How to detect advanced attacks
*Please note that this session is full and we are no longer accepting sign-ups
As cyberattacks grow more sophisticated, it’s easy to see them as purely technological problems requiring technical solutions. But behind every attack is a human adversary—skilled, motivated, and deliberate. Understanding who these attackers are, how they operate, and what they aim to achieve is the cornerstone of an effective security strategy. Without this insight, you're left fighting an invisible enemy in the dark.
In this session, we’ll break down how to map threat actor behaviors using frameworks like MITRE ATT&CK, enabling you to align your defenses with the tactics, techniques, and procedures (TTPs) used by your adversaries. We'll also highlight the work of our Security Operations Center, explaining how humans and technology interact to thwart emerging threats.
What you’ll gain:
- Understand how prevention, detection, and response combine to build a strong, layered defense
- Learn how to map threat actor techniques (TTPs) to MITRE ATT&CK and align your defenses with CIS Controls
- Understand how to identify and mitigate gaps in your organisation's defenses
Who should attend?
- CISOs, IT Directors, IT Managers, security experts
Please note that places for this workshop are limited. Sign up on this page to secure your spot!
Practical Information
- When:
January 23, 2025
15:30 - 18:00 - Where:
Hunt & Hackett's office
New Babylon
Anna van Buerenplein 46
The Hague
Find on Google Maps - Language
Dutch
Registration
Programme
- 15:00 – 15:30
Arrival - 15:30 – 17:00
Our security experts will explain key concepts related to detection engineering and threat modelling, drawing from case studies and real-world observations - 17:00 – 17:30
We will conclude with key takeaways and actionable recommendations that you can take back to your own organisation - 17:30 – 18:00
Borrel