New Workshops | Upcoming RISKIQ Cyber Threat Workshops

%3CLINGO-SUB%20id%3D%22lingo-sub-3243112%22%20slang%3D%22en-US%22%3ENew%20Workshops%20%7C%20Upcoming%20RISKIQ%20Cyber%20Threat%20Workshops%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-3243112%22%20slang%3D%22en-US%22%3E%3CP%3E%3CA%20href%3D%22https%3A%2F%2Fwww.riskiq.com%2Fthreat-hunting-workshops%2F%23upcoming-workshops%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noreferrer%22%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22AshleyMartin_0-1646252271259.png%22%20style%3D%22width%3A%20688px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F352491i347C06F4F6497700%2Fimage-dimensions%2F688x243%3Fv%3Dv2%22%20width%3D%22688%22%20height%3D%22243%22%20role%3D%22button%22%20title%3D%22AshleyMartin_0-1646252271259.png%22%20alt%3D%22AshleyMartin_0-1646252271259.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FA%3E%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3EUpcoming%20RISKIQ%20Cyber%20Threat%20Workshops%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CA%20href%3D%22https%3A%2F%2Fnam06.safelinks.protection.outlook.com%2F%3Furl%3Dhttps%253A%252F%252Fwww.riskiq.com%252Fevents%252Fcyber-threat-workshop-03032022%252F%26amp%3Bdata%3D04%257C01%257Cv-asmartin%2540microsoft.com%257C23785e0449744e008d0108d9fb9d89bc%257C72f988bf86f141af91ab2d7cd011db47%257C1%257C0%257C637817476307437510%257CUnknown%257CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%253D%257C3000%26amp%3Bsdata%3DimgTU7Wd0SuucI6R4YwfTvoOBiCLA7mtwPMyl6oSM4I%253D%26amp%3Breserved%3D0%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noreferrer%22%3E%3CSTRONG%3EIncident%20Response%3C%2FSTRONG%3E%3C%2FA%3E%3CBR%20%2F%3E%3CSTRONG%3EMarch%203%20%40%2010%3A00am%20PST%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3EIn%20this%20RiskIQ%20Cyber%20Threat%20Workshop%2C%20RiskIQ%20and%20Microsoft%20experts%20will%20demonstrate%20how%20RiskIQ%20data%20enriches%20IOCs%20derived%20from%20Sentinel%20incidents.%20We%E2%80%99ll%20investigate%20these%20real-world%20IOCs%20using%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Fnam06.safelinks.protection.outlook.com%2F%3Furl%3Dhttps%253A%252F%252Fcommunity.riskiq.com%252Fhome%26amp%3Bdata%3D04%257C01%257Cv-asmartin%2540microsoft.com%257C23785e0449744e008d0108d9fb9d89bc%257C72f988bf86f141af91ab2d7cd011db47%257C1%257C0%257C637817476307437510%257CUnknown%257CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%253D%257C3000%26amp%3Bsdata%3DPwBmAcQ%252F%252BDnJrIunjBFUE%252B4Ti4MFuPCV41vk9YdYWFg%253D%26amp%3Breserved%3D0%22%20target%3D%22_blank%22%20rel%3D%22nofollow%20noopener%20noreferrer%22%3ERiskIQ%20Illuminate%3C%2FA%3E%26nbsp%3Bto%20surface%20additional%20IP%20address%20and%20domains%20associated%20in%20the%20incident.%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CA%20href%3D%22https%3A%2F%2Fnam06.safelinks.protection.outlook.com%2F%3Furl%3Dhttps%253A%252F%252Fwww.riskiq.com%252Fevents%252Fcyber-threat-workshop-03172022%252F%26amp%3Bdata%3D04%257C01%257Cv-asmartin%2540microsoft.com%257C23785e0449744e008d0108d9fb9d89bc%257C72f988bf86f141af91ab2d7cd011db47%257C1%257C0%257C637817476307437510%257CUnknown%257CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%253D%257C3000%26amp%3Bsdata%3DGwwEDlEAg1dxNLbHUqKCY%252B68%252Bs1ckXylkjdUG4ttddY%253D%26amp%3Breserved%3D0%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noreferrer%22%3E%3CSTRONG%3EGlobal%20Defense%3C%2FSTRONG%3E%3C%2FA%3E%3CBR%20%2F%3E%3CSTRONG%3EMarch%2017%20%40%2010%3A00am%20PST%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3EIn%20this%20RiskIQ%E2%80%99s%20Cyber%20Threat%20Workshop%2C%20we%20will%20be%20performing%20enrichment%20on%20DNS%20logs%20to%20determine%20if%20internal%20computers%20are%20communication%20to%20suspicious%20or%20malicious%20infrastructure%20on%20the%20internet.