n\n\n \n\n\n\n \n\n\n\n\n\n\n\n\n\n\n\nTake Your Learning Further with LIVE Hands-On Training \n\n\n\nTraining Classes Include: \n\n\n\n\n\n\n\n\n\n\nCybersecurity Incident CommandGerard JohansenMarch 26-27 @ 10:00 am – 6:00 pm EDT$575 \n\n\n\n\n\n\n\n\n\n\n\nNetwork Forensics and Incident ResponseTroy WojewodaMarch 30-31 @ 10:00 am – 6:00 pm EDT$575 \n\n\n\n \n\n\n\n \n\n\n\n\n\n\n\n\n\n\n\nSecuring the Cloud: FoundationsAndrew KrugApril 1-2 @ 10:00 am – 6:00 pm EDT$575 \n\n\n\n \n\n\n\n\n\n\n\n\n\n\n\n\n\nIncident Response SimplifiedPatterson CakeApril 3 @ 10:00 am – 6:00 pm EDT$295 \n\n\n\n\n\n\n\n\n\n\n\nSOC Core Skills with John StrandJohn StrandApril 6-9 @ 12:00 pm – 4:00 pm EDT$25-$300 \n\n\n\n \n\n\n\n\n\n\n\n\n\n\n\nWorkshop: SOC Detection Engineering Crash CourseHayden CovingtonApril 10 @ 12:00 pm – 4:00 pm EDT$25-$300 \n\n\n\n \n\n\n\n\n\n\nHave a Training Budget? \n\n\n\nWe have reimbursement form templates specially crafted for our SOC Summit training offerings! \n\n\n\n\nCybersecurity Incident Command –  Template\n\n\n\nIncident Response Simplified – Template\n\n\n\nNetwork Forensics and Incident Response – Template\n\n\n\nSecuring the Cloud Foundations –  Template\n\n\n\n\nWhy Attend Antisyphon Training Events?Antisyphon Training Summits are built on a commitment to fostering community and engagement. Our events encourage connections between attendees\, instructors\, and industry leaders. Join us to learn\, collaborate\, and grow your network in the cybersecurity community.
URL:https://www.antisyphontraining.com/event/soc-summit/
CATEGORIES:Summit
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20260325T103000
DTEND;TZID=America/New_York:20260325T105500
DTSTAMP:20260403T165128
CREATED:20260122T211538Z
LAST-MODIFIED:20260123T174935Z
UID:10000879-1774434600-1774436100@www.antisyphontraining.com
SUMMARY:SOC Summit Talk: Practical Email Forensics with EML Analyzer
DESCRIPTION:With Seth Williams \n\n\n\n\n\n\n\nWhen you’re handed a suspicious email\, how do you investigate what it is really doing? \n\n\n\nIn this 25-minute technical presentation\, Seth Williams will walk through hands-on email forensics using Sublime Security’s free EML Analyzer\, teaching you how to break down raw email files to uncover the true mechanics of phishing\, malware delivery\, and social engineering attacks. \n\n\n\nYou’ll learn how to quickly review headers\, authentication results\, URLs\, attachments\, and metadata to validate detections\, explain why an email is dangerous\, and confidently decide when to escalate or close alerts and user reports. \n\n\n\nSharpen your email analysis skills and improve triage with evidence-based investigations. \n\n\n\nEML Analyzer – Sublime Security \n\n\n\nWe invited Seth and Sublime Security to present because their free tool can help you improve your suspicious email investigations today. \n\n\n\n\nRegister Here\n\n\n\n\nChat with your fellow SOC Summit attendees in the Antisyphon Discord server: https://discord.gg/antisyphon \n\n\n\n\n\n This talk is part of the Antisyphon Training SOC Summit\, a free\, 6-hour\, live virtual event designed to give you an honest\, practical look at what it’s really like to work in a SOC. \n\n\n\nFor those who want to go further\, multiple hands-on\, high-quality\, and affordable training courses are available March 26-April 10 to help you deepen your skills and become more effective at protecting what matters most. \n\n\n\n\nLearn more about the SOC Summit\n\n\n\n\nSee the entire Antisyphon Training Course Catalog for affordable cybersecurity training!  \n\n\n\n\n\n\n\nAbout the Instructor\n\n\n\nSeth Williams\n\n\n\n\nBio\n\n\n\nSeth Williams is the Global Partner CTO at Sublime Security\, where he builds and scales partner ecosystems across MSSPs\, VARs\, GSIs\, and technical alliances\, helping partners and customers achieve real-world security outcomes. With a career that spans federal and commercial security architecture\, large-scale SIEM operations\, professional services leadership\, and security strategy\, Seth brings a practical understanding of how security actually works in the field. He focuses on clear technical alignment\, cutting through complexity\, and turning advanced security capabilities into straightforward\, dependable solutions that partners can deliver confidently. \n\n\n\n\n\n\n\n\n\n\n\n\n  \n\n\n\n 
