Loading Events

« All Events

  • This event has passed.

ISSA-COS Mini Seminar May 2019

May 18 @ 8:30 am - 12:00 pm

The Colorado Springs Chapter of ISSA is hosting a Free Mini-Seminar for CPE/CEUs

Register HERE!

Free Mini-Seminar for CPE/CEUs 
Want to gain knowledge on something new? Want to brush up, get a refresher, on something you may already know? Want to earn a few continuing education units (e.g. CPE/CEUs)? Join us at our next ISSA Colorado Springs mini-seminar! Join the discussion and share your knowledge, thoughts, and perspectives. 
Part 1: Technical Presentation 
Guest Speaker: Jack Callaghan 
Topic: Threat Intelligence: The Humans, The SIEMs, and the Analytics

Abstract: 
The landscape of SOC .vs. Threat has become a game of brinksmanship and 7/24 risk. In the past 8 years as the stakes continue to escalate, tactics are the pivotal point.

It’s no longer sufficient to have effective defense against attackers, it has become essential to characterize the threat sources as they have characterized us as targets.

This presentation analyzes the integration of tools, data resources, and human intuition to assess, weigh and plan responses to insure resources remain secure.

Layout: 
A baseline of SIEM, IPS, and defensive tools; and their part in the integration 
A discussion, history, and assessment of Threat Intel as it applies to general and vertical targets 
The process of focusing human logic and specific business/mission insights to combine these elements to field and effective force

Focusing on: 
Key application of software and appliances to field defensive applications 
A review of the genesis of threat intel, commoditization, and proper application-to-need 
Managing defenses, staffing, and provisioning based on enterprise/mission objectives 
Creating routine hunting tactics to monitor your environment 
Scheduling and maintaining defenses focusing on threat intel 
Applying human analytics to integrate the three key elements

An additional discussion, of building an in-expensive distributed micro-threat analysis cluster, based on raspberry PI technology, will be addressed if time allows.

Part 2: The DIY Cyber Toolkit

Speakers: Mark Heinrich, Dennis Schorn
Topic: Hands On with Metasploit

Abstract:
Metasploit is one of the most powerful applications for exploiting cyber weaknesses. It has dozens of tools that have been used to hack into target networks. Some of the top ones will be introduced.

If you are bringing your laptop, be sure it has the following software and configuration (or something approximating this, assuming you have a Windows operating system):

A backed up Windows systemA recent version of Oracle’s VirtualBox virtual machine applicationA VirtualBox machine consisting of a recent version of Kali Linux (don’t forget the root password)The Kali virtual machine (the guest) and the Windows machine (the host) configured to converse with each other on the “bridged adapter” in the Kali network set up. 
More technical info will be published on the ISSA-COS website soon.

This is a great training opportunity for those wanting to broaden their knowledge or need CPE/CEUs to maintain their existing certifications. It’s also a great opportunity to share your knowledge and experience with other members of our Chapter, and gain experience as a speaker by volunteering to be one of our presenters.

*Notice of Photo and Video Recording: During this event, photos and filming by staff may take place. By entering, you grant ISSA-COS the right to use these photos and video for internal and/or promotional materials. Thank you! 
If you have any questions, contact our Training Committee leads at: Training@ISSA-COS.org.

Register HERE!

Details

Date:
May 18
Time:
8:30 am - 12:00 pm

Venue

College America
2020 North Academy Blvd
Colorado Springs, CO 80909 United States
+ Google Map