BEGIN:VCALENDAR
VERSION:2.0
CALSCALE:GREGORIAN
PRODID:adamgibbons/ics
METHOD:PUBLISH
X-PUBLISHED-TTL:PT1H
BEGIN:VEVENT
UID:200@akce.cyberladies.cz
SUMMARY:Training: Proactive Defense Against Cyber Operations by China and R
	ussia
DTSTAMP:20260511T213727Z
DTSTART:20260528T063000Z
DTEND:20260528T140000Z
DESCRIPTION:https://dcg420.org/activities/trainings/cti-hunt-det-workshop/\
	n[https://dcg420.org/activities/trainings/cti-hunt-det-workshop/]\n\nThe t
	raining is free and in Czech language.\n\nThis workshop combines cyber thr
	eat intelligence (CTI) with practical external\nthreat hunting (External H
	unt) to enhance intelligence and apply it within\ndetection engineering (D
	etection) to prevent potential attacks. It provides a\ncomprehensive overv
	iew of the activities of state-sponsored actors and equips\nparticipants w
	ith the analytical and practical skills needed to detect and track\nthem.\
	n\nSchedule:\n\n 1. Cyber Operations by China and Russia: Analysis of APT 
	Actors and the Basics\n    of Attribution (Trained by Cybule.cz [http://Cy
	bule.cz])\n\n 2. External Threat Hunting – Unmasking Adversary Infrastruct
	ure (Trained by\n    DCG420.org [http://DCG420.org])\n\n 3. Forge Your Det
	ection Against Advanced Threats (Trained by DCG420.org\n    [http://DCG420
	.org])
URL:https://akce.cyberladies.cz/event/training-proactive-defense-against-cy
	ber-operations-by-china-and-russia
GEO:50.0480548;14.4575808
LOCATION:Microsoft\, Praha - Microsoft\, Vyskočilova\, Michle\, Praha\, obv
	od Praha 4\, Hlavní město Praha\, Praha\, 140 21\, Česko
STATUS:CONFIRMED
CATEGORIES:Praha,cybersecurity,czech,in-person
X-ALT-DESC;FMTTYPE=text/html:<p><a target="_blank" href="https://dcg420.org
	/activities/trainings/cti-hunt-det-workshop/">https://dcg420.org/activitie
	s/trainings/cti-hunt-det-workshop/</a></p><p>The training is free and in C
	zech language.</p><p>This workshop combines cyber threat intelligence (CTI
	) with practical external threat hunting (External Hunt) to enhance intell
	igence and apply it within detection engineering (Detection) to prevent po
	tential attacks. It provides a comprehensive overview of the activities of
	 state-sponsored actors and equips participants with the analytical and pr
	actical skills needed to detect and track them.</p><p>Schedule:</p><ol><li
	><p>Cyber Operations by China and Russia: Analysis of APT Actors and the B
	asics of Attribution (Trained by <a target="_blank" href="http://Cybule.cz
	">Cybule.cz</a>)</p></li><li><p>External Threat Hunting – Unmasking Advers
	ary Infrastructure (Trained by <a target="_blank" href="http://DCG420.org"
	>DCG420.org</a>)</p></li><li><p>Forge Your Detection Against Advanced Thre
	ats (Trained by <a target="_blank" href="http://DCG420.org">DCG420.org</a>
	)</p></li></ol>
BEGIN:VALARM
ACTION:DISPLAY
DESCRIPTION:Training: Proactive Defense Against Cyber Operations by China a
	nd Russia
TRIGGER:-PT1H
END:VALARM
END:VEVENT
END:VCALENDAR