URL:https://www.antisyphontraining.com/event/soc-summit-talk-practical-email-forensics-with-eml-analyzer/
CATEGORIES:Blue Team,Forensics,SOC
ATTACH;FMTTYPE=image/webp:https://www.antisyphontraining.com/wp-content/uploads/2026/01/Talk_Practical-Email-Forensics-with-EML-Analyzer_Seth-Williams.webp
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20260325T110000
DTEND;TZID=America/New_York:20260325T112500
DTSTAMP:20260403T165128
CREATED:20260122T211157Z
LAST-MODIFIED:20260123T175008Z
UID:10000880-1774436400-1774437900@www.antisyphontraining.com
SUMMARY:SOC Summit Talk: Using Pentest Findings to Improve Detections
DESCRIPTION:With Ashley Knowles \n\n\n\n\n\n\n\nAre your pentest reports actually helping you make your detections better? \n\n\n\nPenetration tests reveal more than exploited or identified vulnerabilities. They can also expose blind spots in visibility and detections. \n\n\n\nJoin Ashley Knowles\, a Black Hills InfoSec Security Consultant\, for a 25-minute technical presentation where she will draw on real-world penetration testing experience to help you close coverage gaps. \n\n\n\nYou’ll learn how to turn penetration test findings into actionable improvements for alerting\, coverage\, and detections. \n\n\n\n\nRegister Here\n\n\n\n\nChat with your fellow SOC Summit attendees in the Antisyphon Discord server: https://discord.gg/antisyphon \n\n\n\n\n\n This talk is part of the Antisyphon Training SOC Summit\, a free\, 6-hour\, live virtual event designed to give you an honest\, practical look at what it’s really like to work in a SOC. \n\n\n\nFor those who want to go further\, multiple hands-on\, high-quality\, and affordable training courses are available March 26-April 10 to help you deepen your skills and become more effective at protecting what matters most. \n\n\n\n\nLearn more about the SOC Summit\n\n\n\n\nSee the entire Antisyphon Training Course Catalog for affordable cybersecurity training!  \n\n\n\n\n\n\n\nAbout the Instructor\n\n\n\nAshley Knowles\n\n\n\n\nBio\n\n\n\nAshley Knowles joined Black Hills Information Security (BHIS) in Fall 2021. As a Security Consultant\, Ashley’s role is to perform network (internal/external)\, social engineering\, and cloud penetration tests\, as well as participating in red team assessments. Since joining the infosec community in 2013\, she has developed and taught hacking classes\, worked as a security consultant\, and been a team lead on a red team. Ashley serves as a mentor at a local high school’s cybersecurity class and\, as someone who loves to learn and teach\, she looks forward to developing and teaching classes that add to BHIS’s educational catalogue. In her free time\, Ashely enjoys photography\, hiking and exploring new places with her kids\, and building Legos. \n\n\n\n\n\n\n\n\n\n\n\n\n 
URL:https://www.antisyphontraining.com/event/soc-summit-talk-using-pentest-findings-to-improve-detections/
CATEGORIES:Blue Team,Pentesting,SOC
ATTACH;FMTTYPE=image/webp:https://www.antisyphontraining.com/wp-content/uploads/2026/01/Talk_Using-Pentest-Findings-to-Improve-Detections_Ashley-Knowles.webp
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20260325T113000
DTEND;TZID=America/New_York:20260325T115500
DTSTAMP:20260403T165128
CREATED:20260122T211406Z
LAST-MODIFIED:20260123T171713Z
UID:10000881-1774438200-1774439700@www.antisyphontraining.com
SUMMARY:SOC Summit Talk: Augmented Detection Engineering
