Free

Threat Hunting Workshop Sponsored by Cisco Advanced Threat Solutions Team -...

Event Information

Event description

Description

This limited series of immersive, hands-on workshops are available FREE to Canadian organizations through a sponsorship by Cisco's Advanced Threat Solutions team.

UPCOMING DATES
Click the green REGISTER button to select an upcoming date.

November 13: Threat Hunting Workshop

  • Location: Cementation Canada
    590 Graham Dr
    North Bay, ON P1B 9E6

November 14: Threat Hunting Workshop

  • Location: Cisco Montreal
    1800 McGill College
    Suite 700
    Montreal, Quebec H3A 3J6

November 19: Threat Hunting Workshop

  • Location: Cisco Quebec City
    500 Grande Allee East
    2nd Floor, Suite 201,
    Quebec, Quebec G1R 2J7

November 20: Threat Hunting Workshop

  • Location: Cisco Ottawa
    340 Albert Street, Suite 1710
    Constitution Square Tower III,
    Ottawa, Ontario K1R 7Y6

November 21: Threat Hunting Workshop

  • Location: Cisco Toronto
    88 Queens Quay West
    Suite 2900
    Toronto, Ontario M5J 0B8

November 26: Threat Hunting Workshop

  • Location: Cisco Vancouver
    595 Burrard Street, Suite 2123
    Three Bentall Centre, PO Box 49121,
    Vancouver, British Columbia V7X 1J1

December 05: Threat Hunting Workshop

  • Location: Cisco Toronto
    88 Queens Quay West
    Suite 2900
    Toronto, Ontario M5J 0B8

December 11: Threat Hunting Workshop

  • Location: Cisco Quebec City
    500 Grande Allee East
    2nd Floor, Suite 201,
    Quebec, Quebec G1R 2J7


Start Time 9:00am | End Time 4:00pm (EST)

ABOUT THIS HANDS-ON WORKSHOP

In this workshop, you will uncover best practices for threat hunting, learn how to incorporate threat hunting into your daily workflow, network with your peers to share strategies and techniques, and execute real-world lab scenarios:

LAB: Hunt and Contain
A new threat is making headlines and your executives want complete answers fast. You need to know if it is inside your organization and how to contain it.

LAB: Catch the Phish
You have evidence that a remote user was phished. Follow the attack from entry to execution.

LAB: Event Overload
Hundreds of events are clamoring for your attention, but you have a plan to prioritize and execute a response.

LAB: Shadow IT Devices gone Rogue
A global outbreak has compromised vulnerable routers. Your known infrastructure is unaffected but are there any shadow devices connected – and if so, are you blocking the attack?

LAB: Screenshot Holds the Clue
There’s not much to go on – just a single screenshot – but that’s all you need to trace the attack back to the entry point.

TOOLS YOU WILL USE:

  • AMP for Endpoints

  • Umbrella

  • Threat Grid

  • Cisco Threat Response

We're looking forward to seeing you there!

Save This Event

Event Saved