Skip to content
Close
Free Trial
PHONE HOTLINE: 1-833-HUNT-NOW E-MAIL: support@huntress.com
Free Trial

vertical-logo-gr-wh-1@2x

Cybersecurity Training for IT Professionals | All Sessions Now Available On-Demand

 

Grab your hacker hoodie and get ready to level up your cyber skills.

Ready to think like a hacker to level up your cybersecurity skills? Join us for hack_it 2021.2 to sharpen your tradecraft, network with security professionals and get hands-on training you can learn today and use in your business tomorrow. Watch the complete virtual event and be a part of the growing hack_it community!

Can you hack_it?

Agenda

Join us for a series of educational and interactive sessions that will help you better understand bad actors and modern tradecraft. You'll learn from your peers and have plenty of opportunities to network.

With two opportunities to catch the content plus a separate, optional "0-Day" workshop, you've got lots of opportunities to sharpen your skillset.

Click the tabs below to explore 0-Day, Day 1.0 and Day 2.0 content.

0-Day (SOLD OUT)

12:00pm - 4:00pm ET

Register Here

0-Day: A Virtual Hands-On Hacking Training Lab

October 25, 2021 | 12pm4pm ET

Optional Session

Cost: $99 USD

When two opposing sides face off, each has its own offensive and defensive tactics in play. The former usually focuses on exploiting your opponent’s weaknesses, while the latter is designed to protect your interests.

As the good guys in the cybersecurity world, we often find ourselves playing defense and reacting to the moves of our opponents... but what if we could bring a bit more offense to the table?

In this half-day session, we’ll dig into both sides of the cybersecurity game. Join us and discover whether defense can actually win championships—or if the best defense is in fact a great offense.

For hack_it 2021.2, we are introducing new content in a modernized virtual environment and updated tactics, techniques and tradecraft.

12:00pm - 1:00pm ET: Dedicated Setup Time

1:00pm - 2:20pm ET: Offense Part 1: Making Hackers Earn Their Access

2:20pm - 2:30pm ET: Break

2:30pm - 3:30pm ET: Offense Part 2: Making Hackers Earn Their Access

3:30pm - 3:40pm ET: Break

3:40pm - 3:45pm ET: Defense: Analyzing Your Network

3:45pm - 4:00pm ET: Wrap-up/Q&A

Register Now

SpeakerPhoto - Dave K SpeakerPhoto - John Hammond
Dave Kleinatland
Security Researcher
Huntress
John Hammond
Senior Security Researcher
Huntress
SpeakerPhoto - Caleb Stewart SpeakerPhoto - Henry
Caleb Stewart
Security Researcher
Huntress
Henry Washburn
Sales Engineering Manager
Huntress
SpeakerPhoto - Phelps SpeakerPhoto - Todd
Jason Phelps
MSP Sales Engineer
Huntress
Todd Painter
Senior Security Engineer
Huntress

 

Day 1.0

1:00pm - 1:10pm ET

October 26

Introduction
SpeakerPhoto - John Hammond SpeakerPhoto - Kyle
John Hammond
Huntress
Kyle Hanslovan
Huntress
1:10pm - 2:00pm ET
Who Hacked You? A Cybercrime Game of Clue
We’ve just been compromised, but who is the culprit? Was it the Lazarus Group in the data center? Sodinikibi in the DMZ? Or FancyBear on the file server?

In this interactive and audience-driven session, we’ll investigate and work through a hypothetical incident, showcase a number of real-world threat actors, understand their tradecraft and learn how the bad guys compromised your network. Join us as we analyze the logs and uncover new pieces of evidence and help us track down “whodunnit!”
SpeakerPhoto - Kyle SpeakerPhoto - Lisa Mitchell
Kyle Hanslovan
Huntress
Lisa Mitchell
Netgain Technologies
2:00pm - 3:00pm ET
Dark Web Dumpster Diving: A Safari Ride of Cybercrime

Threat actors, ransomware gangs, malware authors and all kinds of shady fellas lurk in the dark web. Do you lurk there too?

