UniCon sponsor

Opening Keynote

Dave Kennedy, TrustedSec Co-Founder & Chief Hacking Officer

Register for UniCon 2024

UniCon '24 Lineup 

 SPEAKER  COMPANY  TALK

 TIMES (ET)

   

MORNING SESSION: ACHIEVING CYBER RESILIENCE THROUGH VISIBILITY

 
 Dave Kennedy  CEO, TrustedSec 

 Keynote: The Best Defense is Visibility Into Standard Attack Behavior

 11: 15 AM - NOON
 Tarah Wheeler  CEO, Red Queen Dynamics  Cybersecurity for Small Business    NOON - 12:30 PM
     EARLY AFTERNOON SESSION: LEVERAGING AI SECURITY    
 Jake Williams  Risk Management Expert  Keynote: Security and AI    12:30 PM - 1:15 PM
 Zack Allen   Director, Security Detection &  Research, Datadog  Detection Engineering Trends  1:15 PM - 1:45 PM
       
    BREAK: NETWORKING & SPONSOR DEMOS    
    UniCon Sponsor: PICNIC 2:00-2:10 PM (ET)
     UniCon Sponsor: TBA 2:15-2:25 PM (ET)
    UniCon Sponsor: TBA 2:30-2:40 PM (ET)
    UniCon Sponsor: TBA 2:45-2:55 PM (ET)
       
    AFTERNOON SESSION: GETTING MORE FROM SECURITY PARTNERS   
 Jeremiah Dewey

 Senior Vice President, Rapid7

Getting More from Your MSSP  3:00 - 3:45 PM (ET) 
Nick Carroll  Cyber Incident Response Manager, Raytheon Insourced vs. Outsourced Security Services 3:45 - 4:15 PM (ET)
    LATE AFTERNOON SESSION: SECURING INDUSTRIAL OT/ICS ENVIRONMENTS  
 Lesley Carhart  Technical Director, Dragos  Manufacturing OT/ICS Security   4:15 PM - 4:45 PM
 Tom VanNorman  Senior Vice President, GRIMM  The Challenges with OT/IT Conversion  4:45 PM - 5:15 PM
     CLOSING SESSION: ADVANCING OFFENSIVE CYBERSECURITY  
 Bryson Bort   Founder & CEO, SCYTHE  Keynote: A Practical Guide to Offensive Cybersecurity  5:15 PM - 6:00 PM

 

Buy Swag & Save Chubby Unicorns🦄

SCYTHE will donate all proceeds to a global conservation organization to help save rhinos from extinction. 

NEW DROP
\
SPONSORSHIP INQUIRY

UniCon FAQ

What is UniCon?
UniCon is a free, virtual, purple teaming conference. This year’s theme is Strengthening Cyber Resilience.
When did UniCon start?
Drumroll, please! This year marks our 5th annual UniCon conference! Shoutout to the thought leaders & community volunteers who make it possible!
What if I can't attend live?
You're in luck! Subscribe to the SCYTHE YouTube channel and turn on your notifications to catch segments when they first drop!

By the end of this workshop, attendees will:

 

Unicorn Trio with blur - large

 

  • Learn the basics and use Command and Control (C2)

  • Consume Cyber Threat Intelligence from a known adversary

  • Extract adversary behaviors/TTPs and map to MITRE ATT&CK

  • Play the Red Team by creating and executing adversary emulation plans

  • Emulate the adversary behaviors in a small environment consisting of a domain controller, member server, and a Linux system

  • Play the role of the Blue Team and look for Indicators of Compromise and Behaviors

  • Use Wireshark to identify heartbeat and jitter

  • Enable Sysmon configurations to detect adversary behavior

  • Have FUN!

GENERAL AGENDA

 (90 minutes total)
5 minutes of kickoff / introduction
10 minutes of lecture / background information
50 minutes of lab time
10 minutes of SCYTHE familiarization / set up test
40 minutes of Test / Detection Engineering / Re-run to validate
10 minutes of executive briefing / reporting / metrics
15 minutes of Q&A