Webcast World Tour: Arizona Cyber Warfare Range
This week we went down to Phoenix Arizona where we teamed up with the Arizona Cyber Warfare Range (AZCWR) for a great event at Grand Canyon University! Black Hills Information […]
This week we went down to Phoenix Arizona where we teamed up with the Arizona Cyber Warfare Range (AZCWR) for a great event at Grand Canyon University! Black Hills Information […]
This is the in-studio version of our live in DC event from July. In this webcast, John covers how to set up Active Directory Active Defense (ADAD) using tools in […]
John Strand// Hello all in Arizona! Just wanted to let you know that I am coming down for SANS Mesa: https://www.sans.org/event/phoenix-mesa-2017/course/hacker-techniques-exploits-incident-handling And, I will be doing an evening talk at […]
John Strand // New to InfoSec? Mentoring someone new to the industry? Here’s John’s advice if he had to do it all over again. Sierra is on replying to your […]
John Strand // In this webcast John covers how to set up Active Directory Active Defense (ADAD) using tools in Active Defense Harbinger Distribution (ADHD) and talks about potential active […]
John Strand // In this webcast, we walk through different tools to establish and test your Command and Control (C2) detection capabilities. Why does this matter? Almost all organizations we […]
John Strand// We just finished up a walk through of how we bypassed Cylance in a previous engagement. To conclude this exciting week, I want to share a few comments […]
John Strand // It’s odd, we try to push security forward through standards like NIST, the Critical Controls, and PCI, but most organizations strive to meet the bare minimum required […]
John Strand // Want to get started on a hunt team and discover “bad things” on your network? In this webcast, we will walk through the installation and usage of […]