Technical training
The technical training is designed for specialists in incident monitoring, forensics, and prevention.
Each organization is an independent blue team tasked with investigating the incident, using classical forensics and threat hunting techniques
The exercise is dedicated to investigating a sophisticated targeted attack on a tech enterprise:
- The teams will investigate a potential infrastructure compromise and data leaks using classical forensics and threat hunting techniques.
- The audience will be able to track the progress in real time on a special scoreboard.
- The visitors of the conference will be able to test themselves through the exercises on BI.ZONE Cyber Polygon Platform.
The technical training is designed for specialists in incident monitoring, forensics, and prevention.
Each organization is an independent blue team tasked with investigating the incident using classical forensics and threat hunting techniques.
The training is open to:
- incident response specialists
- red teams and blue teams
- students in cybersecurity
The exercise will take place online and will last 24 hours. You can participate in the training from anywhere in the world.
Participants will be able to download instructions, virtual machines, and additional password protected attributes in advance. The password for the attributes will be issued at the beginning of the training.
A team can have from 1 to 10 participants, including the captain.
If an organization is planning to have more participants, it is allowed to register more teams. The number of teams from one organization is unlimited.