#1724077: Living off the Land (LOTL): An Intrusion Technique Overview (SS130) - February 26, 2026
| Description: |
Agenda The Cybersecurity and Infrastructure Security Agency (CISA) is proud to offer the Securing Systems Training awareness webinar, Living off the Land (LOTL): An Intrusion Technique Overview from 11 a.m. to noon ET. We are excited to share this information with stakeholders across the Federal enterprise and nationally. This webinar is intended for beginning cybersecurity professionals (non-technical) who want to learn more about advanced persistent threats including how to identify and mitigate their associated activities. Native, everyday tools and processes used by organizations are subsequently being used by adversaries to blend in with normal system activities and discretely carry out attacks. The purpose of this training is to provide an overview of Living Off the Land (LOTL) methods and show how cybersecurity managers can utilize key zero trust principles during the detect and mitigation activities. By incorporating CISA’s guidance on LOTL techniques, this webinar will enhance participants’ understanding and ability to identify and mitigate LOTL techniques, ultimately leading to a more secure network. This webinar includes the following information and more: • Common attack methods: Identify common LOTL techniques and tools that are currently being used. • Key Guidance for organizations: Introduce Zero Trust principles for detecting and mitigating LOTL attacks resources and tools that enable organizations and individuals to use log analysis to query for threat activity including Security Information and Event Management (SIEM), Endpoint Detection and Response (EDR), and using Active Directory and PowerShell to run scripts. • CISA Guidance: Review the areas highlighted from the Joint Guidance: Identifying and Mitigating Living Off the Land Techniques. • Case studies: Discuss the People’s Republic of China Volt Typhoon campaign highlighting the tools used, how full domain compromise was obtained, and persistence over exploitation. • Knowledge check: The course concludes with a brief knowledge check section to reinforce key concepts and takeaways. |
|---|---|
| More info: | https://cisa.webex.com/webappng/sites/cisa/meeting/register/3fb9cb52c6dc41319bad67b7399b6fe4?ticket=4832534b00000006f9788f0aee2ef822d32f1c220f429906eb770512f2d5d022bced0f2f14988074×tamp=1770909484164&RGID=rbc8bb479b2e1919ffa940c14c31002ce&isAutoPopRegisterForm=false |
| Date added | Feb. 12, 2026, 4:20 p.m. |
|---|---|
| Source | Webex |
| Subjects | |
| Venue | Feb. 26, 2026, midnight - Feb. 26, 2026, midnight |
