Loading Events
Find Events

Event Views Navigation

Events for May 18, 2019

Day Navigation

8:30 am

ISSA-COS Mini Seminar May 2019

May 18 @ 8:30 am - 12:00 pm
College America, 2020 North Academy Blvd
Colorado Springs, CO 80909 United States

The Colorado Springs Chapter of ISSA is hosting a Free Mini-Seminar for CPE/CEUs Register HERE! Free Mini-Seminar for CPE/CEUs  Want to gain knowledge on something new? Want to brush up, get a refresher, on something you may already know? Want to earn a few continuing education units (e.g. CPE/CEUs)? Join us at our next ISSA Colorado Springs mini-seminar! Join the discussion and share your knowledge, thoughts, and perspectives.  Part 1: Technical Presentation  Guest Speaker: Jack Callaghan  Topic: Threat Intelligence: The Humans, The SIEMs, and the Analytics Abstract:  The landscape of SOC .vs. Threat has become a game of brinksmanship and 7/24 risk. In the past 8 years as the stakes continue to escalate, tactics are the pivotal point. It’s no longer sufficient to have effective defense against attackers, it has become essential to characterize the threat sources as they have characterized us as targets. This presentation analyzes the integration of tools, data resources, and human intuition to assess, weigh and plan responses to insure resources remain secure. Layout:  A baseline of SIEM, IPS, and defensive tools; and their part in the integration  A discussion, history, and assessment of Threat Intel as it applies to general and vertical targets  The process of focusing human logic and specific business/mission insights to combine these elements to field and effective force Focusing on:  Key application of software and appliances to field defensive applications  A review of the genesis of threat intel, commoditization, and proper application-to-need  Managing defenses, staffing, and provisioning based on enterprise/mission objectives  Creating routine hunting tactics to monitor your environment  Scheduling and maintaining defenses focusing on threat intel  Applying human analytics to integrate the three key elements An additional discussion, of building an in-expensive distributed micro-threat analysis cluster, based on raspberry PI technology, will be addressed if time allows. Part 2: The DIY Cyber Toolkit Speakers: Mark Heinrich, Dennis Schorn Topic: Hands On with Metasploit Abstract: Metasploit is one of the most powerful applications for exploiting cyber weaknesses. It has dozens of tools that have been used to hack into target networks. Some of the top ones will be introduced. If you are bringing your laptop, be sure it has the following software and configuration (or something approximating this, assuming you have a Windows operating system): A backed up Windows systemA recent version of Oracle's VirtualBox virtual machine applicationA VirtualBox machine consisting of a recent version of Kali Linux (don't forget the root password)The Kali virtual machine (the guest) and the Windows machine (the host) configured to converse with each other on the "bridged adapter" in the Kali network set up.  More technical info will be published on the ISSA-COS website soon. This is a great training opportunity for those wanting to broaden their knowledge or need CPE/CEUs to maintain their existing certifications. It’s also a great opportunity to share your knowledge and experience with other members of our Chapter, and gain experience as a speaker by volunteering to be one of our presenters. *Notice of Photo and Video Recording: During this event, photos and filming by staff may take place. By entering, you grant ISSA-COS the right to use these photos and video for internal and/or promotional materials. Thank you!  If you have any questions, contact our Training Committee leads at: Training@ISSA-COS.org. Register HERE!

Find out more »
+ Export Events