SO-CON 2025

The Shortest Path to Secure

Conference: March 31 – April 1, 2025
Training: April 2 – April 5, 2025
Location: Arlington, VA

REGISTRATION

Conference Tickets

Includes access to all in-person talks, evening social events, and more!

Are you a member of the U.S. Government or press?
Email socon@specterops.io for special rates on tickets.

Please read our Code of Conduct.

Looking to save more? Register for a training session below and get a free pass to the conference.

TRAININGS

Upgrade your skills by taking one of our four different courses.

Free Summit Pass Included

Engage with our Frontline Practitioners

Evening Social Events

This intense course immerses students in a single simulated enterprise environment, with multiple networks, hardened endpoints, modern defenses, and active network defenders responding to red team activities. We will focus on in-depth attacker tradecraft post-initial access; braking out of the beachhead, establishing resilient command and control (C2) infrastructure, gain situational awareness through opsec aware host and network enumerations, perform advanced lateral movement and sophisticated Active Directory escalation, gain persistence (userland, elevated, and domain flavors), and perform advanced Kerberos attacks, data mining, and exfiltration.

Register Now

In Adversary Tactics: Tradecraft Analysis, we will present and apply a general tradecraft analysis methodology for offensive TTPs, focused on Windows components. We will discuss Windows attack techniques and learn to deconstruct how they work underneath the hood. For various techniques, we will identify the layers of telemetry sources and learn to understand potential detection choke points. Finally, the course will culminate with students creating their own technique evasion and detection strategy. You will be able to use the knowledge gained to both use your telemetry to create robust detection coverage across your organization, and truly assess the efficacy of that coverage.

Register Now

This course builds on standard network defense and incident response (which often focuses on alerting for known malware signatures) by focusing on abnormal behaviors and the use of adversary Tactics, Techniques, and Procedures (TTPs). We will teach you how to engineer detections based on attacker TTPs to perform threat hunting operations and detect attacker activity. In addition, you will learn use utilize free and/or open source data collection and analysis tools (such as Sysmon, Windows Event Logs, and ELK) to analyze large amounts of host information and build detections for malicious activity. You will use the techniques and toolsets you learn to create threat hunting hypotheses and build robust detections in a simulated enterprise network undergoing active compromise from various types of threat actors.

Register Now

Get Your Head in the Clouds! This course will teach participants the fundamentals of Azure, with a focus on security informed by attacker insight. Participants will build on this knowledge through an understanding of how Azure architectures, like solely cloud-based environments or hybridized on-premises and Azure environments, can affect the overall security of an environment. Participants reinforce what they learn through hands-on labs throughout the course and through guidance given by SpecterOps practitioners instructing the class.

Register Now

Coming soon

Call for Papers (CFP)

We are excited to announce that the Call for Papers (CFP) will open on October 1, 2024.  This is your chance to share your insights, experiences, and innovations with a wider audience. Whether you’re a seasoned expert or a fresh voice in the industry, we want to hear from you!

Some suggested topics we would love to see:

  • Novel research featuring Attack Path Management
  • Applications of Attack Path Management within your environment
  • Attack Path Management Theory
  • Attack Path Mapping and Management
  • Identity Provider Attacks and Defenses (Active Directory, Entra ID, Okta, etc.)
  • Federated Identity Attack Paths and solutions
for managing attack paths across multiple identity providers
  • Exploring the potential of AI and ML for automating attack path discovery in offensive
and defensive applications
  • CI/CD Pipeline Security
  • SaaS Application Identity Models
  • Cookie/Session Theft Approaches
  • Anything else where you’ve done something interesting with Attack Path Management, but please no product pitches

SO-CON 2024 TALKS

Click on the titles to watch the complete talks on our YouTube channel. Each presentation offers valuable insights and practical knowledge from industry experts.

LOCATION

Questions? Email socon@specterops.io

Convene

1201 Wilson Blvd.

Arlington, VA 22209