Weaponizing SIGMA Virtual Workshop
Overview
In modern cybersecurity, we often utilize many tools in our security stack. This can make creating rules and detections that work with our tools cumbersome. With SIGMA rules, we can quickly utilize the same detection across our security stack. Why duplicate work when we can write it once?
What you can expect:
๐Turn CTI into a custom detection
๐Write your first SIGMA rule
๐Distribute it across the security stack provided within our lab
๐Test if your efforts were successful in real-time using our SCYTHE platform to execute a threat emulation campaign.
Join us as we:
๐ฆ Define SIGMA.
๐ฆ Explore the benefits it can provide you and your organization's defensive team.
๐ฆ Unveil how to read/write SIGMA rules.
๐ฆ Leverage SIGMA rules to implement detections in real time.
๐ฆ Uncover how SIGMA can help advance your Purple Teaming efforts.
๐ 21 August 2024
๐ 1 - 4 PM (ET)
All you need is just a computer with a compatible web browser and of course, your appetite to learn ๐
Please register using a valid email address so we can provision your VMware lab environment before the workshop