cybersecurity
education
€ EUR
  • $ USD
  • € EUR

About

Cyber attackers are getting smarter at hiding in plain sight. How do you spot threats that don’t want to be found? In this live webinar, our experts will share practical strategies and proven approaches that help security teams uncover hidden dangers and respond with confidence.

Join Paula Januszkiewicz and Amr Thabet, internationally recognized cybersecurity Experts, as they bring their unique experience and frontline knowledge to guide you through real-world challenges in threat hunting and incident response.

Agenda

The tools you trust can become the weapons they use! We will break down how attackers use PowerShell to maintain long-term access to compromised systems. You’ll learn their common techniques, why they’re so effective, and how to detect them in your environment.

In this session, we’ll cover:

  • PowerShell persistence mechanisms – Discover how malware exploits PowerShell’s built-in features to establish and maintain long-term access to compromised systems.
  • Cross-technique attack patterns – Understand why these same persistence methods are repurposed for privilege escalation, lateral movement, and credential theft across your network.
  • Baseline normal activity – Learn how to establish your environment’s unique “heartbeat” so anomalies stand out clearly instead of drowning in noise.
  • Spot rare and suspicious events – Identify low-frequency indicators like unusual logon types, off-hours authentication, administrators accessing unexpected workstations, and service accounts behaving outside their normal patterns.
  • Correlate across data sources – Connect the dots between endpoint process creation, network connections, and identity events to reveal hidden attack paths that look like routine IT work.
  • Forensic triage techniques – Apply rapid validation methods including memory inspection for injected code, registry analysis for hijacked keys, and Active Directory auditing for suspicious replication or shadow credentials.

 

Get ready for practical takeaways:
Threat hunting is about mindset + methodology, not just tools.
Focus on what attackers must do to succeed (move, escalate, persist).
Build detection logic around behavioral anchors instead of static signatures.

 

Why Attend? 

💬Live Q&A – ask Paula and Amr about PowerShell and privilege escalation right after the webinar.

🙌 Hands-on demonstrations – see real-world examples of the most effective threat hunting and incident response techniques.

🎁Challenge – win awesome prizes during our live cybersecurity challenge!

Join our live webinar and upgrade your knowledge with top industry minds!

Delivered by renowned cybersecurity experts, who work on the frontlines of the cybersecurity industry and will share practical strategies and proven approaches that help security teams uncover hidden dangers and respond with confidence. As we approach 2026, enter it equipped with the latest cybersecurity insights! 

Paula Januszkiewicz - Cybersecurity Expert CQ

Paula

Januszkiewicz

Founder & CEO, Microsoft Regional Director, MVP, MCT

Paula is a world-class Cybersecurity Expert with over 20 years of experience in the field. She is often a top-rated speaker at the world biggest conferences as her unique stage presence is always well-received among diverse audiences. To top it all, she has the access to the source code of Windows!

Amr

Thabet

Cybersecurity Expert

Amr is a malware researcher and incident handler with over 12 years of experience, he worked in some of the Fortune 500 companies. He is the author of “Mastering Malware Analysis”.

How can we help you?

Suggested searches

    Search history

      Popular searches:

      Not sure what course to look for?

      Mobile Newsletter Form