ONE-ISAC and Cloud Range Workshop
Topic: Threat Hunting at Scale: Cutting Through the Noise
Speaker: Duane Dunston, Senior Adversarial Engineer
Abstract:
Level: Intermediate to Advanced
Tools Used: goMeeb, LightRAG, Simulated Anomaly Datasets
Step into the mind of a threat hunter and locate the adversary before they gain full control of your network. In this fast-paced, hands-on workshop, you’ll learn how to uncover stealthy threats hiding in plain sight across 100+ systems. Using frequency analysis and AI-driven context tools, you’ll hunt rare processes, rogue DLLs, and suspicious user activity like a pro.
What You’ll Learn:
- Identify outliers in processes, users, services, and DLLs at enterprise scale
- Use role-based grouping and context layering to separate noise from true threats
- Detect lateral movement, privilege escalation, and persistent backdoors
Through guided labs and real-world datasets, you’ll sharpen your ability to think like a threat hunter—and leave with practical techniques and tools to bring back to your team.
Whether you’re an analyst, incident responder, or SOC lead, this is your chance to level up your detection game with real-world tactics that work at scale.