What happens when a ransomware attack unfolds in real time—and your SOC is unprepared? In this high-stakes, interactive session, you’ll take the hot seat as a SOC analyst responding to an active breach in an environment with a neglected SIEM and no EDR.
But there’s a twist: you call the shots. As the attack unfolds live, audience participation drives the investigation—uncovering IOCs, tracking lateral movement, and piecing together the kill chain before it’s too late! Then, we flip perspectives, diving into the attacker’s C2 server to reveal their tactics.
This isn’t just another case study—it’s a hands-on, real-time cyber battle. Are you ready to test your instincts under pressure?
Learning Objectives:
At the end of this session, participants will be able to identify key indicators of compromise (IOCs) and track lateral movement in a live ransomware attack scenario.
At the end of this session, participants will be able to make real-time investigative decisions under pressure, simulating the high-stakes reality of a ransomware breach.
At the end of this session, participants will be able to analyze an attack from both defender and attacker perspectives, gaining unique insight into adversarial tactics and C2 operations.