hunt club 2019 agenda

Compelling keynotes, networking opportunities, knowledge sharing and more.

hunt club 2019 agenda

conference agenda

Hunt Club 2019 is the annual Vectra community event where security architects and analysts from around the world gather to share best practices and use-cases for optimizing AI cybersecurity tactics and techniques of the Cognito platform. This event includes compelling keynotes, networking opportunities and knowledge sharing.

Conference Day 1

Not all models are equal or understanding their cumulative precision - Using PAA models, host scoring

Every model in Cognito Detect represents a different behavior. If the behaviors are different, why are you treating the detections the same? Let's look at different detection combinations and how they tell different stories; not only informing your investigation steps helping you create better custom models yourself.

UX Session

This UX research session uses fun interactive exercises to give us an opportunity to connect with our users and brainstorm new ideas.

You have data - now what do you do with it?

Ground yourself in the mindset of an analyst and an incident responder. This isn't just a talk about sources of information or the tools to use. It is a talk which tells you which artifacts you need to think about in the grand scheme of an attack.

Conference Day 2

Conducting a true-to-life red team

Perfect Practice Prevents Poor Performance. You're doing yourself and your team a disservice by limiting your red team. Prevent unnecessary training scars and teach your blue team what a real attack looks like by conducting a real attack.

Cybersecurity D&D

You can keep the d20s at home, but table-topping is a great way to train and develop processes. Using a real-world attack to guide us, we'll work together as a blue team to put the pieces of the puzzle together.

Discovering your own security posture and knowing what to triage

How often do you wonder: what should I triage? This decision isn't binary. There isn't a right or wrong answer. We can, however, talk about all the factors that need to go into your decision and provide you some structure around the decisions.

Using the Cognito API for fun and profit or at least getting labor hours back

Engineering and Data Science are hard at work trying to get more hours into your day, but until they break the time-space continuum, we have the API. Let's chat through some examples and build one ourselves. Laptops required.

Detailed agenda coming soon!

#tag

#tag

#tag

#tag

#tag

#tag

Conference Day 1

8:00 A.M. - 8:30 A.M.

ROOM

Speaker Name

Speaker Title

Welcome to Hunt Club

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros elementum tristique. Duis cursus, mi quis viverra ornare, eros dolor interdum nulla, ut commodo diam libero vitae erat. Aenean faucibus nibh et justo cursus id rutrum lorem imperdiet. Nunc ut sem vitae risus tristique posuere.

tag, tag, tag, tag, tag

#tag

#tag

#tag

#tag

#tag

#tag

Conference Day 1

8:00 A.M. - 8:30 A.M.

ROOM

Speaker Name

Speaker Title

Event Title

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros elementum tristique. Duis cursus, mi quis viverra ornare, eros dolor interdum nulla, ut commodo diam libero vitae erat. Aenean faucibus nibh et justo cursus id rutrum lorem imperdiet. Nunc ut sem vitae risus tristique posuere.

tag, tag, tag, tag, tag

Conference Day 1

UX Session

This UX research session uses fun interactive exercises to give us an opportunity to connect with our users and brainstorm new ideas.

Conducting a true-to-life red team

Perfect Practice Prevents Poor Performance. You're doing yourself and your team a disservice by limiting your red team. Prevent unnecessary training scars and teach your blue team what a real attack looks like by conducting a real attack.

Discovering your own security posture and knowing what to triage

How often do you wonder: what should I triage? This decision isn't binary. There isn't a right or wrong answer. We can, however, talk about all the factors that need to go into your decision and provide you some structure around the decisions.

You have data - now what do you do with it?

Ground yourself in the mindset of an analyst and an incident responder. This isn't just a talk about sources of information or the tools to use. It is a talk which tells you which artifacts you need to think about in the grand scheme of an attack.

Cybersecurity D&D

You can keep the d20s at home, but table-topping is a great way to train and develop processes. Using a real-world attack to guide us, we'll work together as a blue team to put the pieces of the puzzle together.

Not all models are equal or understanding their cumulative precision - Using PAA models, host scoring

Every model in Cognito Detect represents a different behavior. If the behaviors are different, why are you treating the detections the same? Let's look at different detection combinations and how they tell different stories; not only informing your investigation steps helping you create better custom models yourself.

Using the Cognito API for fun and profit or at least getting labor hours back

Engineering and Data Science are hard at work trying to get more hours into your day, but until they break the time-space continuum, we have the API. Let's chat through some examples and build one ourselves. Laptops required.

Conference Day 1

Not all models are equal or understanding their cumulative precision - Using PAA models, host scoring

Every model in Cognito Detect represents a different behavior. If the behaviors are different, why are you treating the detections the same? Let's look at different detection combinations and how they tell different stories; not only informing your investigation steps helping you create better custom models yourself.

Conference Day 1

No items found.

Conference Day 1

Conducting a true-to-life red team

Perfect Practice Prevents Poor Performance. You're doing yourself and your team a disservice by limiting your red team. Prevent unnecessary training scars and teach your blue team what a real attack looks like by conducting a real attack.

