BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//Antisyphon Training - ECPv6.15.20//NONSGML v1.0//EN
CALSCALE:GREGORIAN
METHOD:PUBLISH
X-ORIGINAL-URL:https://www.antisyphontraining.com
X-WR-CALDESC:Events for Antisyphon Training
REFRESH-INTERVAL;VALUE=DURATION:PT1H
X-Robots-Tag:noindex
X-PUBLISHED-TTL:PT1H
BEGIN:VTIMEZONE
TZID:America/New_York
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20250309T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20251102T060000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20260308T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20261101T060000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20270314T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20271107T060000
END:STANDARD
END:VTIMEZONE
BEGIN:VTIMEZONE
TZID:America/Denver
BEGIN:DAYLIGHT
TZOFFSETFROM:-0700
TZOFFSETTO:-0600
TZNAME:MDT
DTSTART:20250309T090000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0600
TZOFFSETTO:-0700
TZNAME:MST
DTSTART:20251102T080000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0700
TZOFFSETTO:-0600
TZNAME:MDT
DTSTART:20260308T090000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0600
TZOFFSETTO:-0700
TZNAME:MST
DTSTART:20261101T080000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0700
TZOFFSETTO:-0600
TZNAME:MDT
DTSTART:20270314T090000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0600
TZOFFSETTO:-0700
TZNAME:MST
DTSTART:20271107T080000
END:STANDARD
END:VTIMEZONE
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20260617T150000
DTEND;TZID=America/New_York:20260617T152500
DTSTAMP:20260418T061239
CREATED:20260416T192108Z
LAST-MODIFIED:20260416T192112Z
UID:10000945-1781708400-1781709900@www.antisyphontraining.com
SUMMARY:Threat Hunting Summit Talk: Fast-track Reports into Ready-Made Hypotheses with AI
DESCRIPTION:With Lauren Proehl \n\n\n\n\n\n\n\nWhat if every intelligence report instantly became a ready‑to‑run hypothesis — instead of dying in a Slack channel? \n\n\n\nIn this talk\, Lauren Proehl\, Global Head of Detection and Response at Marsh and co‑founder of THOR Collective\, walks through a practical\, repeatable workflow for using large language models to convert published threat reports into structured\, testable hunt hypotheses. \n\n\n\nShe’ll break down how to extract attacker tradecraft\, map TTPs\, scope data sources\, and generate analytic logic hunters can run immediately. Real examples will help you explore how crafted prompts can surface detection gaps\, enrich investigations\, and produce hypotheses that go far beyond IOC matching. \n\n\n\nExamine how AI‑assisted workflows are reshaping the future of threat hunting and leave with a method you can put to work\, whether you’re a solo hunter or running a mature program. \n\n\n\n\nRegister Here\n\n\n\n\nChat with your fellow Threat Hunting Summit attendees in the Antisyphon Discord server: https://discord.gg/antisyphon \n\n\n\n\n\n\n\n This talk is part of the Antisyphon Training Threat Hunting Summit\, a free\, six-hour\, live virtual event designed to give you a practical\, real-world look at how cyber threat hunters detect stealthy adversaries\, investigate suspicious behavior\, and turn discoveries into stronger defenses. \n\n\n\nFor those who want to go further\, multiple hands-on\, high-quality\, and affordable training courses are available June 18-26 to help you sharpen your skills and become a more proactive\, effective defender. \n\n\n\n\nLearn more about the Threat Hunting Summit\n\n\n\n\nSee the entire Antisyphon Training Course Catalog for affordable cybersecurity training!  \n\n\n\n\n\n\n\n\n\nAbout the Instructor\n\n\n\nLauren Proehl\n\n\n\n\nBio\n\n\n\nLauren Proehl leads detection and response globally at Marsh\, overseeing the full lifecycle from threat intelligence through incident response and red teaming. She is co-founder of THOR Collective\, a practitioner-driven cybersecurity collective\, and has spent her career identifying and disrupting cyber adversaries across Fortune 500 networks — from data breaches to targeted intrusions. She now works to define some part of the limitless unknowns in cyberspace and make cybersecurity less abstract and more tangible. Lauren sits on the CFP board for BSides Kansas City\, serves on the board of Urban Trail Co.\, and tries to escape computers by running long distances in the woods.  \n\n\n\n\n\n\n\n\n\n\n\n\n 
