Rapid Incident Response Workshop
with Cisco Extended Detection & Response
(XDR)
🎯 Mission Briefing: Kick off your adventure with a hands-on lab designed to enhance your investigation and incident response expertise.
🌐 Defend against sophisticated APTs with Cisco XDR: Learn how to empower your teams to go from endless investigation to remediating the highest priority incidents with greater speed, efficiency, and confidence. We will explore how to:
· Identify patterns and correlations in threat activity with root cause and attack chain analysis
· Leverage machine learning to prioritize incidents based on risk and impact
· Elevate productivity with automation and guidance
Experience a hands-on workshop built for SecOps pros, by SecOps pros.
Don’t miss your chance to:
🎯 Develop your skills: Learn how to scope, contain, and eradicate threats like a pro. Enhance your Digital Forensics and Incident Response and threat hunting expertise with greater speed, efficiency and confidence in our hands-on virtual lab.
🌐 Test your abilities: Put your skills to the test by:
- Identifying patterns and correlations in threat activity with root cause and attack chain analysis
- Leveraging machine learning to prioritize incidents based on risk and impact
- Elevating productivity with automated and guided remediations
Whether you are an experienced cybersecurity professional or a beginner, this workshop guarantees a mix of education, excitement, and engaging content. Seize the chance, upskill, and leave no incident undetected. Secure your spot now and leave with a clear plan to take back to your organization.
Note:
~ We recommend using a second monitor or screen for this workshop.
~ Please close down your applications and turn off your notifications before the workshop starts.
~ We understand your time is valuable; please plan for approximately 4 hours to complete the Rapid Incident Response with Cisco XDR workshop.
We look forward to seeing you there!
Agendas
Workshop Kickoff & Slide PresentationIntroductions, objectives, threat landscape, and tool orientation. |
|
Navigating Cisco XDR-DemoBrief platform walkthrough for first-time users. |
|
Phase 1: Initial AccessInvestigate how attackers first entered the environment through phishing techniques. |
|
Phase 2: DiscoveryAnalyze adversary reconnaissance activity within the compromised network. |
|
Phase 3: Privilege EscalationIdentify lateral movement techniques and privilege abuse across endpoints. |
|
Phase 4: Credential AccessUncover the methods used to dump and reuse credentials for persistence. |
|
Phase 5: Defense EvasionTrack how attackers disabled tools and obscured their presence |
|
Phase 6: ExfiltrationAnalyze data movement and identify staging or exfiltration behaviors. |
|
Phase 7: Containment & ResponseUse Cisco XDR and integrated tools to contain the threat and recommend response actions. |
|
Q&A, Survey, CertificatesWrap-up, live Q&A, Certificates & Survey |