Are You a Cyber Threat Hunter? Join the Secureworks® RSA Scavenger HuntAll clues lead to RSA. By: Natasha Bishop, Director, Influencer and Content Marketing
Updated May 23, 2022
Calling all RSA 2022 attendees! We are excited to launch the Secureworks® RSA Scavenger Hunt leading up to this year’s conference in San Francisco. Starting May 9 and continuing through June 6, follow along on our social channels (Twitter; LinkedIn) and participate in our challenge geared toward equipping you with the tools to Beat the Threat Before It’s a Threat. As you complete threat hunting tasks, document your journey by sharing the completed task on social with the hashtag #SCWXBeatTheThreat. All RSA attendees who participate in the Scavenger Hunt and share their threat hunting journey will have the opportunity to win special prizes at the conference.
Threat Hunting Task 1, Week of May 9: Test your knowledge on threat actors and vote in the social media poll on our LinkedIn and Twitter channels! Comment on the poll with the hashtag #SCWXBeatTheThreat to check off this threat hunting task.
Get a sneak peek at what you might be tested on in our Incident Response Report.
Which of these tactics is most commonly used by threat actors?
(Check your answer: Incident Response Report)
Threat Hunting Task 2, Week of May 16: Download the State of the Threat Report, take a photo or screen shot of your download, share on social media, tag us @Secureworks, and use the hashtag #SCWXBeatTheThreat.
Ransomware. Supply-chain exploits. Zero-day attacks. Cryptojacking. Cyber threats have taken over — and they show no sign of stopping. The State of the Threat Report provides you with insights on the threat landscape and insights on securing your most valuable business assets.
Threat Hunting Task 3, Week of May 23: Download The Long Road Ahead to Ransomware Preparedness eBook, share a photo of how you are reading the report (comfy on your couch or studious at your desk?), tag us @Secureworks, and use the hashtag #SCWXBeatTheThreat.
There’s no question why the threat of ransomware is top-of-mind for many organizations; however, few feel completly prepared for an attack when it hits. This eBook connects the dots between organizations that feel most prepared and the specific strategies and plans used to get there, with an eye on defining best practices.