Workshop Anatomy of a Network Attack


Target Audience Information Security Professionals
CIO’s, CISO, IT Manager, Security Officer, Security Architects and Engineers – all who are interested in Incident Response (not technical)
CPE Credits Earn 16 CPE (Continuing Professional Education) for attending this SIGS Workshop. Please request a confirmation.
Location TBD
Date of Event On request (2 days) – just send an email. As well possible to organize it in your company, if enough participants are interested in.
Language English

9:00 am – 5:00 pm Workshop incl. joint lunch
5:00 – open end Apéro Riche & Networking
Amar Singh will be onsite for Q&A

This vendor-independent workshop provides you

It is essential to train & educate your team on the most relevant network threats and how hackers exploit vulnerabilities to successfully launch their attacks.

This two day course is based on evidential information about cyber security attacks facing various organisations today and on our experience and interaction with our clients and other industry attack victims.

This course is delivered by a deeply experienced senior leader and trainer who has extensive knowledge and expertise to manage and deliver a successful workshop.

All attendees should have basic understanding of information technology and must be able to understand the course content from a basic technology point of view.

Delegates will learn and understand

  • Review the current threat landscape and cover the common attack vectors hackers are exploiting
  • Analyse recent known and unknown cyber attacks and dive into the technical details on how they avoided detection
  • Review the basic application of incident triage, OODA and the Diamond Methodology and deep dive into the Cyber Kill Chain
  • Understand the role log management plays in network based attacks followed by a review of the most common log types and log sources in an organisation
  • Deep dive into some of the most relevant attack scenarios – analysing each attack with a technical and business focus
  • Help attendees understand the critical role that vulnerability management and penetration testing play in understanding network based attacks
  • Understand how to deal with emerging
    attack techniques and vulnerabilities relevant to the network and business environment
  • Produce a profile of attackers and their motivations, and their capabilities
  • Identify and review results of current state of existing controls. This will include controls such as
    SIEM, Identity and access management, logging and monitoring and other relevant controls
  • Analyse recent attacks and learn how these attacks avoided detection
  • Learn about security incident orchestration and how it can help reduce your time to respond and reduce human error
  • Learn how to automate critical incident response tasks to increase employee efficiency
  • Learn how to run effective table top exercises with management and your technical teams
  • Learn how to assess your organisations breach readiness


Triage, Detection & Monitoring

  • OODA
  • Triage
  • Diamond Methodology
  • Logging
  • SIEM
  • Log Management
  • Log Types
  • Deception Technology
  • Visibility
  • Cyber Kill Chain

Attackers & Motivations

  • Types of Attackers
  • Privileges Insider
  • Types of Attack motivations
  • Impact of Actions
  • Attack Vectors

Define Normal

  • Taxonomy
  • Processes
  • People
  • Technology

Attack Manifestation & Scenarios

  • Active Directory based attacks & the Privileged User
  • LAN Based Attacks
  • DDoS & DoS
  • DNS
  • Advanced Persistent Threats

Further information you can find here

Workshop Participant Fee
Fr. 1950.— (including workshop material, lunch, beverages and apéro riche afterwards)

Special: money back guarantee if you are not really satisfied with this workshop

If you are interested in this workshop, just send us an email and we will contact you as soon as possible.

Cancellations of registration are free of charge until 30 days before. Cancellations received beyond this point will incur 100% of the admission fee. You will get an invoice for the respective amount. In any case, however, a delegate may be sent at no additional costs.

Event Partner

For further testimonials please check videos below

Testimonials from CIPR Workshop
Excellent workshop with a lot of good hints, not only for security staff, but also for management in order to understand the nature of attacks and the mitigation of vulnerabilities in order to reduce the impact during an incident.

The expectation was exceeded, especially the examples from incidents and hits.

Claudia Zeuren, IT Security Expert at UBS CardCenter