You will earn 1 CPE credits for attending this virtual bonus session
Presentation Format: Virtual - US Eastern
In the SOC, defenders are often true to their name-playing defense to manage detections, assess risk, and protect the network from an ever-evolving barrage of threats. However, attacks don't start with alerts-they start with the infrastructure that attackers set up to deliver the attack. Proactive open-source investigations and external hunting practices can help shift your security posture from reactive to proactive.
Learn how you can use real-world attacks and open-source data to:
Summit: February 11-12 | Training: February 8-10 & 15-20
The Open-Source Intelligence (OSINT) Summit will bring together leading security practitioners and investigators to share proven techniques and tools that can be applied to OSINT gathering and analysis. As an attendee, you will learn current, real-world methods from law enforcement officers, private investigators, pen testers, and cyber defenders who collect information across the Internet, analyze the results, and utilize key data to reach their objectives.