Register for the webinar
Register for the workshop
Register to watch on-demand
Thank you for registering!
We've received your request and will get back to you soon.

If you do not hear from us in the next 48 hours, please check your spam folder!
Back to homepage

Unmasking Encrypted Attacks through AI-Driven C2 Detection

Join this webinar to discover how Vectra AI leverages machine learning to detect command and control (C2) channels hidden within encrypted traffic. You'll gain insights into how attackers exploit covert channels, understand the importance of machine learning for scalable detection, and learn best practices for threat hunting across the MITRE ATT&CK framework.

45 minutes
October 17, 2024
11:00 AM ET/5:00 PM CET
Webinar
On-demand Webinar

Unmasking Encrypted Attacks through AI-Driven C2 Detection

Join this webinar to discover how Vectra AI leverages machine learning to detect command and control (C2) channels hidden within encrypted traffic. You'll gain insights into how attackers exploit covert channels, understand the importance of machine learning for scalable detection, and learn best practices for threat hunting across the MITRE ATT&CK framework.

45 minutes
October 17, 2024
11:00 AM ET/5:00 PM CET

Unmasking Encrypted Attacks through AI-Driven C2 Detection

Join this webinar to discover how Vectra AI leverages machine learning to detect command and control (C2) channels hidden within encrypted traffic. You'll gain insights into how attackers exploit covert channels, understand the importance of machine learning for scalable detection, and learn best practices for threat hunting across the MITRE ATT&CK framework.

45 minutes
October 17, 2024
11:00 AM ET/5:00 PM CET

Unmasking Encrypted Attacks through AI-Driven C2 Detection

Join this webinar to discover how Vectra AI leverages machine learning to detect command and control (C2) channels hidden within encrypted traffic. You'll gain insights into how attackers exploit covert channels, understand the importance of machine learning for scalable detection, and learn best practices for threat hunting across the MITRE ATT&CK framework.

45 minutes
October 17, 2024
11:00 AM ET/5:00 PM CET

Unmasking Encrypted Attacks through AI-Driven C2 Detection

Join this webinar to discover how Vectra AI leverages machine learning to detect command and control (C2) channels hidden within encrypted traffic. You'll gain insights into how attackers exploit covert channels, understand the importance of machine learning for scalable detection, and learn best practices for threat hunting across the MITRE ATT&CK framework.

45 minutes
October 17, 2024
11:00 AM ET/5:00 PM CET

Unmasking Encrypted Attacks through AI-Driven C2 Detection

Join this webinar to discover how Vectra AI leverages machine learning to detect command and control (C2) channels hidden within encrypted traffic. You'll gain insights into how attackers exploit covert channels, understand the importance of machine learning for scalable detection, and learn best practices for threat hunting across the MITRE ATT&CK framework.

45 minutes
October 17, 2024
11:00 AM ET/5:00 PM CET
Register for a free webinar
Register for a free on-demand webinar
Thank you for registering!
We've received your request and will get back to you soon.

If you do not hear from us in the next 48 hours, please check your spam folder!
Back to homepage

With most internet traffic now encrypted via TLS, services like Let’s Encrypt have made deploying encryption both easy and cost-effective. However, this widespread encryption presents significant challenges for security professionals attempting to discern whether traffic is legitimate or malicious.

In this session, we’ll explore the critical role of covert channel detection, how machine learning enhances security visibility, and the ways Vectra AI identifies command and control (C2) channels, even when encryption or other evasion techniques are in play.

What you will learn in this session:

  • How attackers exploit covert channels for Command and Control (C2) activities and data exfiltration
  • Why Machine Learning (ML) is essential for achieving scalable detection coverage of covert channels
  • Best practices for threat hunting and ensuring comprehensive coverage across the MITRE ATT&CK framework to effectively mitigate cyber risks
Share

Summary

With most internet traffic now encrypted via TLS, services like Let’s Encrypt have made deploying encryption both easy and cost-effective. However, this widespread encryption presents significant challenges for security professionals attempting to discern whether traffic is legitimate or malicious.

In this session, we’ll explore the critical role of covert channel detection, how machine learning enhances security visibility, and the ways Vectra AI identifies command and control (C2) channels, even when encryption or other evasion techniques are in play.

What you will learn in this session:

  • How attackers exploit covert channels for Command and Control (C2) activities and data exfiltration
  • Why Machine Learning (ML) is essential for achieving scalable detection coverage of covert channels
  • Best practices for threat hunting and ensuring comprehensive coverage across the MITRE ATT&CK framework to effectively mitigate cyber risks
Share

Your Hybrid Attack Expert

Your Hybrid Attack Expert

Your Hybrid Attack Expert

Your Hybrid Attack Expert

Your Hybrid Attack Expert

Your Hybrid Attack Expert

Speakers

Robert Marcoux
Host
Federal Principal Technologist

Vectra AI is the leader in Security AI-driven hybrid cloud threat detection and response. Only Vectra platform and services cover public cloud, SaaS applications, identity systems and network infrastructure – both on-premises and cloud-based. Organizations worldwide rely on the Vectra platform and services for resilience to ransomware, supply chain compromise, identity takeovers, and other cyberattacks impacting their organization.

For more information, visit vectra.ai

FAQs

Who should join the hunt?

This competition is open to all threat hunters. This is a more advanced challenge, so experience with threat hunting and investigation will set you up for success!

How long does it take to complete? Do I need to finish it in one session?

The challenge will take approximately 10 hours to complete. You can log in at any time during the 4 weeks of the challenge and pick up right where you left off.

How does scoring work?

The objective is to collect as many points as possible. Points will accumulate on the Scoreboard.

This is a jeopardy-style format. The higher the points available – the harder the challenge. Some challenges unlock additional challenges to capture more points. Most challenges do offer hints, but hints will cost you points.

Can I invite others to join?

Yes! Invite your colleagues to join in on the fun. The challenge is open to threat hunters around the world and everyone has a chance to win.