Inside the Cyber Kill Chain
Overview
Attackers aren’t waiting for you to notice — and today’s threat landscape has evolved beyond traditional defenses. This live, 3-hour virtual workshop brings together cybersecurity leaders to dissect real-world attacks through the lens of the Cyber Kill Chain, revealing how each stage—from reconnaissance to command and control—has transformed in 2025’s cloud-first, AI-powered world.
Through four keynote sessions and a live expert panel, you’ll gain insider insights into:
- How reconnaissance and weaponization often go unnoticed
- Modern exploitation methods in hybrid and cloud environments
- Command-and-Control evasion tactics like DNS tunneling and OAuth abuse
- Proven detection, containment, and Zero Trust defense strategies
You’ll leave with a practical understanding of how to detect, disrupt, and break the Kill Chain—and a framework to apply these lessons directly within your own SOC, engineering, or red-team workflows.
🎓 Who Should Attend:
Security engineers, SOC analysts, cloud architects, CISOs, and developers seeking to strengthen proactive defense capabilities.
Good to know
Highlights
- 2 hours 30 minutes
- Online
Refund Policy
Location
Online event
Frequently asked questions
Organized by
Followers
--
Events
--
Hosting
--