Conference Day 1

Conducting a true-to-life red team

Perfect Practice Prevents Poor Performance. You're doing yourself and your team a disservice by limiting your red team. Prevent unnecessary training scars and teach your blue team what a real attack looks like by conducting a real attack.

Discovering your own security posture and knowing what to triage

How often do you wonder: what should I triage? This decision isn't binary. There isn't a right or wrong answer. We can, however, talk about all the factors that need to go into your decision and provide you some structure around the decisions.

You have data - now what do you do with it?

Ground yourself in the mindset of an analyst and an incident responder. This isn't just a talk about sources of information or the tools to use. It is a talk which tells you which artifacts you need to think about in the grand scheme of an attack.

Cybersecurity D&D

You can keep the d20s at home, but table-topping is a great way to train and develop processes. Using a real-world attack to guide us, we'll work together as a blue team to put the pieces of the puzzle together.

Conference Day 1

Conducting a true-to-life red team

Perfect Practice Prevents Poor Performance. You're doing yourself and your team a disservice by limiting your red team. Prevent unnecessary training scars and teach your blue team what a real attack looks like by conducting a real attack.

Discovering your own security posture and knowing what to triage

How often do you wonder: what should I triage? This decision isn't binary. There isn't a right or wrong answer. We can, however, talk about all the factors that need to go into your decision and provide you some structure around the decisions.

You have data - now what do you do with it?

Ground yourself in the mindset of an analyst and an incident responder. This isn't just a talk about sources of information or the tools to use. It is a talk which tells you which artifacts you need to think about in the grand scheme of an attack.

Cybersecurity D&D

You can keep the d20s at home, but table-topping is a great way to train and develop processes. Using a real-world attack to guide us, we'll work together as a blue team to put the pieces of the puzzle together.

Not all models are equal or understanding their cumulative precision - Using PAA models, host scoring

Every model in Cognito Detect represents a different behavior. If the behaviors are different, why are you treating the detections the same? Let's look at different detection combinations and how they tell different stories; not only informing your investigation steps helping you create better custom models yourself.

Conference Day 1

UX Session

This UX research session uses fun interactive exercises to give us an opportunity to connect with our users and brainstorm new ideas.

Not all models are equal or understanding their cumulative precision - Using PAA models, host scoring

Every model in Cognito Detect represents a different behavior. If the behaviors are different, why are you treating the detections the same? Let's look at different detection combinations and how they tell different stories; not only informing your investigation steps helping you create better custom models yourself.

Using the Cognito API for fun and profit or at least getting labor hours back

Engineering and Data Science are hard at work trying to get more hours into your day, but until they break the time-space continuum, we have the API. Let's chat through some examples and build one ourselves. Laptops required.

Conference Day 1

No items found.

Conference Day 1

No items found.

Conference Day 1

UX Session

This UX research session uses fun interactive exercises to give us an opportunity to connect with our users and brainstorm new ideas.

Discovering your own security posture and knowing what to triage

How often do you wonder: what should I triage? This decision isn't binary. There isn't a right or wrong answer. We can, however, talk about all the factors that need to go into your decision and provide you some structure around the decisions.

Cybersecurity D&D

You can keep the d20s at home, but table-topping is a great way to train and develop processes. Using a real-world attack to guide us, we'll work together as a blue team to put the pieces of the puzzle together.

Not all models are equal or understanding their cumulative precision - Using PAA models, host scoring

Every model in Cognito Detect represents a different behavior. If the behaviors are different, why are you treating the detections the same? Let's look at different detection combinations and how they tell different stories; not only informing your investigation steps helping you create better custom models yourself.

Using the Cognito API for fun and profit or at least getting labor hours back

Engineering and Data Science are hard at work trying to get more hours into your day, but until they break the time-space continuum, we have the API. Let's chat through some examples and build one ourselves. Laptops required.

Conference Day 1

UX Session

This UX research session uses fun interactive exercises to give us an opportunity to connect with our users and brainstorm new ideas.

Discovering your own security posture and knowing what to triage

How often do you wonder: what should I triage? This decision isn't binary. There isn't a right or wrong answer. We can, however, talk about all the factors that need to go into your decision and provide you some structure around the decisions.

You have data - now what do you do with it?

Ground yourself in the mindset of an analyst and an incident responder. This isn't just a talk about sources of information or the tools to use. It is a talk which tells you which artifacts you need to think about in the grand scheme of an attack.

Cybersecurity D&D

You can keep the d20s at home, but table-topping is a great way to train and develop processes. Using a real-world attack to guide us, we'll work together as a blue team to put the pieces of the puzzle together.

Conference Day 1

Discovering your own security posture and knowing what to triage

How often do you wonder: what should I triage? This decision isn't binary. There isn't a right or wrong answer. We can, however, talk about all the factors that need to go into your decision and provide you some structure around the decisions.

You have data - now what do you do with it?

Ground yourself in the mindset of an analyst and an incident responder. This isn't just a talk about sources of information or the tools to use. It is a talk which tells you which artifacts you need to think about in the grand scheme of an attack.

