BEGIN:VCALENDAR
VERSION:2.0
PRODID:-// - ECPv6.15.20//NONSGML v1.0//EN
CALSCALE:GREGORIAN
METHOD:PUBLISH
X-ORIGINAL-URL:https://synapsefl.com
X-WR-CALDESC:Events for 
REFRESH-INTERVAL;VALUE=DURATION:PT1H
X-Robots-Tag:noindex
X-PUBLISHED-TTL:PT1H
BEGIN:VTIMEZONE
TZID:America/New_York
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20240310T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20241103T060000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20250309T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20251102T060000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20260308T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20261101T060000
END:STANDARD
END:VTIMEZONE
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20250822T100000
DTEND;TZID=America/New_York:20250822T110000
DTSTAMP:20260502T063048
CREATED:20250714T225946Z
LAST-MODIFIED:20250822T024517Z
UID:358642-1755856800-1755860400@synapsefl.com
SUMMARY:Red Team Blue Team Strategies
DESCRIPTION:Explore the offensive tactics of Red Teams\, the defensive strategies of Blue Teams\, and the critical role of collaboration in Purple Teaming\n\n\nCybersecurity is a constant battle between attackers and defenders. Understanding the strategies used on both sides is key to strengthening an organization’s security posture. This webinar will explore the offensive tactics of Red Teams\, the defensive strategies of Blue Teams\, and the critical role of collaboration in Purple Teaming. \n \nWhat You’ll Learn: \n \n\nThe distinct roles and methodologies of Red and Blue Teams\nAttack simulation\, evasion techniques\, and adversary emulation\nDefensive strategies\, including SIEM\, threat hunting\, and incident response\nCommon tactics used by both attackers and defenders\nHow Purple Teaming fosters stronger security through collaboration\nReal-world case studies and practical applications\n\n \nMeet Our Guest Speaker: \nAaron Moss is a Senior Consultant for Secure Ideas. With almost 20 years in various technical roles ranging from Helpdesk to IT Consultant to Director of IT Operations\, he has expertise in multiple areas and disciplines. He particularly enjoys network pentesting\, an area he specializes in. Aaron is also excited to be one of the co-founders and organizers for Oklahoma’s largest Information Security/Hacker conference\, BSides Oklahoma. \n \nWho Should Attend: \n\nCybersecurity professionals looking to expand their offensive and defensive knowledge\nIT and security teams aiming to strengthen their organization’s defenses\nRed and Blue Team members interested in improving their strategies\nAnyone eager to understand the adversarial mindset in cybersecurity\n\nGain a deeper understanding of attack and defense strategies in cybersecurity. Register now to join the discussion. \n \nThe views expressed by our guest speakers are their own and do not necessarily represent the opinions of Computer Coach or its affiliates. \nRecorded events will be added to our blog soon.
URL:https://synapsefl.com/communitycalendar/red-team-blue-team-strategies/
ATTACH;FMTTYPE=image/jpeg:https://synapsefl.com/wp-content/uploads/2025/07/35ddba485c524158d9754aa447a5d98a.jpg
END:VEVENT
END:VCALENDAR