Introduction to AI and Leveraging it in...
Confused by all the hype with AI? Not sure what the difference is between a LLM, GenAI or Deep Learning? Do you want to make the most of this exciting new technology but not sure where to start or the issues involved? Learn the fundamentals of Artificial Intelligence, Generative AI and Prompt Engineering and how exponentially increase your impact.
AI in XDR: What it Means and Where it Fits
Detecting, investigating, and stopping advanced cyberattacks at speed and scale is becoming increasingly unsustainable, thanks to the complex technology SOC teams must rely on. In the face of an ever-expanding attack surface, highly evasive and emerging attacker methods, and an increasing SOC analyst workload, SOC teams are struggling—and threat detection is suffering. Join SANS Senior Instructor Dave Shackleford and Vectra AI’s CT...
Detecting AI in OSINT Investigations
This talk delves into the pervasive integration of Artificial Intelligence (AI), specifically Language Models (LMs), within the current OSINT landscape. Jeff will discuss the art of uncovering the deployment of Large Language Models (LLMs) across social media posts, product reviews, and academic settings by examining linguistic patterns and using multiple tools to uncover TTP's used by threat actors. Attendees will gain insights into effective...
Detecting DCSync and DCShadow Network Traffic
In order to interact with a real domain controller, Mimikatz can spoof a Windows domain controller, and read information from or write information to active directory. Mimikatz's DCSync command is used to read information: typically, it is used to dump credentials from active directory. And the DCShadow command is used to write information: for example, modify the primary group of an account to a group with higher privileges. The use of these...
Drive SOC Efficiency with Network Evide...
Automation via machine learning can help your SOC staff handle the endless crush of alerts. However, without the right data sources and analytic capabilities, you risk further straining workloads with additional noise and complexity. Corelight & Elastic Security, both rooted in open source, together go above and beyond to maximize operational efficiency. The integrated solution combines high-fidelity alerts and data from Suricata and Zeek...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.