DESCRIPTION:With Wade Wells \n\n\n\n\n\n\n\nDo you understand where AI can safely support the detection lifecycle? \nJoin Wade Wells (Staff Detection & Response Engineer) for a 25-minute\, conversational walk-through of how AI can boost every part of the detection lifecycle\, from generating new detection ideas and tightening logic to evaluating coverage\, finding blind spots\, and automating documentation. \n\n\n\n\n\nThis talk shows practical ways AI can brainstorm attack paths\, tighten detections\, translate logic\, surface logging gaps\, and draft documentation\, such as playbooks and detection cards\, so engineers can focus on precision and strategy. \nWade will focus on real\, usable techniques\, not hype\, showing what AI can safely augment and how to build a modern\, AI-assisted detection workflow. \n\n\n\n\n\n\nRegister Here\n\n\n\n\nChat with your fellow SOC Summit attendees in the Antisyphon Discord server: https://discord.gg/antisyphon \n\n\n\n\n\n This talk is part of the Antisyphon Training SOC Summit\, a free\, 6-hour\, live virtual event designed to give you an honest\, practical look at what it’s really like to work in a SOC. \n\n\n\nFor those who want to go further\, multiple hands-on\, high-quality\, and affordable training courses are available March 26-April 10 to help you deepen your skills and become more effective at protecting what matters most. \n\n\n\n\nLearn more about the SOC Summit\n\n\n\n\nSee the entire Antisyphon Training Course Catalog for affordable cybersecurity training!  \n\n\n\n\n\n\n\nAbout the Instructor\n\n\n\nWade Wells\n\n\n\n\nBio\n\n\n\nWade Wells is the Lead Detection Engineer for a Fortune 30 financial company. He has worked for eight years in security operations\, performing threat hunting\, cyber threat intelligence\, and detection engineering\, primarily in the financial sector. ​Active in the cybersecurity community\, Wade frequently speaks at prominent industry events and is involved with several security-focused organizations. \n\n\n\n\n\n\n\n\n\n\n\n\n 
URL:https://www.antisyphontraining.com/event/soc-summit-talk-augmented-detection-engineering/
CATEGORIES:Artificial Intelligence,Blue Team,SOC
ATTACH;FMTTYPE=image/webp:https://www.antisyphontraining.com/wp-content/uploads/2026/01/Talk_Augmented-Detection-Engineering_Wade-Wells.webp
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20260325T120000
DTEND;TZID=America/New_York:20260325T122500
DTSTAMP:20260403T165128
CREATED:20260122T211842Z
LAST-MODIFIED:20260123T175000Z
UID:10000883-1774440000-1774441500@www.antisyphontraining.com
SUMMARY:SOC Summit Talk: Static Email Analysis
DESCRIPTION:With Ched Wiggins \n\n\n\n\n\n\n\nDo you know how to protect your organization’s brand from reputational damage due to email-based attacks? \n\n\n\nJoin Ched Wiggins (Security Operations Center Lead) for a 25-minute\, technical presentation on how to analyze email contents for indicators and clues in order to ensure the minimal number of suspicious emails enter your user’s Inbox. \n\n\n\nChed will teach you practical analysis methods and email components: headers\, domains\, IP addresses\, SPF\, DKIM\, DMARC\, hyperlinks\, phones numbers\, attachments\, and how to carefully craft email filtration. \n\n\n\nYou’ll learn through real-world samples and solutions how to prevent and block suspicious links and other lures from reaching your users’ desks. \n\n\n\n\nRegister Here\n\n\n\n\nChat with your fellow SOC Summit attendees in the Antisyphon Discord server: https://discord.gg/antisyphon \n\n\n\n\n\n This talk is part of the Antisyphon Training SOC Summit\, a free\, 6-hour\, live virtual event designed to give you an honest\, practical look at what it’s really like to work in a SOC. \n\n\n\nFor those who want to go further\, multiple hands-on\, high-quality\, and affordable training courses are available March 26-April 10 to help you deepen your skills and become more effective at protecting what matters most. \n\n\n\n\nLearn more about the SOC Summit\n\n\n\n\nSee the entire Antisyphon Training Course Catalog for affordable cybersecurity training!  \n\n\n\n\n\n\n\nAbout the Instructor\n\n\n\nChed Wiggins\n\n\n\n\nBio\n\n\n\nChed “Cheddar” Wiggins is the Security Operations Center Lead at a mid-sized public teaching university. He has four years’ experience in IT and Security Operations\, five years’ experience in nuclear submarine power plant operations\, and four years’ experience in surface warship navigation\, small boats operations\, and leadership.  \n\n\n\nIn his spare time\, he likes to read\, journal\, meditate\, hunt\, fish\, snowboard\, walk outside to touch grass\, play computer games\, and work on small home and computer projects.  \n\n\n\n\n\n\n\n\n\n\n\n\n 
