Take Off 2017

Thursday 2 February | Exclusive Networks & BigTec Offices

Exclusive Networks and BigTec invite you to a short update session on Thursday 2 February 2017.

Content

  • What's new at BigTec and Exclusive Networks

  • Quick vendor overview & update

  • Quick services overview


Timing

16h00 - 18h00 followed by the New Year Drink


REGISTER HERE

Useful Information When You Need It

Notable Features

Lorem Ipsum has been the industry's standard dummy text ever since the 1500s.

ACCURATE ANALYTICS

Lorem Ipsum is simply dummy text of the printing and typesetting industry.

SOCIAL INTERACTION

Lorem Ipsum is simply dummy text of the printing and typesetting industry.

WORLD-WIDE SUPPORT

Lorem Ipsum is simply dummy text of the printing and typesetting industry.

MULTIPLE GAMES

Lorem Ipsum is simply dummy text of the printing and typesetting industry.

ACCURATE ANALYTICS

Lorem Ipsum is simply dummy text of the printing and typesetting industry.

SOCIAL INTERACTION

Lorem Ipsum is simply dummy text of the printing and typesetting industry.

WORLD-WIDE SUPPORT

Lorem Ipsum is simply dummy text of the printing and typesetting industry.

MULTIPLE GAMES

Lorem Ipsum is simply dummy text of the printing and typesetting industry.

Threat Hunting Session
Network meets Endpoint | Thursday 11 July | Luxembourg


The continuation of the Threat Hunting Workshop: “Network meets Endpoint Edition” – Starting with a presentation explaining the tools, techniques and procedures used by adversaries and how to detect and contain these types attacks. We’ll go over the weaponization of a multi-staged attack, process execution, privilege escalation, beaconing, lateral movement and data exfiltration and provide you with the endpoint and networks indicators and how to obtain this evidence.

We will continue with a live demonstration of how an advanced adversary compromises your network, using different techniques to move laterally, do credential scraping and network recon.

Finally we’ll discuss several behaviour based solutions that can efficiently detect these kinds of attacks, provide you with full visibility and automate response to mitigate the threat.


Agenda

12h15: Welcome & Lunch
13h15: Introduction to Threat Hunting – finding evidence, what to look for
14h00 - Demo of a network breach
15h00 - BREAK
15h15: How Machine Learning technology can detect these attack techniques
16h30: Network drink (drinks at the bar/terrace)
17h00: End

Price

FREE


Location

Hotel Légère
11, Rue Gabriel Lippmann
(Parc d'activité Syrdall)
5365 Schuttrange
Luxemburg


Register Here

Want To Try Us?

Just put your email below
and you'll receive your download link.