Register for the Workshop
Register to watch on-demand
Can't see the form?

We noticed you may not be able to see our form. This occurs when privacy tools (which we fully support) block third-party scripts.

Firefox users:

Click the shield icon in your address bar → "Turn off Tracking Protection for this site"

Chrome with privacy extensions:

Temporarily allow this site in your ad blocker or privacy extension settings

Prefer not to change settings?

Email us directly at support@vectra.ai or info@vectra.ai


We use HubSpot forms for functionality, not tracking. Your privacy matters to us—that's why we're giving you these options.

Thank you for registering!
We've received your request and will get back to you soon.

If you do not hear from us in the next 48 hours, please check your spam folder!
Back to homepage
Webinar
On-demand Webinar
Webinar
On-demand Webinar

Vectra AI Attack Labs: Understanding Modern Attacks (3-episode series)

Join Vectra AI for a three-part Attack Lab that breaks down modern attacks into three 30-minute digestible sessions. Our threat hunters and incident responders will walk through how adversaries enter, hide, and move inside enterprise networks — using real-world attack patterns, live demos, and threat hunting playbooks you can apply immediately.

November 20, 2025
December 10, 2025
January 21, 2026
Hosted in
English

Summary

Episode 1: Initial Access - How do attackers get in the network?

November 20, 2025 at 11:00 AM EST, 11:00 AM CET, or 11:00 AM SGT

How do attackers get in? We’ll dissect the most common entry vectors — phishing, credential compromise, exposed services, supply-chain and attacker tooling — and demonstrate how each leaves subtle signals in network and cloud telemetry. Learn practical detection strategies, prioritized alerts that matter, and the earliest containment steps to stop a breach before it escalates.

Episode 2: Persistence - How do attackers hide in the network?

December 10, 2025 at 11:00 AM EST, 11:00 AM CET, or 11:00 AM SGT

How do attackers stay hidden? We’ll show the techniques adversaries use to establish long-term footholds — stealthy implants, living-off-the-land techniques, scheduled tasks and covert accounts — and how to surface persistence with behavior-based analytics. Walk away with playbooks for threat hunting, evidence collection, and removing persistence while eliminating blind spots.

Episode 3: Lateral Movement - How do attackers move in the network?

January 21, 2026 at 11:00 AM EST, 11:00 AM CET, or 11:00 AM SGT

How do attackers move through the network? See how attackers pivot, escalate privileges, and harvest data across hosts and clouds. Through this lab we’ll map attacker paths, highlight cross-environment indicators, and demonstrate rapid triage and containment techniques to reduce blast radius and accelerate remediation.

What to expect

  • Concise, analyst-led briefings with real world examples.
  • Actionable detection patterns and hunting queries you can run immediately.
  • Real incident playbooks: from detection → investigation → containment → remediation.
  • Q&A with Vectra threat hunters and product experts.

Who should attend: security operations, threat hunters, SOC managers, incident responders, and CISOs who need pragmatic, hands-on techniques to find and stop modern adversaries.

Short, practical, and tactical — this Attack Lab gives your team the playbooks and signals to find attackers earlier and reduce investigation time.

Share

Speakers

Lucie Cardiet
Host
Cyberthreat Research Manager
Vectra AI

FAQs

About Vectra AI

Vectra AI is the leader in hybrid attack detection, investigation and response. The Vectra AI Platform delivers integrated signal across public cloud, SaaS, identity, and data center networks in a single platform. Vectra AI’s patented Attack Signal Intelligence empowers security teams to rapidly detect, prioritize, investigate and stop the most advanced hybrid cyber-attacks. With 35 patents in AI-driven detection and the most vendor references in MITRE D3FEND, organizations worldwide rely on the Vectra AI Platform and MXDR services to move at the speed and scale of hybrid attackers. For more information, visit www.vectra.ai.