#BLUE: Threat Hunting: taking the proactive approach in Cyber Security

Discover the essentials of threat hunting in our accessible workshop, designed for both newcomers to cybersecurity and experienced professionals seeking to broaden their skills. 

Over the session, you’ll gain a foundational understanding of threat hunting practices and techniques, equipping you with the abilities to identify, analyze, and respond to potential digital threats that usually might go undetected. 

Through hands-on activities, you’ll learn to navigate the threat landscape and apply threat hunting methodologies using security events and Jupyter Notebooks.

Why you should attend

Join our workshop to gain insight into threat hunting and understand how it differs and completes the other Cyber Security areas. 

Learn how to stay ahead of the ever-evolving threat landscape and hone your Blue Team instincts by taking a pro-active approach towards emerging threats.

What you will learn

Throughout the workshop, you will explore a variety of topics and engage in practical exercises:

  1. Introduction to Threat Hunting:
    • Understand the purpose and importance of threat hunting within the cybersecurity ecosystem.
    • Learn about the differences between threat hunting and traditional security monitoring.
  2. Concepts, Techniques, and Tools Used:
    • Explore various threat hunting concepts, including hypotheses-driven hunting and the use of threat intelligence.
    • Familiarize yourself with essential tools and technologies employed in the threat hunting process, including SIEM, EDR, and open-source solutions.
  3. Hands-On Threat Hunting Session:
    • Engage in practical exercises that allow you to apply threat hunting methodologies in simulated environments.
    • Utilize security events and Jupyter Notebooks to analyze data and identify potential threats.
  4. Case Studies:
    • Review real-world case studies that illustrate successful threat hunting operations.
    • Analyze the methodologies used and the lessons learned from each case to understand best practices.
  5. Tips and Tricks for Effective Threat Hunting:
    • Discover valuable tips for improving your threat hunting skills, including how to craft effective hypotheses and refine your analysis techniques.
    • Learn about common pitfalls to avoid and strategies for increasing your success rate in threat hunting engagements.
  6. Q&A and Open Discussion:
    • Participate in an open discussion to ask questions, share experiences, and engage with your peers and instructors.
    • Benefit from the collective knowledge of the group to deepen your understanding of threat hunting practices.

Who is it for

This workshop is ideal for cybersecurity professionals, analysts, and enthusiasts who are eager to enhance their threat hunting capabilities. 

Whether you’re new to the field or have prior experience, you’ll leave this workshop with practical skills and insights that will elevate your approach to cybersecurity.

Other information & prerequisites

    All participants must bring their own laptops.

    • Language: ROMANIAN or ENGLISH, if at least one participant is not speaking Romanian
    • Duration: 8 hours
    • Minimum students: 8
    • Date: November 26th
    • Venue: Secureworks HQs in Bucharest, Romania
    • Price:
      • Before November 15th: 100 EURO + VAT
      • After November 15th: 120 EURO + VAT

    About the trainers

    ROBERT MATEESCU

    Cyber Threat Hunting Consultant @ Secureworks

    Robert is an experienced Threat Hunter, with experience in both civil and military environments. Likes tinkering with AI and scripting to enrich and model large data sets and automate trivial tasks. Passionate about Security and Technology in general, also enjoys traveling and cooking.

    SORINEL STANCIU

    Threat Hunter @ Secureworks

    Sorin is a threat hunter at Secureworks, specializing in both offensive and defensive security. With expertise in identifying and stopping cyber threats, he plays a crucial role in protecting individuals and organizations from digital threats. He is passionate about uncovering and unveiling stealthy threat actors, dedicating his skills to exposing hidden vulnerabilities and enhancing overall cybersecurity resilience.

    FAQs

    Q: What happens if there aren’t enough participants?
    A: If we do not meet the minimum number of participants, you can either transfer to another workshop and pay or receive a refund for any difference in price, or opt for a full refund. You will be notified in advance and given options to choose what works best for you.

    Q: Are food and accommodation included in the price?
    A:
    The workshop price covers food. However, accommodation is not included, but we can recommend nearby options for your convenience.

    Q: Can I get a refund if I can’t attend after registering?
    A:
    Yes, full refunds are available up to 20 days before the workshop start date. However, if you cancel after that, we can offer only 50% of the price.

    Q: How and when will I receive the details about the location and prerequisites?
    A:
    You will receive an email with all the necessary details, including the workshop location, prerequisites, and schedule, at least one week before the event. If you have any immediate questions, feel free to reach out to us directly.