ONE-ISAC and Cloud Range Webinar

Topic: Threat Hunting at Scale: Cutting Through the Noise

Speaker: Duane Dunston, Senior Adversarial Engineer

In partnership with ONE-ISAC, Cloud Range hosted a free, hands-on workshop with Duane Dunston, Senior Adversarial Engineer.

Participants Learned to:

✅ Detect rogue processes & DLLs across 100+ systems

✅ Use goMeeb & LightRAG to separate noise from real threats

✅ Spot lateral movement, persistence & privilege abuse

Abstract:

Level: Intermediate to Advanced

Tools Used: goMeeb, LightRAG, Simulated Anomaly Datasets

Step into the mind of a threat hunter and locate the adversary before they gain full control of your network. In this fast-paced, hands-on workshop, you’ll learn how to uncover stealthy threats hiding in plain sight across 100+ systems. Using frequency analysis and AI-driven context tools, you’ll hunt rare processes, rogue DLLs, and suspicious user activity like a pro.

What Participants Learned:

  • To identify outliers in processes, users, services, and DLLs at enterprise scale
  • To use role-based grouping and context layering to separate noise from true threats
  • To detect lateral movement, privilege escalation, and persistent backdoors

Through guided labs and real-world datasets, you’ll sharpen your ability to think like a threat hunter—and leave with practical techniques and tools to bring back to your team.

Whether you’re an analyst, incident responder, or SOC lead, this is your chance to level up your detection game with real-world tactics that work at scale.