Interop ITX 2017 Schedule Viewer

Anatomy of a Hack - Hands-on

Interop ITX 2017 Schedule Viewer

Use this interactive agenda to get an overview of our ever-growing conference program and to sort sessions by pass type, track, day/time, and speaker. Many more sessions will be added in the weeks to come.

All SessionsSpeakersMy Schedule
View Sessions As:
  • Anatomy of a Hack - Hands-on

    • John Sawyer  |  Senior Security Analyst, InGuardians
    Location:  TBD
    Format: Workshop
    Track: Security
    Pass Type: All Access, Summits & Workshops - Get your pass now!
    Vault Recording: TBD

    As attackers adapt their methods and become more sophisticated, security teams are discovering that traditional, passive methods of detecting bad actors don't work as well as they once did. Breaches are going days, months, and years without being noticed. To address the gap between compromise and detection, many enterprises are finding they need to actively seek out indicators of compromise to find undetected threats. This half-day workshop will look at multiple attack scenarios identifying where the Cyber Kill Chain could be used to identify and/or stop the attack, provide an overview of deception technologies, and introduce participants to the "threat hunting" process and tools.

    Attendees who want to participate in the hands-on exercises will need a laptop running Windows 7 with full administrative access and Powershell 5.0. Students are recommended to have Windows running within VMware or similar virtualization software for ease of testing. Additional software recommendations will be sent prior to class.