BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//WiCyS - Women in Cybersecurity - ECPv6.15.20//NONSGML v1.0//EN
CALSCALE:GREGORIAN
METHOD:PUBLISH
X-ORIGINAL-URL:https://www.wicys.org
X-WR-CALDESC:Events for WiCyS - Women in Cybersecurity
REFRESH-INTERVAL;VALUE=DURATION:PT1H
X-Robots-Tag:noindex
X-PUBLISHED-TTL:PT1H
BEGIN:VTIMEZONE
TZID:UTC
BEGIN:STANDARD
TZOFFSETFROM:+0000
TZOFFSETTO:+0000
TZNAME:UTC
DTSTART:20240101T000000
END:STANDARD
END:VTIMEZONE
BEGIN:VEVENT
DTSTART;TZID=UTC:20250917T130000
DTEND;TZID=UTC:20250917T140000
DTSTAMP:20260428T195342
CREATED:20250828T194118Z
LAST-MODIFIED:20250828T194118Z
UID:10002537-1758114000-1758117600@www.wicys.org
SUMMARY:Webinar | Beyond the Buzzwords: A Quick Dive into Endpoint Detection & Response Forensics
DESCRIPTION:Detecting and responding to threats is a core function of cybersecurity\, but it’s more complex than it sounds. While buzzwords like Extended Detection & Response (XDR)\, Endpoint Detection & Response (EDR)\, and Network Detection & Response (NDR) are often discussed\, understanding how to apply them to enrich investigations is key. Every environment has unique variables and goals\, but they all share one common element: endpoints. Securing these devices\, whether they’re on-site or remote\, starts with fundamental visibility. \nThis session will show you how EDR serves as the cornerstone for all detection and response methodologies. We’ll start with an overview of various frameworks\, focusing on both the endpoint and the network. Then\, we’ll dive into a real-world forensic investigation of a Remote Access Trojan (RAT) called SharpRhino. Using the MITRE ATT&CK® Framework\, we’ll demonstrate best practices for detection and response\, including a look at the tactics\, techniques\, and procedures used in this exploit\, along with recommended mitigations. \n  \nWiCyS is proud to provide members the opportunity to earn CPE/CEU credits for attending WiCyS Webinars live. \nTo earn CPE/CEU credits with the following providers\, you must meet the minimum requirements: \n\nGIAC/(ISC)2: attend for a minimum of 45 minutes or the entirety of the webinar\nCompTIA: attend for a minimum of 60 minutes or the entirety of the webinar (webinar topic must relate to the certificate being renewed)\n\nAttendees who meet the requirements can log into BrightTALK to print out their attendance certificates to submit for CPE/CEU credits. \n  \nRegister for this webinar and view the recording if you are unable to join live.
URL:https://www.wicys.org/event/webinar-beyond-the-buzzwords-a-quick-dive-into-endpoint-detection-response-forensics/
LOCATION:BrightTALK
CATEGORIES:Webinar,WiCyS
ATTACH;FMTTYPE=image/png:https://www.wicys.org/wp-content/uploads/2025/08/WiCyS-LI-_-Twitter-98.png
END:VEVENT
END:VCALENDAR