Cybersecurity D&D

You can keep the d20s at home, but table-topping is a great way to train and develop processes. Using a real-world attack to guide us, we'll work together as a blue team to put the pieces of the puzzle together.

more details COMING SOON

cognito training agenda

Monday 10/28

One-day workshop on how to use Cognito

This crash course covers use of the Cognito Detect and Cognito Recall for SOC analysts. Topics covered include Cognito Detect and Cognito Recall overviews; UI walkthroughs; understanding attack campaigns and detections; user workflow; configuring triage rules for recurring behavior; and using Cognito Recall/Stream to pivot through the metadata for analysis and threat hunting.

This training workshop will include the Cognito Essentials and Cognito Advanced training workshops.

Detailed agenda coming soon!

Monday 10/28

#tag

#tag

#tag

#tag

#tag

#tag

Cognito Training Workshop

9:00 A.M. - 9:30 A.M.

ROOM

Speaker Name

Speaker Title, COMPANY

Event Title

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros elementum tristique. Duis cursus, mi quis viverra ornare, eros dolor interdum nulla, ut commodo diam libero vitae erat. Aenean faucibus nibh et justo cursus id rutrum lorem imperdiet. Nunc ut sem vitae risus tristique posuere.

tag, tag, tag, tag, tag

9:00 A.M. - 9:30 A.M.

ROOM

Speaker Name

Speaker Title, COMPANY

Event Title

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros elementum tristique. Duis cursus, mi quis viverra ornare, eros dolor interdum nulla, ut commodo diam libero vitae erat. Aenean faucibus nibh et justo cursus id rutrum lorem imperdiet. Nunc ut sem vitae risus tristique posuere.

tag, tag, tag, tag, tag

speakers

Come back soon to learn about more of our Hunt Club 2019 speakers.

KEYNOTE SPEAKERS

Gerd Leonhard

Gerd Leonhard

Futurist, Humanist, Author of Technology vs. Humanity, CEO The Futures Agency, Film-maker

Gerd Leonhard is a hunter and gatherer of stories from the future. From philosophy, culture and society to commerce, business and technology, Gerd brings practical wisdom 'back from the future' so that his audience can make better choices, today. In his latest book 'Technology vs Humanity', Gerd explores a wide range of ethical and social questions that urgently need answering before we blindly forego our very humanity in order to 'transcend our limitations'. For many organisations, enterprises and people in the grip of technological disruption, Gerd has supplied visionary insights and actionable wisdom for almost 2 decades. He is considered one of the top 10 futurist speakers, globally.

BREAKOUT SPEAKERS

Daniel Basile

Daniel Basile

Executive SOC Director

Texas A&M University System

Jason DePaul

Jason DePaul

Global SOC director

Dun & Bradstreet

Milos Pesic

Milos Pesic

Cybersecurity specialist

ED&F Man

Kevin Kennedy

Kevin Kennedy

VP of product management

Vectra AI

Jennifer Wang

Jennifer Wang

VP of Customer Success

Vectra AI

Oliver Tavakoli

Oliver Tavakoli

CTO

Vectra AI

Jonathan Barrett

Jonathan Barrett

Consulting Analyst

Vectra AI

want to speak at hunt club?

Get to know the perks of speaking at Hunt Club and answers for frequently asked questions. Then, fill out the speaker application form ASAP to apply by the deadline: August 28, 2019

3 PERKS OF SPEAKING AT HUNT CLUB

1

FREE CONFERENCE TICKET

2

NIGHTS OF HOTEL ACCOMMODATION

3

DAYS TO SHARE AND LEARN WITH PEERS

Speaker FAQ

What topics should I consider for my abstract submission?

Share your passion with your peers. Tell how you use AI to drive security ops and threat hunting. Share tips, tools and tactics so your peers can learn from your best practices.

Do I need to be affiliated with Vectra to attend and/or speak?

Hunt Club is an industry event, and your relationship to Vectra (or lack thereof) has no bearing on your chances of being selected to speak.

Whom can I contact with additional questions?

If you have additional questions about being a Hunt Club 2019 speaker, you can email huntclub@vectra.ai. Please note that we cannot make extensions to the application deadline, August 28, 2019.

cybersecurity capture the flag

WHO

All Hunt Club attendees may participate.

WHAT

Compete against your peers by testing your mettle and your skills. Earn bragging rights by attacking a simulated enterprise environment. Complete the challenges with the most points.

WHEN

Tuesday 10/29/19 and Wednesday 10/30/19 @ times TBD.

WHERE

Royal Sonesta Hotel - room TBD.

WHY

You're the experts. Show what you do best while having fun competing with peers.

more details coming soon

sign up to participate

offsite: special event

WHO

Anyone and everyone who attends Hunt Club.

WHAT

A social event with food, drinks, music, and more.

WHEN

Tuesday 10/29/19 @ time TBD.

WHY

Hunt Club is about engaging with your peers, both inside the conference and out.

more details coming soon

Location to-be-announced!

Address

Check back soon for more details.