URL:https://www.antisyphontraining.com/event/threat-hunting-summit-talk-fast-track-reports-into-ready-made-hypotheses-with-ai/
CATEGORIES:Threat Hunting
ATTACH;FMTTYPE=image/avif:https://www.antisyphontraining.com/wp-content/uploads/2026/04/TH-Summit-Talk_Lauren-Proehl_Fast-track-Reports.avif
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20260617T153000
DTEND;TZID=America/New_York:20260617T162000
DTSTAMP:20260418T061239
CREATED:20260416T194823Z
LAST-MODIFIED:20260417T135734Z
UID:10000949-1781710200-1781713200@www.antisyphontraining.com
SUMMARY:Threat Hunting Summit Keynote: Defending AI: Organized Musings on Securing AI Agents for Cybersecurity
DESCRIPTION:With Jason Haddix \n\n\n\n\n\n\n\nAre you securing your AI agents\, or just hoping the system prompt holds? \n\n\n\nAs AI agents move from prototypes into production\, most security programs are still treating them like traditional apps or opaque black boxes – and that gap is where real risk is emerging. \n\n\n\nJoin Jason Haddix\, CEO and “Hacker in Charge” at Arcanum Information Security\, as he lays out a practical architecture for defending AI agents based on real-world assessments and organizing controls across the full ecosystem: application design and tool boundaries\, system prompt hardening\, and intermediate guardrails and classifier-based protections. \n\n\n\nHe’ll cover how attacks actually manifest across these layers\, the best security practices and common missteps seen in development teams\, and where open-source defensive tooling fits today. \n\n\n\nThe focus of this talk is pragmatic: giving defenders a usable mental model\, concrete configurations\, and the tradeoffs they need to understand to make AI systems survivable in production. \n\n\n\nIf you’re building or defending AI systems\, this is the playbook you’ll want to have. \n\n\n\n\nRegister Here\n\n\n\n\nChat with your fellow Threat Hunting Summit attendees in the Antisyphon Discord server: https://discord.gg/antisyphon \n\n\n\n\n\n This talk is part of the Antisyphon Training Threat Hunting Summit\, a free\, six-hour\, live virtual event designed to give you a practical\, real-world look at how cyber threat hunters detect stealthy adversaries\, investigate suspicious behavior\, and turn discoveries into stronger defenses. \n\n\n\nFor those who want to go further\, multiple hands-on\, high-quality\, and affordable training courses are available June 18-26 to help you sharpen your skills and become a more proactive\, effective defender. \n\n\n\n\nLearn more about the Threat Hunting Summit\n\n\n\n\nSee the entire Antisyphon Training Course Catalog for affordable cybersecurity training!  \n\n\n\n\n\n\n\nAbout the Instructor\n\n\n\nJason Haddix\n\n\n\n\nBio\n\n\n\nJason Haddix\, also known as jhaddix\, is the CEO and “Hacker in Charge” at Arcanum Information Security. Arcanum is a world-class assessment and training company.  \n\n\n\nJason has had a distinguished 20-year career in cybersecurity\, previously serving as CISO of FLARE\, CISO of Buddobot\, CISO of Ubisoft\, Head of Trust/Security/Operations at Bugcrowd\, Director of Penetration Testing at HP\, and Lead Penetration Tester at Redspin. He has also held positions doing mobile penetration testing\, network/infrastructure security assessments\, and static analysis. Jason is a hacker and bug hunter and is currently ranked 57th all-time on Bugcrowd’s bug bounty leaderboards. Currently\, he specializes in recon\, web application analysis\, and emerging technologies. Jason has also authored many talks on offensive security methodology\, including speaking at conferences such as DEFCON\, Bsides\, BlackHat\, RSA\, OWASP\, Nullcon\, SANS\, IANS\, BruCon\, Toorcon and many more.   \n\n\n\n\n\n\n\n\n\n\n\n\n 
URL:https://www.antisyphontraining.com/event/threat-hunting-summit-keynote-defending-ai-organized-musings-on-securing-ai-agents-for-cybersecurity/
CATEGORIES:Threat Hunting
ATTACH;FMTTYPE=image/avif:https://www.antisyphontraining.com/wp-content/uploads/2026/04/TH-Summit-Keynote_Jason-Haddix_Defending-AI.avif
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20260629T120000
DTEND;TZID=America/New_York:20260702T160000
DTSTAMP:20260418T061239
CREATED:20251215T173433Z
LAST-MODIFIED:20260116T164801Z
UID:10000868-1782734400-1783008000@www.antisyphontraining.com
SUMMARY:Active Defense and Cyber Deception with John Strand
DESCRIPTION:
