This website uses cookies to enhance your browsing experience. Please note that by continuing to use this site you consent to the terms of our Privacy Notice.


Register for Threat Hunting Workshop: Hunting for Adversary Activity, Finding Evil, Eliminating the Threat


Information submitted on this form may be associated with other information we have collected and used pursuant to our Privacy Notice

Thursday, December 6th | 10:00AM - 2:00PM CDT
Venue: Illinois State University - Alumni Center - 1101 N. Main Street | Normal, Il 61761

Half Day Workshop – Advanced Threat Hunting

Join us for an intense adversary threat hunting program; learn the latest advanced adversary techniques and latest tradecraft. You will advance your threat hunting skills and methods and take your organization's ability to detect and hunt to the next level.

Through real world examples and demonstrations, our experts will show you new and existing techniques adversaries use, and how to proactively identify the earliest signs of active attacks.

Whether you are a SOC manager or a seasoned threat analyst, you will leave with an understanding of how top organizations are using threat hunting to proactively identify more threats, sooner, and you will return to your office armed with ideas for building and maturing your own threat hunting program.

Registration is from 9:30AM – 10:00AM. The workshop will start at 10:00AM.

Special thanks to Dr. Glen Sagers Ph.D. Professor of Security School of IT, Illinois State University for the support and offer to host this event at the Illinois State University Alumni Center.

Workshop Schedule

10:00AM - 11:15AM

Welcome & Introductions

11:15AM - 11:30AM

Morning Break

11:30AM - 1:00PM

Putting Threat Hunting into Action // Wrap Up

1:00PM - 2:00PM

Lunch and Networking

CrowdStrike Expert

Adam Hogan, Sales Engineering Manager, CrowdStrike

Adam Hogan is a sales engineering manager for CrowdStrike. With 15 years in infosec he has worked as an intrusion analyst, security consultant and instructor before joining a sales team. He first broke into security by teaching himself the Snort IDS platform and is now grateful the community is large enough that he can easily learn from others.