Meet us @ RSAC 2022

Pre-book your meeting with a Red Canary expert and make it a show to remember.

  • Learn how we find threats no one else can
  • Set-up a custom MDR demo for your team
  • Discover what our powerful mission means for you
June 6–9, 2022 | SAN FRANCISCO

 
 
 

Pick up limited-edition RSA gear

Stop by and say hello and we’ll give you a limited-edition Red Canary shirt—among other surprises. Not registered yet? Use code 52EREDCANXP when you sign up to get a complimentary expo pass.

 

Register & plan your visit
 
 
Katie Nickels
Director of Intelligence, Red Canary
Join Katie and select panelists for "The Five Most Dangerous New Attack Techniques" on Wednesday, Feb. 9 @ 11:30 AM - 12:20 PM (PT). Get a briefing on the most dangerous new attack techniques in use today, what's coming next, and how you can prioritize upcoming attack vectors.
Join Katie and select panelists for "The Five Most Dangerous New Attack Techniques" on Wednesday, Feb. 9 @ 11:30 AM - 12:20 PM (PT). Get a briefing on the most dangerous new attack techniques in use today, what's coming next, and how you can prioritize upcoming attack vectors.
 
Adam Mashinchi
Director of Open-Source Programs, Red Canary
Join Adam for "Atomic Red Team: Where Adversary Emulation and EDR Testing Meet" on Feb. 10 at 2:10 PM (PT). This talk will review Atomic Red Team™, a library of simple, focused tests mapped to the MITRE ATT&CK® matrix. These adversary examples come with easy-to-use configuration and cleanup commands. Attendees will receive practical guidance on how to use and get started with testing, and offer additional resources to further their ability to validate defenses and defenders.
Join Adam for "Atomic Red Team: Where Adversary Emulation and EDR Testing Meet" on Feb. 10 at 2:10 PM (PT). This talk will review Atomic Red Team™, a library of simple, focused tests mapped to the MITRE ATT&CK® matrix. These adversary examples come with easy-to-use configuration and cleanup commands. Attendees will receive practical guidance on how to use and get started with testing, and offer additional resources to further their ability to validate defenses and defenders.