URL:https://www.antisyphontraining.com/event/active-defense-and-cyber-deception-with-john-strand-6/
CATEGORIES:Blue Team,Featured,Pay What You Can
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20260901T140000
DTEND;TZID=America/New_York:20260906T160000
DTSTAMP:20260418T061239
CREATED:20251107T141232Z
LAST-MODIFIED:20260304T155435Z
UID:10000835-1788271200-1788710400@www.antisyphontraining.com
SUMMARY:Professionally Evil CISSP Mentorship Program
DESCRIPTION:
URL:https://www.antisyphontraining.com/event/professionally-evil-cissp-mentorship-program-5/
CATEGORIES:CISSP Training,Pay What You Can,SecureIdeas
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Denver:20261006T080000
DTEND;TZID=America/Denver:20261009T203000
DTSTAMP:20260418T061239
CREATED:20260203T225118Z
LAST-MODIFIED:20260203T225118Z
UID:10000894-1791273600-1791577800@www.antisyphontraining.com
SUMMARY:Wild West Hackin' Fest Deadwood 2026
DESCRIPTION:
URL:https://www.antisyphontraining.com/event/wild-west-hackin-fest-deadwood-2026/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Denver:20261006T083000
DTEND;TZID=America/Denver:20261007T170000
DTSTAMP:20260418T061239
CREATED:20260203T225617Z
LAST-MODIFIED:20260203T230452Z
UID:10000895-1791275400-1791392400@www.antisyphontraining.com
SUMMARY:Active Directory Security and Hardening
DESCRIPTION:
URL:https://www.antisyphontraining.com/event/active-directory-security-and-hardening/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Denver:20261006T083000
DTEND;TZID=America/Denver:20261007T170000
DTSTAMP:20260418T061239
CREATED:20260203T225931Z
LAST-MODIFIED:20260203T230448Z
UID:10000896-1791275400-1791392400@www.antisyphontraining.com
SUMMARY:Attacking and Defending AI
DESCRIPTION:
URL:https://www.antisyphontraining.com/event/attacking-and-defending-ai/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Denver:20261006T083000
DTEND;TZID=America/Denver:20261007T170000
DTSTAMP:20260418T061239
CREATED:20260203T225936Z
LAST-MODIFIED:20260203T230444Z
UID:10000898-1791275400-1791392400@www.antisyphontraining.com
SUMMARY:Advanced Endpoint Investigations
DESCRIPTION:
URL:https://www.antisyphontraining.com/event/advanced-endpoint-investigations/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Denver:20261006T083000
DTEND;TZID=America/Denver:20261007T170000
DTSTAMP:20260418T061239
CREATED:20260203T230034Z
LAST-MODIFIED:20260203T230439Z
UID:10000897-1791275400-1791392400@www.antisyphontraining.com
SUMMARY:Breaching the Cloud with Beau Bullock
DESCRIPTION:
URL:https://www.antisyphontraining.com/event/breaching-the-cloud-with-beau-bullock-7/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Denver:20261006T083000
DTEND;TZID=America/Denver:20261007T170000
DTSTAMP:20260418T061239
CREATED:20260203T230203Z
LAST-MODIFIED:20260203T230426Z
UID:10000899-1791275400-1791392400@www.antisyphontraining.com
SUMMARY:Cybersecurity Incident Command
DESCRIPTION:
URL:https://www.antisyphontraining.com/event/cybersecurity-incident-command-2/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Denver:20261006T083000
DTEND;TZID=America/Denver:20261007T170000
DTSTAMP:20260418T061239
CREATED:20260203T230212Z
LAST-MODIFIED:20260203T230421Z
UID:10000900-1791275400-1791392400@www.antisyphontraining.com
SUMMARY:Defending M365 and Azure with Kevin Klingbile
DESCRIPTION:
URL:https://www.antisyphontraining.com/event/defending-m365-and-azure-with-kevin-klingbile-2/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Denver:20261006T083000
DTEND;TZID=America/Denver:20261007T170000
DTSTAMP:20260418T061239
CREATED:20260203T230218Z
LAST-MODIFIED:20260203T230418Z
UID:10000901-1791275400-1791392400@www.antisyphontraining.com
SUMMARY:Enterprise DFIR Investigations: Ransomware & APT Attacks
DESCRIPTION:
URL:https://www.antisyphontraining.com/event/enterprise-dfir-investigations-ransomware-apt-attacks/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Denver:20261006T083000
DTEND;TZID=America/Denver:20261007T170000
DTSTAMP:20260418T061239
CREATED:20260203T230507Z
LAST-MODIFIED:20260203T230507Z
UID:10000902-1791275400-1791392400@www.antisyphontraining.com
SUMMARY:Foundations of Security Operations with Hayden Covington
DESCRIPTION:
URL:https://www.antisyphontraining.com/event/foundations-of-security-operations-with-hayden-covington-2/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Denver:20261006T083000
DTEND;TZID=America/Denver:20261007T170000
