Your organization’s leadership is 12 times more likely to be the target of a security incident and nine times more likely to be the target of a data breach than they were last year. Find out how they can be protected.
Read the Datasheet
Gift Cardsharks: The Massive Threat Campaigns Circling Beneath the Surface
Learn about the attack group primarily targeting gift card retailers and the monetization techniques they use.
Get the Report
Threat Hunting Workshop Series
Join one of our security threat hunting workshops to get hands-on experience investigating and remediating threats.
Attend an Upcoming Workshop
Inside Magecart: New RiskIQ & Flashpoint Research Report
Learn about the groups and criminal underworld behind the front-page breaches.
Rackspace Accelerates External Digital Threat Investigation with RiskIQ PassiveTotal
Download Case Study
Threat Hunting Guide: 3 Must-Haves for the Effective Modern Threat Hunter
The threat hunting landscape is constantly evolving. Learn the techniques, tactics, and tools needed to become a highly-effective threat hunter.
London, UK - February 12, 201912:00 - 18:00
The event has reached capacity and registration is now closed. Visit our Threat Hunting Workshop main page to learn about more upcoming workshops.
Join RiskIQ for this threat hunting training workshop with all new use cases an exercises for 2019, designed to introduce security analysts, incident responders and SOC personnel to new methods and new threat datasets that let you investigate attacks more quickly and thoroughly. The class includes many hands-on exercises, where you will have the opportunity to learn more about recent security threats, leveraging partner solutions to shed light on the adversary’s infrastructure. They will also conduct their own investigations to uncover additional threat infrastructure.
As much as hackers change their tactics, they can’t avoid interacting with core components of the internet. The more threat datasets at your disposal, the fewer places they can hide. The session will expand beyond the basic threat investigations, showing you to view the specific details about the attacker. Attendees will also gain access to their organization’s own global web footprint or attack surface. A very useful snapshot to bring back to your blue team folks.
*Certificates for completion are distributed for attending the entire workshop
London and Partners
2 More Riverside
London SE1 2RR
Click for directions