URL:https://www.antisyphontraining.com/event/soc-summit-talk-static-email-analysis/
CATEGORIES:Blue Team,Email,SOC
ATTACH;FMTTYPE=image/webp:https://www.antisyphontraining.com/wp-content/uploads/2026/01/Talk_Static-Email-Analysis_Ched-Wiggins.webp
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20260325T123000
DTEND;TZID=America/New_York:20260325T125500
DTSTAMP:20260403T165128
CREATED:20260122T211956Z
LAST-MODIFIED:20260122T212004Z
UID:10000884-1774441800-1774443300@www.antisyphontraining.com
SUMMARY:SOC Summit Talk: How UI/UX Impacts SOC Performance
DESCRIPTION:With Bruce Potter \n\n\n\n\n\n\n\nAre your SOC tools helping or slowing you down? \n\n\n\nIn the SOC\, velocity and accuracy matter. We train\, learn the tools of the trade\, and generally work to excel at our jobs. \n\n\n\nHowever\, there is one entity in the SOC that is often working against us… the user experience of modern cybersecurity tools. \n\n\n\nWhile we often have an excess of data at our fingertips\, getting to that data\, making sense of it\, and responding appropriately can be stymied by poor user interfaces and the overall experience of the tools we rely on. \n\n\n\nIn this 25-minute technical presentation\, Bruce Potter\, CEO and founder of Turngate\, will examine the impact of good and bad UI on security operations. \n\n\n\nYou’ll learn how UI/UX affects SOC performance\, see examples of tools that help or hinder operations\, discover how to evaluate SOC tools effectively\, and gain strategies to improve workflow and decision-making despite tool limitations. \n\n\n\n\nRegister Here\n\n\n\n\nChat with your fellow SOC Summit attendees in the Antisyphon Discord server: https://discord.gg/antisyphon \n\n\n\n\n\n\n\n This talk is part of the Antisyphon Training SOC Summit\, a free\, 6-hour\, live virtual event designed to give you an honest\, practical look at what it’s really like to work in a SOC. \n\n\n\nFor those who want to go further\, multiple hands-on\, high-quality\, and affordable training courses are available March 26-April 10 to help you deepen your skills and become more effective at protecting what matters most. \n\n\n\n\nLearn more about the SOC Summit\n\n\n\n\nSee the entire Antisyphon Training Course Catalog for affordable cybersecurity training!  \n\n\n\n\n\n\n\n\n\nAbout the Instructor\n\n\n\nBruce Potter\n\n\n\n\nBio\n\n\n\nBruce Potter is the CEO and founder of Turngate. Bruce has been in the cybersecurity business for nearly 30 years\, focusing on defensive technologies and security operations. Prior to Turngate\, Bruce served as the CISO at ClearStreet\, a prime brokerage firm based in New York City. At ClearStreet\, Bruce built and oversaw the cybersecurity and privacy risk programs. Prior to ClearStreet\, Bruce was the CISO at Expel\, an MDR based in Herdon VA. Bruce helps organize the ShmooCon cybersecurity conference and has published numerous articles and several books over the years.  \n\n\n\n\n\n\n\n\n\n\n\n\n 
URL:https://www.antisyphontraining.com/event/soc-summit-talk-how-ui-ux-impacts-soc-performance/
CATEGORIES:Blue Team,SOC,UI/UX
ATTACH;FMTTYPE=image/webp:https://www.antisyphontraining.com/wp-content/uploads/2026/01/Talk_How-UIUX-Impacts-SOC-Performance_Bruce-Potter.webp
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20260325T130000
DTEND;TZID=America/New_York:20260325T132500
DTSTAMP:20260403T165128
CREATED:20260122T213853Z
LAST-MODIFIED:20260123T175120Z
UID:10000885-1774443600-1774445100@www.antisyphontraining.com
SUMMARY:SOC Summit Talk: Detecting Malware with YARA Rules
