̽»¨ÊÓÆµ

̽»¨ÊÓÆµ, in conjunction with its vendor partners, sponsors hundreds of events each year, ranging from webcasts and tradeshows to executive roundtables and technology forums.

Events and Resources

Events

SCYTHE-microsite.png
SCYTHE

Hunting Through the SIEM


Event Date: April 01, 2026
Hosted By: Scythe & ̽»¨ÊÓÆµ
This hands-on workshop walked through how security teams can simulate real-world attacks and investigate them using a SIEM. Participants deployed a multi-stage threat using SCYTHE, then pivoted into Splunk to hunt for indicators of compromise across endpoint telemetry. The session focused on practical techniques for identifying malicious behavior, mapping activity to the MITRE ATT&CK framework and strengthening threat detection workflows.
 
Attendees joined to:
  • Learn how to deploy and simulate multi-stage threats using SCYTHE
  • Understand how endpoint telemetry from Sysmon and Windows logs reveals attacker activity
  • See how detected behavior can be mapped to MITRE ATT&CK techniques for clearer analysis
  • Discover how custom dashboards and queries in Splunk support more effective threat hunting
We hope attendees walked away with practical experience detecting and investigating sophisticated cyber threats in a SIEM environment.

Fill out the form below to view this archived event.


Resources


EDR and Conditional Access: The Decisive Defense Layer in the Cybersecurity Stack
Whitepaper

EDR and Conditional Access: The Decisive Defense Layer in the Cybersecurity Stack

EDR alone doesn’t stop modern adversaries. This whitepaper shows how government agencies can pair endpoint intelligence with policy-driven conditional access to automatically contain threats when EDR is bypassed, no manual intervention required. Grounded in real Comply-to-Connect (C2C) deployments, it outlines a standards-aligned, procurement-ready Zero Trust approach proven in large federal and defense networks.


Fill out the form below to view this Resource.