Mike Felch and Beau Bullock// Cryptocurrency conversations are everywhere you look! Mike Felch and Beau Bullock were so interested they started their own podcast about the topic. We’re excited to have them do a webcast for us and share the research they’ve been doing. Join us as we discuss specifically the security issues swirling around […]
John Strand// Here’s a live demo of John’s recent blog post that talked about gamifying your table top Dungeon and Dragons style. Join John, Kent, Jordan and Sierra as they demo this fun way to make sure your team is trained and ready with procedures in place to handle future incidents. Printable version of […]
John Strand// Thanks for joining us for our Cubicles and Compromises webcast! We also have a recording available soon! Here you’ll find the printable version: https://www.dropbox.com/s/ywftz6m6pflx6cw/Cubicles%20and%20Compromises%20Printable.pdf?dl=0 If you try this, let us know how it goes!
John Strand// It’s time for our annual anti virus bypass extravaganza. See why AV can’t be the end all be all solution to your security framework in 2018! And if you already know that but need to implement it? Invite your team! This is always a lot of fun! Slides available here: https://www.dropbox.com/s/96tkxyn4mif3syi/scct2018-Master.pptx?dl=0
Matthew Toussain// Portswigger’s Burpsuite has become the tool of choice for web application penetration testers. OWASP’s Zed Attack Proxy (ZAP) not only fights in the same weight class but also serves as the formative web security testing system for many of those new to the field. For organizations seeking to replicate the results of a […]
John Strand// In this webcast John talks about the new ACDC law and what it means exactly. There has been quite a bit of anger and great GIFs about hacking back and the law so he thought it would be a good idea to actually walk through it and point out a few of its […]
Lidia Giuliano//* The endpoint protection space is a hot market. With statistics showing malware creation ranging from 300,000 to a million pieces a day, traditional signatures just can’t keep up. As corporations look into strengthening their endpoint defenses, focus on actual business problems can often be clouded and confused by marketing hype. Join special guest […]
John Strand// As part of the BHIS Webcast World Tour, we held a live event at the newly opened Arizona Cyber Warfare Range (AZCWR) in Phoenix AZ. To read about and see photos from the event: https://www.blackhillsinfosec.com/webcast-world-tour-arizona-cyber-warfare-range/ In this talk, we will cover math, social engineering, Dave Kennedy, open source software, Chris Nickerson, the time I […]