DESCRIPTION:With Troy Wojewoda \n\n\n\n\n\n\n\nEver wondered how threat hunters automate pattern detection across massive datasets? \n\n\n\nJoin Troy Wojewoda (Black Hills Infosec Incident Responder/Threat Hunter/Intelligence/SOC Principal Analyst) for a 25-min technical presentation on the practical use of YARA for incident response and threat hunting. \n\n\n\nYou’ll learn about YARA rules\, strings\, conditions\, and how they help detect patterns in files and processes. \n\n\n\nTroy will teach through real-world examples of how YARA boosts detection\, from spotting malware families to scanning memory dumps\, and give you the hands-on skills to start creating and deploying your own YARA rules right away. \n\n\n\n\nRegister Here\n\n\n\n\nChat with your fellow SOC Summit attendees in the Antisyphon Discord server: https://discord.gg/antisyphon \n\n\n\n\n\n This talk is part of the Antisyphon Training SOC Summit\, a free\, 6-hour\, live virtual event designed to give you an honest\, practical look at what it’s really like to work in a SOC. \n\n\n\nFor those who want to go further\, multiple hands-on\, high-quality\, and affordable training courses are available March 26-April 10 to help you deepen your skills and become more effective at protecting what matters most. \nTroy Wojewoda will be teaching his Network Forensics & Incident Response class March 30-31. \n\n\n\n\nLearn more about the SOC Summit\n\n\n\n\nSee the entire Antisyphon Training Course Catalog for affordable cybersecurity training!  \n\n\n\n\n\n\n\nAbout the Instructor\n\n\n\nTroy Wojewoda\n\n\n\n\nBio\n\n\n\nTroy Wojewoda is a Security Analyst at Black Hills Information Security (BHIS). Prior to joining BHIS\, Troy has held roles in application and system administration\, host and network intrusion detection\, wireless security\, penetration testing\, digital forensics\, malware analysis\, threat hunting\, and incident response. In addition to earning several professional certifications\, Troy has a BS in Computer Engineering and Computer Science. \n\n\n\n\n\n\n\n\n\n\n\n\n 
URL:https://www.antisyphontraining.com/event/soc-summit-talk-detecting-malware-with-yara-rules/
CATEGORIES:Blue Team,SOC,Threat Hunting
ATTACH;FMTTYPE=image/webp:https://www.antisyphontraining.com/wp-content/uploads/2026/01/Talk_Detecting-Malware-with-YARA-Rules_Troy-Wojewoda.webp
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20260325T140000
DTEND;TZID=America/New_York:20260325T142500
DTSTAMP:20260403T165128
CREATED:20260122T210834Z
LAST-MODIFIED:20260123T175129Z
UID:10000882-1774447200-1774448700@www.antisyphontraining.com
SUMMARY:SOC Summit Talk: Proactive Threat Prevention with Wazuh
DESCRIPTION:With Santiago Bassett \n\n\n\n\n\n\n\nHow many known CVEs are sitting in your environment right now without you realizing it? \n\n\n\nJoin Santiago Bassett (founder and CEO of Wazuh) for a 25-min deep dive into how SOC teams can prevent attacks before they happen by combining real-time vulnerability detection\, security configuration assessment\, and posture management \n\n\n\nLearn how Wazuh constantly checks your systems for known CVEs\, verifies security settings against CIS benchmarks\, and keeps track of installed software to catch outdated or unauthorized applications. \n\n\n\nSantiago will teach you how these findings can trigger automated actions before attackers strike. \n\n\n\nWe invited Santiago and Wazuh to present because Wazuh is an open-source cybersecurity platform\, bringing XDR and SIEM together in a single solution\, which can be especially helpful if you don’t have anything in place yet. \n\n\n\n\nRegister Here\n\n\n\n\nChat with your fellow SOC Summit attendees in the Antisyphon Discord server: https://discord.gg/antisyphon \n\n\n\n\n\n This talk is part of the Antisyphon Training SOC Summit\, a free\, 6-hour\, live virtual event designed to give you an honest\, practical look at what it’s really like to work in a SOC. \n\n\n\nFor those who want to go further\, multiple hands-on\, high-quality\, and affordable training courses are available March 26-April 10 to help you deepen your skills and become more effective at protecting what matters most. \n\n\n\n\nLearn more about the SOC Summit\n\n\n\n\nSee the entire Antisyphon Training Course Catalog for affordable cybersecurity training!  \n\n\n\n\n\n\n\nAbout the Instructor\n\n\n\nSantiago Bassett\n\n\n\n\nBio\n\n\n\nSantiago Bassett is the founder and CEO of Wazuh\, with over 20 years of experience in cybersecurity and software engineering. His passion for building accessible security tools and his background in SIEM\, IDS\, and XDR technologies led him to create Wazuh.  \n\n\n\n\n\n\n\n\n\n\n\n\n  \n\n\n\n 
