Technical training

Technical training

On September 10–11, participants from across the globe joined the online training to practice the actions of a response team while repelling a sophisticated targeted attack on a tech company
Plot
The teams have finished investigating possible leaks and a compromise of the internal infrastructure
A well-known startup develops an innovative solution powered by AI. The release of the product is a success, and the company signs multimillion dollar contracts
Company management begins to suspect that the developments were stolen through a breach of the internal infrastructure
The AI model starts degrading. At the same time, a competitor announces the development of a similar product, but at a lower price. All this can lead to a collapse of the company
While intellectual property experts examine the competitor’s solution, the company invites a team of forensic specialists, which the participants are a part of
Company infrastructure
the-conference-min
Who benefits

The technical training is designed for specialists in incident monitoring, forensics, and prevention.

Each organization is an independent blue team tasked with investigating the incident, using classical forensics and threat hunting techniques

Participants
The training is recommended for
Incident response specialists
Red teams and blue teams
Students in cybersecurity
Team size: 1–10 members
We use cookies (files that store information about your visits to the website) to personalise our services and to improve your browsing experience. By continuing to use this website, you agree to our use of cookies and similar technologies. If you do not consent to the use of these files, you should adjust your browser settings accordingly.
Accept