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CA%20href%3D%22https%3A%2F%2Fnam06.safelinks.protection.outlook.com%2F%3Furl%3Dhttps%253A%252F%252Fwww.riskiq.com%252Fevents%252Fcyber-threat-workshop-03312022%252F%26amp%3Bdata%3D04%257C01%257Cv-asmartin%2540microsoft.com%257C23785e0449744e008d0108d9fb9d89bc%257C72f988bf86f141af91ab2d7cd011db47%257C1%257C0%257C637817476307437510%257CUnknown%257CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%253D%257C3000%26amp%3Bsdata%3D7k4SiqTXJxI1QP3p%252F5sty0sc6tgTXsd2ZqrjivK2brc%253D%26amp%3Breserved%3D0%22%20target%3D%22_blank%22%20rel%3D%22nofollow%20noopener%20noreferrer%22%3E%3CSTRONG%3EAdversary%20Attribution%3C%2FSTRONG%3E%3C%2FA%3E%3CBR%20%2F%3E%3CSTRONG%3EMarch%2031%20%40%2010%3A00am%20PST%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3EIn%20this%20RiskIQ%E2%80%99s%20Cyber%20Threat%20Workshop%2C%20we%20will%20be%20fingerprinting%20adversary%20threat%20infrastructure%20used%20in%20ransomware%20campaigns%2C%20HumOR%20(Human%20Operated)%2C%20Automated%20(Bot)%2C%20Ransomware%20as%20a%20Service%20(RaaS).%20Each%20type%20of%20ransomware%20has%20their%20own%20unique%20fingerprints%20and%20ways%20to%20proactively%20prevent%20them%20from%20getting%20into%20your%20organization.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CA%20href%3D%22https%3A%2F%2Fnam06.safelinks.protection.outlook.com%2F%3Furl%3Dhttps%253A%252F%252Fwww.riskiq.com%252Fevents%252Fcyber-threat-workshop-04142022%252F%26amp%3Bdata%3D04%257C01%257Cv-asmartin%2540microsoft.com%257C23785e0449744e008d0108d9fb9d89bc%257C72f988bf86f141af91ab2d7cd011db47%257C1%257C0%257C637817476307437510%257CUnknown%257CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%253D%257C3000%26amp%3Bsdata%3DHvnWEiP0y622Y0L06ykWcdoNBBNAyAxV%252F3wutC83t18%253D%26amp%3Breserved%3D0%22%20target%3D%22_blank%22%20rel%3D%22nofollow%20noopener%20noreferrer%22%3E%3CSTRONG%3EDigital%20Future%3C%2FSTRONG%3E%3C%2FA%3E%3CBR%20%2F%3E%3CSTRONG%3EApril%2014%20%40%2010%3A00am%20PST%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3EIn%20this%20RiskIQ%E2%80%99s%20Cyber%20Threat%20Workshop%2C%20we%20look%20towards%20the%20digital%20future%20and%20examine%20how%20we%20all%20can%20make%20the%20internet%20a%20safer%20place%20for%20all.%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-LABS%20id%3D%22lingo-labs-3243112%22%20slang%3D%22en-US%22%3E%3CLINGO-LABEL%3ECloud%20Security%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3EEvents%3C%2FLINGO-LABEL%3E%3C%2FLINGO-LABS%3E
Microsoft

AshleyMartin_0-1646252271259.png

Upcoming RISKIQ Cyber Threat Workshops

 

Incident Response
March 3 @ 10:00am PST

In this RiskIQ Cyber Threat Workshop, RiskIQ and Microsoft experts will demonstrate how RiskIQ data enriches IOCs derived from Sentinel incidents. We’ll investigate these real-world IOCs using RiskIQ Illuminate to surface additional IP address and domains associated in the incident. 

 

Global Defense
March 17 @ 10:00am PST

In this RiskIQ’s Cyber Threat Workshop, we will be performing enrichment on DNS logs to determine if internal computers are communication to suspicious or malicious infrastructure on the internet.

 

Adversary Attribution
March 31 @ 10:00am PST

In this RiskIQ’s Cyber Threat Workshop, we will be fingerprinting adversary threat infrastructure used in ransomware campaigns, HumOR (Human Operated), Automated (Bot), Ransomware as a Service (RaaS). Each type of ransomware has their own unique fingerprints and ways to proactively prevent them from getting into your organization.

 

Digital Future
April 14 @ 10:00am PST

In this RiskIQ’s Cyber Threat Workshop, we look towards the digital future and examine how we all can make the internet a safer place for all.

0 Replies