URL:https://www.antisyphontraining.com/event/soc-summit-talk-proactive-threat-prevention-with-wazuh/
CATEGORIES:Blue Team,SOC
ATTACH;FMTTYPE=image/webp:https://www.antisyphontraining.com/wp-content/uploads/2026/01/Talk_Proactive-Threat-Prevention-with-Wazuh_Santiago-Bassett.webp
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20260325T143000
DTEND;TZID=America/New_York:20260325T145500
DTSTAMP:20260403T165128
CREATED:20260122T213644Z
LAST-MODIFIED:20260123T175103Z
UID:10000888-1774449000-1774450500@www.antisyphontraining.com
SUMMARY:SOC Summit Talk: One Sigma to Rule Them All
DESCRIPTION:With Dan Rearden \n\n\n\n\n\n\n\nYou have Indicators of Compromise (IOCs) and EventIDs\, but how do you maximize their use across your entire detection stack? \n\n\n\nJoin Dan Rearden\, ProCircular SOC Analyst Tier II\, for a technical 25-min presentation on Sigma Rules and their application to your Security Information and Event Management (SIEM). \n\n\n\nYou’ll learn what a Sigma Rule is\, their benefits to your organization\, how to craft them yourself\, and ways to translate them into your SIEM query language. \n\n\n\nOpen up your favorite text editor\, and become the SIGMA of your SOC next time an emerging threat pops up! \n\n\n\n\nRegister Here\n\n\n\n\nChat with your fellow SOC Summit attendees in the Antisyphon Discord server: https://discord.gg/antisyphon \n\n\n\n\n\n This talk is part of the Antisyphon Training SOC Summit\, a free\, 6-hour\, live virtual event designed to give you an honest\, practical look at what it’s really like to work in a SOC. \n\n\n\nFor those who want to go further\, multiple hands-on\, high-quality\, and affordable training courses are available March 26-April 10 to help you deepen your skills and become more effective at protecting what matters most. \n\n\n\n\nLearn more about the SOC Summit\n\n\n\n\nSee the entire Antisyphon Training Course Catalog for affordable cybersecurity training!  \n\n\n\n\n\n\n\nAbout the Instructor\n\n\n\nDan Rearden\n\n\n\n\nBio\n\n\n\nHiya everyone! I’m Dan Rearden\, aka HaircutFish. My journey into the world of IT started unexpectedly at the start of 2020 with a knee injury. That left me in a career quandary\, as I wasn’t able to return to my previous employment. Finding myself with some unexpected downtime\, I decided to plunge headfirst into studying IT. Building my first PC and installing Windows opened up a whole new world\, especially when I discovered the magic of VMs and started exploring Linux. Honestly\, the more I learned\, the more captivated I became. It felt like stepping onto a path that kept branching off into equally interesting directions. My ADHD absolutely thrives on that kind of exploration! \n\n\n\nOne of those branches led me to a small computer and mobile repair shop\, where I got hands-on experience tearing down and fixing all sorts of tech. Eventually\, another fork in the road appeared: should I deepen my repair skills or explore something new? Hacking caught my eye\, and I was instantly hooked. For me\, it’s all about the thrill of solving puzzles\, and cybersecurity is just one giant\, intricate puzzle. \n\n\n\nFast forward to today\, and that hacking path presented me with another exciting choice: Red Team or Blue Team? Blue Team resonated more with who I am\, so I chose Blue Team. All that dedicated learning\, especially in the realm of Blue Team tactics\, brought me to my current position at ProCircular where I triage tickets daily\, as I work towards becoming a detection engineer. \n\n\n\n\n\n\n\n\n\n\n\n\n 
URL:https://www.antisyphontraining.com/event/soc-summit-talk-one-sigma-to-rule-them-all/
CATEGORIES:Blue Team,SOC
ATTACH;FMTTYPE=image/webp:https://www.antisyphontraining.com/wp-content/uploads/2026/01/Talk_One-Sigma-to-Rule-Them-All_Dan-Rearden.webp