In this spooky fireside chat, members of the Huntress team and industry leaders tell their own real-life ghost stories—finding evidence of breaches, data leaks, and tracking down bad guys on the dark web. Join us to uncover what’s really lurking in the shadows and how you can be better informed on the underground enterprise and black market businesses where cybercriminals run amok.

SpeakerPhoto - Dave K SpeakerPhoto - Chris Loehr-1 SpeakerPhoto - Felicia King
Dave
Kleinatland
Huntress
Chris Loehr
CFC Response/
Solis Security
Felicia King
Quality Plus Consulting
3:00pm - 4:00pm ET
Gone Phishin' for Malware in Macros

So you want to test your organization’s response to phishing campaigns—for all the right reasons, of course! Want to know how hackers prepare the most effective payload? 

Join Huntress hackers and members of the MSP community in this technical presentation, showcasing not only how you can set up your own internal phishing campaign, but how bad actors bait businesses with macro-enabled office documents.

SpeakerPhoto - John Hammond SpeakerPhoto - Jason Slagle
John Hammond
Huntress
Jason Slagle
CNWR, Inc.
4:00pm - 4:10pm ET
Wrap Up
SpeakerPhoto - John Hammond SpeakerPhoto - Kyle
John Hammond
Huntress
Kyle Hanslovan
Huntress

Day 2.0

7:00pm - 7:10pm ET

October 27

Introduction
SpeakerPhoto - John Hammond SpeakerPhoto - Kyle
John Hammond
Huntress
Kyle Hanslovan
Huntress
7:10pm - 8:00pm ET
Whodunnit: Solving a Malware Mystery

It’s not a matter of if, but a matter of when it’s your turn to say, “We’ve been hacked!” But who did the crime? Was it APT123? Ransomware gang XYZ? Together, we will follow the breadcrumbs and put the puzzle pieces together!

Jump into a choose-your-own-adventure, noir-style detective game to solve a malware mystery with the Huntress team and fellow MSP members. We will walk through a theoretical scenario and educate on real-world threat actors and hacker tradecraft. You as the audience can help us track down whodunnit and solve this cybercrime of Clue!

SpeakerPhoto - Kyle SpeakerPhoto - Lisa Mitchell
Kyle Hanslovan
Huntress
Lisa Mitchell
Netgain Technologies
8:00pm - 9:00pm ET
Underground Escapades: Hunting for Hackers

You’ve seen the dumps from the dark web—but what is real, and what is FUD? Members of the Huntress team and fellow MSP members will get shady and explore messaging from different threat actors, ransomware gangs and malware authors.

Join us as we walk the wire examining evidence of compromised organizations and what we could learn to track down the threat actors. This session will be “gamified” as the cohort polls the audience—are these hacks real? We will go on some underground escapades, hunt for hackers and tip-toe through the tulips in the dark web.

SpeakerPhoto - Dave K SpeakerPhoto - Chris Loehr-1 SpeakerPhoto - Felicia King
Dave
Kleinatland
Huntress
Chris Loehr
CFC Response/
Solis Security
Felicia King
Quality Plus Consulting
9:00pm - 10:00pm ET
Cast Your Own Phishnet: Macro Malware Campaigns

Team members and personnel know now to hover over the link in an email, or to look for the HTTPS or an official domain so they aren’t a victim of spear phishing… but are those cheesy tricks all that the hackers have up their sleeves? 

In this technical session, we will walk through not only how you can prepare your own internal phishing exercise but how you can cook up some mean macro-enabled malware and phish like the pros. This demo-driven presentation—and knowing that a strong offense is the best defense—will show just how hackers trick your IT staff with the ol’ hook, line and sinker!

SpeakerPhoto - John Hammond SpeakerPhoto - Jason Slagle
John Hammond
Huntress
Jason Slagle
CNWR, Inc.
10:00pm - 10:10pm ET
Wrap Up
SpeakerPhoto - John Hammond SpeakerPhoto - Kyle
John Hammond
Huntress
Kyle Hanslovan
Huntress

Watch the Complete Event

Can you hack_it?