#1713144: Vectra AI Attack Labs: Understanding Modern Attacks (3-episode series)
| Description: |
Join Vectra AI for a three-part Attack Lab that breaks down modern attacks into three 30-minute digestible sessions. Our threat hunters and incident responders will walk through how adversaries enter, hide, and move inside enterprise networks — using real-world attack patterns, live demos, and threat hunting playbooks you can apply immediately. Summary Episode 1: Initial Access - How do attackers get in the network? November 20, 2025 at 11:00 AM EST, 11:00 AM CET, or 11:00 AM SGT How do attackers get in? We’ll dissect the most common entry vectors — phishing, credential compromise, exposed services, supply-chain and attacker tooling — and demonstrate how each leaves subtle signals in network and cloud telemetry. Learn practical detection strategies, prioritized alerts that matter, and the earliest containment steps to stop a breach before it escalates. Episode 2: Persistence - How do attackers hide in the network? December 10, 2025 at 11:00 AM EST, 11:00 AM CET, or 11:00 AM SGT How do attackers stay hidden? We’ll show the techniques adversaries use to establish long-term footholds — stealthy implants, living-off-the-land techniques, scheduled tasks and covert accounts — and how to surface persistence with behavior-based analytics. Walk away with playbooks for threat hunting, evidence collection, and removing persistence while eliminating blind spots. Episode 3: Lateral Movement - How do attackers move in the network? January 21, 2026 at 11:00 AM EST, 11:00 AM CET, or 11:00 AM SGT How do attackers move through the network? See how attackers pivot, escalate privileges, and harvest data across hosts and clouds. Through this lab we’ll map attacker paths, highlight cross-environment indicators, and demonstrate rapid triage and containment techniques to reduce blast radius and accelerate remediation. What to expect Concise, analyst-led briefings with real world examples. Actionable detection patterns and hunting queries you can run immediately. Real incident playbooks: from detection → investigation → containment → remediation. Q&A with Vectra threat hunters and product experts. Who should attend: security operations, threat hunters, SOC managers, incident responders, and CISOs who need pragmatic, hands-on techniques to find and stop modern adversaries. Short, practical, and tactical — this Attack Lab gives your team the playbooks and signals to find attackers earlier and reduce investigation time. |
|---|---|
| More info: | https://www.vectra.ai/webinars/understanding-modern-attacks |
| Date added | Nov. 23, 2025, 7:40 p.m. |
|---|---|
| Source | vectra |
| Subjects | |
| Venue | Nov. 20, 2025, midnight - Jan. 21, 2026, midnight |
