Faculty of
Engineering, Architecture and Information Technology

Event host

School of Information Technology and Electrical Engineering in conjunction with Argo P@cific

When
7 November 2018 9:00am to 9 November 2018 5:00pm

Where

Marriott Hotel

515 Queen Street

Brisbane

Queensland 4000

Registrations

Early Price (register before 22/10/2018): $2990 Full Price (register after 22/10/2018): $3290

Register now

Presented by world leading experts, this three-day, hands-on, immersive tactics exchange on Threat Hunting. This is an effective forum for collaborating on how to address, manage, and respond to various cyber threats and actors. This program is for technical security staffs and system administrators responsible for security of their networks. The workshop will include one day of formal, hands-on instruction on threat hunting techniques, and two days of guided and unguided hands-on technical exercises conducted in a realistic virtual environment – or cyber range. The cyber range platform and environment will be provided by Argo P@cific. It is built using Cypherpath’s Software Defined Infrastructure (SDI)® as the range operating system.

What Will You Experience?

Our presenters’ experiences in fully-scaled hunting operations and catching advanced attackers, offer participants a unique and timely source of information on a variety of discussion topics, including:

What is Cyber Threat Hunting?

  • Why is it needed?
  • How does it fit into your overall security program?

Hunting Methodologies

  • Behavioral patterns vs. signatures
  • Where cyber threat intelligence can best help...and where it can’t.

Tooling and Enablement

  • Endpoint sensors / logging
  • Sensor data / log aggregation
  • Analytics with Splunk and Elastic Search

Four security scenarios are proposed:

  • Phishing with credential harvesting and malware attack
  • External hack with resource theft (cryptocurrency mining)
  • Pivot with domain compromise
  • Insider threat (discussion only).

For each executed scenario:

  • A presenting security expert will review the phases of the attack and attendant techniques attackers will use
  • Participants discuss potential detection methods and response actions they would use – or have successfully employed; and take part in an unguided, hands-on exercise on the cyber range with the presenting security experts executing the attack scenario, and 
  • Participants take part in a facilitated hot-wash after the exercise session to thoroughly review the attack(s), detection and response actions, and identify best practices for the presented attack(s).

Particpants are required to bring a laptop with network and browser capabilities.

Presenters

This workshop will be presented by two world renowned experts.Colonel Jeff Arsenault, the former head of the “ethical hacking team” of the US National Security Agency, Dr Paul Twomey, former CEO of both ICANN, the body responsible for coordinating the global Internet, and the Australian National Office for the Information Economy, and Kris Merritt, former Senior Director of Hunting Operations at CrowdStrike, Inc. 

Registration

  • Early Price (register before 22/10/2018): $2990 Full Price (register after 22/10/2018): $3290
  • Discounts are available when registering multiple deleagtes. Please see course brochure for further details.

Course Brochure

Enquiries

Email: cpd@eait.uq.edu.au