Skip to content

Details

A network anomaly has flagged a suspected breach and it’s up to us to play detective. In Sherlock: Interceptor attendees will examine network traffic, logs, and system artefacts to piece together how an unauthorized actor infiltrated the environment, what data was accessed, and the full scope of the compromise. Expect hands-on analysis, evidence triage, and practical techniques for reconstructing attacker activity so you can confidently identify indicators of compromise and make informed containment and remediation decisions. Bring your curiosity and investigative hat—this is a real-world SOC-style challenge in miniature.

Network Security
Hacking
Hanging Out
Professional Networking

Members are also interested in