DTSTAMP:20260418T061239
CREATED:20260203T230515Z
LAST-MODIFIED:20260203T230515Z
UID:10000903-1791275400-1791392400@www.antisyphontraining.com
SUMMARY:Fundamentals of Android Application Security Testing
DESCRIPTION:
URL:https://www.antisyphontraining.com/event/fundamentals-of-android-application-security-testing/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Denver:20261006T083000
DTEND;TZID=America/Denver:20261007T170000
DTSTAMP:20260418T061239
CREATED:20260203T230523Z
LAST-MODIFIED:20260203T230523Z
UID:10000904-1791275400-1791392400@www.antisyphontraining.com
SUMMARY:Fundamentals of Cybersecurity: Threats & Defenses
DESCRIPTION:
URL:https://www.antisyphontraining.com/event/fundamentals-of-cybersecurity-threats-defenses/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Denver:20261006T083000
DTEND;TZID=America/Denver:20261007T170000
DTSTAMP:20260418T061239
CREATED:20260203T230530Z
LAST-MODIFIED:20260203T230530Z
UID:10000905-1791275400-1791392400@www.antisyphontraining.com
SUMMARY:Hacking and Defending Satellite Infrastructure
DESCRIPTION:
URL:https://www.antisyphontraining.com/event/hacking-and-defending-satellite-infrastructure/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Denver:20261006T083000
DTEND;TZID=America/Denver:20261007T170000
DTSTAMP:20260418T061239
CREATED:20260203T230718Z
LAST-MODIFIED:20260203T230718Z
UID:10000906-1791275400-1791392400@www.antisyphontraining.com
SUMMARY:Hands-On AI Security Risk Assessment
DESCRIPTION:
URL:https://www.antisyphontraining.com/event/hands-on-ai-security-risk-assessment/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Denver:20261006T083000
DTEND;TZID=America/Denver:20261007T170000
DTSTAMP:20260418T061239
CREATED:20260203T230720Z
LAST-MODIFIED:20260203T230720Z
UID:10000907-1791275400-1791392400@www.antisyphontraining.com
SUMMARY:Intro to IoT Hacking
DESCRIPTION:
URL:https://www.antisyphontraining.com/event/intro-to-iot-hacking/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Denver:20261006T083000
DTEND;TZID=America/Denver:20261007T170000
DTSTAMP:20260418T061239
CREATED:20260203T230722Z
LAST-MODIFIED:20260203T230722Z
UID:10000908-1791275400-1791392400@www.antisyphontraining.com
SUMMARY:Network Forensics and Incident Response
DESCRIPTION:
URL:https://www.antisyphontraining.com/event/network-forensics-and-incident-response-2/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Denver:20261006T083000
DTEND;TZID=America/Denver:20261007T170000
DTSTAMP:20260418T061239
CREATED:20260203T230725Z
LAST-MODIFIED:20260203T230725Z
UID:10000909-1791275400-1791392400@www.antisyphontraining.com
SUMMARY:Next Level OSINT with Mishaal Khan
DESCRIPTION:
URL:https://www.antisyphontraining.com/event/next-level-osint-with-mishaal-khan-3/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Denver:20261006T083000
DTEND;TZID=America/Denver:20261007T170000
DTSTAMP:20260418T061239
CREATED:20260203T231230Z
LAST-MODIFIED:20260203T231230Z
UID:10000910-1791275400-1791392400@www.antisyphontraining.com
SUMMARY:Offense for Defense
DESCRIPTION:
URL:https://www.antisyphontraining.com/event/offense-for-defense/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Denver:20261006T083000
DTEND;TZID=America/Denver:20261007T170000
DTSTAMP:20260418T061239
CREATED:20260203T231232Z
LAST-MODIFIED:20260203T231232Z
UID:10000911-1791275400-1791392400@www.antisyphontraining.com
SUMMARY:Penetration Testing: Beyond the Basics
DESCRIPTION:
URL:https://www.antisyphontraining.com/event/penetration-testing-beyond-the-basics/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Denver:20261006T083000
DTEND;TZID=America/Denver:20261007T170000
DTSTAMP:20260418T061239
CREATED:20260203T231234Z
LAST-MODIFIED:20260203T231234Z
UID:10000912-1791275400-1791392400@www.antisyphontraining.com
SUMMARY:PowerShell for InfoSec: What You Need to Know
DESCRIPTION:
URL:https://www.antisyphontraining.com/event/powershell-for-infosec-what-you-need-to-know/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Denver:20261006T083000
DTEND;TZID=America/Denver:20261007T170000
DTSTAMP:20260418T061239
CREATED:20260225T182357Z
LAST-MODIFIED:20260225T182450Z
UID:10000921-1791275400-1791392400@www.antisyphontraining.com
SUMMARY:Threat Hunting & Incident Response with Velociraptor
DESCRIPTION:
URL:https://www.antisyphontraining.com/event/threat-hunting-incident-response-with-velociraptor-2/
END:VEVENT
END:VCALENDAR