{"id":752,"date":"2022-09-23T22:47:10","date_gmt":"2022-09-23T20:47:10","guid":{"rendered":"https:\/\/scpo-cybersecurityassociation.com\/?p=752"},"modified":"2022-09-24T00:31:32","modified_gmt":"2022-09-23T22:31:32","slug":"29-09-2022-workshop-tracking-cyber-threats","status":"publish","type":"post","link":"https:\/\/scpo-cybersecurityassociation.com\/index.php\/2022\/09\/23\/29-09-2022-workshop-tracking-cyber-threats\/","title":{"rendered":"29.09.2022: Workshop &#8211; Tracking Cyber Threats"},"content":{"rendered":"\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"489\" src=\"https:\/\/scpo-cybersecurityassociation.com\/wp-content\/uploads\/2022\/09\/1663778685973-1024x489.jpeg\" alt=\"\" class=\"wp-image-757\" srcset=\"https:\/\/scpo-cybersecurityassociation.com\/wp-content\/uploads\/2022\/09\/1663778685973-1024x489.jpeg 1024w, https:\/\/scpo-cybersecurityassociation.com\/wp-content\/uploads\/2022\/09\/1663778685973-300x143.jpeg 300w, https:\/\/scpo-cybersecurityassociation.com\/wp-content\/uploads\/2022\/09\/1663778685973-768x367.jpeg 768w, https:\/\/scpo-cybersecurityassociation.com\/wp-content\/uploads\/2022\/09\/1663778685973.jpeg 1256w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p><\/p>\n\n\n\n<p><strong>On September 29th, SCA will receive F\u00e9lix Aim\u00e9 for a practical workshop&nbsp;focusing on tracking cyber&nbsp;threats.<\/strong> \ud83d\udc7e\ud83d\udd0d<\/p>\n\n\n\n<p>On the agenda:<br>&#8211; Who are the attackers, how do they organize themselves, what are their motivations?<br>&#8211; How does an attack happen today, what are the compromising vectors?<br>&#8211; There are more and more attacks, but we see few, why?<br>&#8211; How to investigate and correlate attacks?<br>&#8211; How to make an attribution?<\/p>\n\n\n\n<p>F\u00e9lix Aim\u00e9 is a recognized Threat Intelligence and cybersecurity researcher. He is a former pentester and former member of the Global Research &amp; Analysis Team (GReAT) of Kaspersky. Since 2021, he works at&nbsp;<a href=\"https:\/\/www.linkedin.com\/company\/sekoia\/\">SEKOIA.IO<\/a>&nbsp;in France to increase its threat intelligence&nbsp;capacities with training courses, investigations and software development.<\/p>\n\n\n\n<p>Registration here:&nbsp;<a href=\"https:\/\/lnkd.in\/epkW4upS\">https:\/\/lnkd.in\/epkW4upS<\/a><\/p>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>On September 29th, SCA will receive F\u00e9lix Aim\u00e9 for a practical workshop&nbsp;focusing on tracking cyber&nbsp;threats. \ud83d\udc7e\ud83d\udd0d On the agenda:&#8211; Who are the attackers, how do they organize themselves, what are their motivations?&#8211; How does an attack happen today, what are the compromising vectors?&#8211; There are more and more attacks, but we see few, why?&#8211; How [&hellip;]<\/p>\n","protected":false},"author":7,"featured_media":760,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4],"tags":[],"class_list":["post-752","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-events"],"_links":{"self":[{"href":"https:\/\/scpo-cybersecurityassociation.com\/index.php\/wp-json\/wp\/v2\/posts\/752","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/scpo-cybersecurityassociation.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/scpo-cybersecurityassociation.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/scpo-cybersecurityassociation.com\/index.php\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/scpo-cybersecurityassociation.com\/index.php\/wp-json\/wp\/v2\/comments?post=752"}],"version-history":[{"count":4,"href":"https:\/\/scpo-cybersecurityassociation.com\/index.php\/wp-json\/wp\/v2\/posts\/752\/revisions"}],"predecessor-version":[{"id":764,"href":"https:\/\/scpo-cybersecurityassociation.com\/index.php\/wp-json\/wp\/v2\/posts\/752\/revisions\/764"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/scpo-cybersecurityassociation.com\/index.php\/wp-json\/wp\/v2\/media\/760"}],"wp:attachment":[{"href":"https:\/\/scpo-cybersecurityassociation.com\/index.php\/wp-json\/wp\/v2\/media?parent=752"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/scpo-cybersecurityassociation.com\/index.php\/wp-json\/wp\/v2\/categories?post=752"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/scpo-cybersecurityassociation.com\/index.php\/wp-json\/wp\/v2\/tags?post=752"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}