Identify - "Develop the organizational understanding to manage cybersecurity risk to systems, assets, data, and capabilities." Music Box - 5th Floor WORKSHOP
May 09, 2018 10:00 AM - 03:00 PM(America/New_York)
20180509T1000 20180509T1500 America/New_York Threat Hunting for APT and Ransomware Workshop

Session Description

In this lab session, IoCs for an APT and Ransomware attack will be introduced and tools used for threat

hunting will be leveraged to examine memory and a local partition. The practical exercises will teach you

how different IoCs can be professionally digested by threat hunting teams, and the various tools that are

used when threat hunting. This simulated APT and Ransomware attack will give you an insight into how

a threat hunting team investigates current cyber adversaries through the use of practical examples.

Session Objective

In this session attendees will learn how to work with IoCs and TTPs to investigate volatile data and

server endpoints. Learning which tools and how to use them to conduct scanning of endpoints and

systems will be become primary focus, in the process ensuring that attendees understand single IoCs

and conditional statements such as Yara. Various tools will be introduced for threat intelligence and

along with integrating it into network sensors and your threat hunting process.

Music Box - 5th Floor HACK NYC 2018 events@magegroupe.com
18 attendees saved this session

Session Description

In this lab session, IoCs for an APT and Ransomware attack will be introduced and tools used for threat

hunting will be leveraged to examine memory and a local partition. The practical exercises will teach you

how different IoCs can be professionally digested by threat hunting teams, and the various tools that are

used when threat hunting. This simulated APT and Ransomware attack will give you an insight into how

a threat hunting team investigates current cyber adversaries through the use of practical examples.

Session Objective

In this session attendees will learn how to work with IoCs and TTPs to investigate volatile data and

server endpoints. Learning which tools and how to use them to conduct scanning of endpoints and

systems will be become primary focus, in the process ensuring that attendees understand single IoCs

and conditional statements such as Yara. Various tools will be introduced for threat intelligence and

along with integrating it into network sensors and your threat hunting process.

CEO
,
LIFARS
Moderators public profile is disabled.
Attendees public profile is disabled.
Upcoming Sessions
210 visits

FAQ

 Code of Conduct  Press Releases
 Get Involved   Report ISSUE / BUG
Tickets  

The Critical Infrastructure Association of America, Inc. is a 501(c)6 Not for Profit. The mission of Critical Infrastructure Association of America is to create a membership-based, trade association of like-minded cybersecurity and closely related industry professionals that work in the field of cybersecurity. The goal is to share best practices, establish and maintain high operational standards and to educate and interact with those in the cybersecurity community within public, private and governmental sectors.