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20260325T150000
DTEND;TZID=America/New_York:20260325T152500
DTSTAMP:20260403T165128
CREATED:20260122T212538Z
LAST-MODIFIED:20260123T175108Z
UID:10000886-1774450800-1774452300@www.antisyphontraining.com
SUMMARY:SOC Summit Talk: From Cyber Threat Intelligence (CTI) to Detection
DESCRIPTION:With Hayden Covington \n\n\n\n\n\n\n\nHow do you go from reading a threat intel report to deploying a working detection? \n\n\n\nJoin Hayden Covington\, Black Hills Infosec SOC SecOps Lead\, for a technical session on the practical workflow of transforming threat intelligence into detections. \n\n\n\nYou’ll learn how to extract the detection logic buried in CTI reports\, translate it into queries your SIEM understands\, and validate that it actually works. \n\n\n\nWalk away with a clear method you can apply the next time a new threat report hits your desk. \n\n\n\n\nRegister Here\n\n\n\n\nChat with your fellow SOC Summit attendees in the Antisyphon Discord server: https://discord.gg/antisyphon \n\n\n\n\n\n This talk is part of the Antisyphon Training SOC Summit\, a free\, 6-hour\, live virtual event designed to give you an honest\, practical look at what it’s really like to work in a SOC. \n\n\n\nFor those who want to go further\, multiple hands-on\, high-quality\, and affordable training courses are available March 26-April 10 to help you deepen your skills and become more effective at protecting what matters most. \n\n\n\nHayden Covington will be teaching his SOC Detection Engineering Crash Course on April 10. \n\n\n\n\nLearn more about the SOC Summit\n\n\n\n\nSee the entire Antisyphon Training Course Catalog for affordable cybersecurity training!  \n\n\n\n\n\n\n\nAbout the Instructor\n\n\n\nHayden Covington\n\n\n\n\nBio\n\n\n\nHayden Covington is a Senior Analyst in Black Hills Information Security’s SOC where he specializes in training\, quality assurance\, detection engineering\, and investigative analysis. With a previous background as a SOC analyst for a US naval contractor\, Hayden has extensive experience in Digital Forensics and Incident Response (DFIR)\, Security Orchestration\, Automation\, and Response (SOAR)\, and insider threat. \n\n\n\n\n\n\n\n\n\n\n\n\n 
URL:https://www.antisyphontraining.com/event/soc-summit-talk-from-cyber-threat-intelligence-cti-to-detection/
CATEGORIES:Blue Team,CTI,SOC
ATTACH;FMTTYPE=image/webp:https://www.antisyphontraining.com/wp-content/uploads/2026/01/Talk_From-Cyber-Threat-Intelligence-CTI-to-Detection_Hayden-Covington.webp
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20260325T153000
DTEND;TZID=America/New_York:20260325T155500
DTSTAMP:20260403T165128
CREATED:20260122T213154Z
LAST-MODIFIED:20260123T175114Z
UID:10000887-1774452600-1774454100@www.antisyphontraining.com
SUMMARY:SOC Summit Talk: Validate Security Controls with Atomic Red Team
DESCRIPTION:With Carrie Roberts \n\n\n\n\n\n\n\nDo you actually know if your security tools will trigger when it matters most\, or are you just hoping they will? \n\n\n\nIn this 25-minute technical presentation\, Carrie Roberts (Senior Distinguished InfoSec Engineer) will teach you how to leverage the power of the open-source Atomic Red Team library to execute scripted\, realistic cyber-attacks within your own environments. \n\n\n\nYou’ll learn how to move beyond assumptions by empirically validating your defenses\, confirming that alerts fire as expected\, and pinpointing critical coverage gaps before an adversary exploits them. \n\n\n\n\nRegister Here\n\n\n\n\nChat with your fellow SOC Summit attendees in the Antisyphon Discord server: https://discord.gg/antisyphon \n\n\n\n\n\n This talk is part of the Antisyphon Training SOC Summit\, a free\, 6-hour\, live virtual event designed to give you an honest\, practical look at what it’s really like to work in a SOC. \n\n\n\nFor those who want to go further\, multiple hands-on\, high-quality\, and affordable training courses are available March 26-April 10 to help you deepen your skills and become more effective at protecting what matters most. \n\n\n\n\nLearn more about the SOC Summit\n\n\n\n\nSee the entire Antisyphon Training Course Catalog for affordable cybersecurity training!  \n\n\n\n\n\n\n\nAbout the Instructor\n\n\n\nCarrie Roberts\n\n\n\n\nBio\n\n\n\nCarrie Roberts is a programmer\, turned pentester\, turned red teamer\, turned blueish purple. She is currently on the Red Team at Walmart. She loves to learn and give back to the community. She is one of the primary Atomic Red Team project maintainers and developers and has developed many of her own open-source tools. She holds master’s Degrees in both Computer Science and Information Security Engineering. \n\n\n\n\n\n\n\nCarrie Roberts\n\n\n\n\n\n\n 
URL:https://www.antisyphontraining.com/event/soc-summit-talk-validate-security-controls-with-atomic-red-team/
CATEGORIES:Blue Team,SOC
ATTACH;FMTTYPE=image/webp:https://www.antisyphontraining.com/wp-content/uploads/2026/01/Talk_Validate-Security-Controls-with-Atomic-Red-Team_Carrie-Roberts.webp
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20260326T100000
DTEND;TZID=America/New_York:20260327T180000
DTSTAMP:20260403T165128
CREATED:20260128T180208Z
LAST-MODIFIED:20260128T180208Z
UID:10000891-1774519200-1774634400@www.antisyphontraining.com
SUMMARY:Cybersecurity Incident Command
DESCRIPTION:
URL:https://www.antisyphontraining.com/event/cybersecurity-incident-command/
CATEGORIES:Incident Response
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20260330T100000
DTEND;TZID=America/New_York:20260331T180000
DTSTAMP:20260403T165128
CREATED:20260115T214426Z
LAST-MODIFIED:20260115T214718Z
UID:10000874-1774864800-1774980000@www.antisyphontraining.com
SUMMARY:Network Forensics and Incident Response
DESCRIPTION:
URL:https://www.antisyphontraining.com/event/network-forensics-and-incident-response/
CATEGORIES:Forensics,Incident Response
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20260401T100000
DTEND;TZID=America/New_York:20260402T180000
DTSTAMP:20260403T165128
CREATED:20260115T213646Z
LAST-MODIFIED:20260115T214131Z
UID:10000875-1775037600-1775152800@www.antisyphontraining.com
SUMMARY:Securing the Cloud: Foundations
DESCRIPTION:
URL:https://www.antisyphontraining.com/event/securing-the-cloud-foundations/
CATEGORIES:Blue Team,Cloud
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20260401T120000
DTEND;TZID=America/New_York:20260401T130000
DTSTAMP:20260403T165128
CREATED:20260313T042105Z
LAST-MODIFIED:20260313T042108Z
UID:10000925-1775044800-1775048400@www.antisyphontraining.com
SUMMARY:How to Write SOC Tickets That Build Trust and Drive Action with Dan Rearden
DESCRIPTION:What does the ideal SOC ticket look like? \n\n\n\nTechnical skills matter\, but clear communication is just as important. \n\n\n\nJoin SOC Analyst Dan Rearden for a free one-hour Antisyphon Anti-cast on using soft skills to level up your tickets. \n\n\n\nLearn how to make alerts clear\, findings impactful\, and documentation useful now and later. \n\n\n\n\nRegister Here\n\n\n\n\nJoin us for PreShow Banter™ at 11:30 AM ETChat with your fellow attendees in the BHIS Discord server:https://discord.gg/bhis in the #🔴live-chat channel \n\n\n\nStay up to date on our upcoming live Anti-Casts and more at https://poweredbybhis.com \n\n\n\nDon’t forget to check out our Course Catalog for our upcoming free and affordable cybersecurity training! \n\n\n\n 
URL:https://www.antisyphontraining.com/event/how-to-write-soc-tickets-that-build-trust-and-drive-action-with-dan-rearden/
CATEGORIES:Anti-Cast
ATTACH;FMTTYPE=image/avif:https://www.antisyphontraining.com/wp-content/uploads/2026/03/maxresdefault_live-1.avif
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20260403T100000
DTEND;TZID=America/New_York:20260403T180000
DTSTAMP:20260403T165128
CREATED:20260115T202957Z
LAST-MODIFIED:20260115T204924Z
UID:10000877-1775210400-1775239200@www.antisyphontraining.com
SUMMARY:Incident Response Simplified
DESCRIPTION:
URL:https://www.antisyphontraining.com/event/incident-response-simplified/
CATEGORIES:Blue Team,Incident Response,SOC
END:VEVENT
END:VCALENDAR