BEGIN:VCALENDAR PRODID:-//Microsoft Corporation//Outlook 16.0 MIMEDIR//EN VERSION:2.0 METHOD:PUBLISH X-MS-OLK-FORCEINSPECTOROPEN:TRUE BEGIN:VTIMEZONE TZID:Pacific Standard Time BEGIN:STANDARD DTSTART:16011104T020000 RRULE:FREQ=YEARLY;BYDAY=1SU;BYMONTH=11 TZOFFSETFROM:-0700 TZOFFSETTO:-0800 END:STANDARD BEGIN:DAYLIGHT DTSTART:16010311T020000 RRULE:FREQ=YEARLY;BYDAY=2SU;BYMONTH=3 TZOFFSETFROM:-0800 TZOFFSETTO:-0700 END:DAYLIGHT END:VTIMEZONE BEGIN:VEVENT CLASS:PUBLIC CREATED:20201112T092048Z DESCRIPTION:We look forward to welcoming you to Sophos Evolve - Cybersecuri ty Summit on November 17 & 18\, where a host of industry experts will disc uss the latest cybersecurity challenges and how to handle them.\n\nCALENDA R PLACEHOLDER\nSession Name: Be The Hacker\, Beat The Hacker\nSpeakers: An drew Mundell\, Enterprise Engineer\, Sophos\nSession Overview: Go behind t he scenes of a simulated targeted attack and witness typical steps carried out by attackers from their perspective of attack tools\, techniques and procedures. Once we achieve our attack objectives\, we’ll switch sides t o investigate malicious behavior detections and perform a “leadless” t hreat hunt guided by the Mitre ATT&CK framework using Sophos EDR.\nJoin Us Live: https://evolve.sophos.com/amer/\n \n DTEND;TZID="Pacific Standard Time":20201117T130000 DTSTAMP:20201112T092048Z DTSTART;TZID="Pacific Standard Time":20201117T120000 LAST-MODIFIED:20201112T092048Z LOCATION:https://evolve.sophos.com/amer/ PRIORITY:5 SEQUENCE:0 SUMMARY;LANGUAGE=en-us:Sophos Evolve: Be The Hacker\, Beat The Hacker TRANSP:OPAQUE UID:040000008200E00074C5B7101A82E00800000000F0227F1BD5B8D601000000000000000 010000000F523F28F381AB24AAAB01962C28AC240 X-ALT-DESC;FMTTYPE=text/html:
CALENDAR PLACEHOLDER
Session
Name: Be The Hacker\, Beat The Hacker
Speaker
s:
Andrew Mundell\, Enterprise Engineer\, Sophos
Session Overview:
Go behind the scenes of a simulated targeted attack and witness typical s
teps carried out by attackers from their perspective of attack tools\, tec
hniques and procedures. Once we achieve our attack objectives\, we’\;
ll switch sides to investigate malicious behavior detections and perform a “\;leadless”\; threat hunt guided by
the Mitre ATT&\;CK framework using Sophos EDR
.
Join Us Live: https://evolve.sophos.co
m/amer/