BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//Black Hills Information Security, Inc. - ECPv6.15.18//NONSGML v1.0//EN
CALSCALE:GREGORIAN
METHOD:PUBLISH
X-ORIGINAL-URL:https://www.blackhillsinfosec.com
X-WR-CALDESC:Events for Black Hills Information Security, Inc.
REFRESH-INTERVAL;VALUE=DURATION:PT1H
X-Robots-Tag:noindex
X-PUBLISHED-TTL:PT1H
BEGIN:VTIMEZONE
TZID:America/New_York
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20230312T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20231105T060000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20240310T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20241103T060000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20250309T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20251102T060000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20260308T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20261101T060000
END:STANDARD
END:VTIMEZONE
BEGIN:VTIMEZONE
TZID:America/New_York
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20220313T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20221106T060000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20230312T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20231105T060000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20240310T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20241103T060000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20250309T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20251102T060000
END:STANDARD
END:VTIMEZONE
BEGIN:VEVENT
DTSTART;VALUE=DATE:20250224
DTEND;VALUE=DATE:20250302
DTSTAMP:20260407T072910
CREATED:20241120T200017Z
LAST-MODIFIED:20241120T200017Z
UID:10001846-1740355200-1740873599@www.blackhillsinfosec.com
SUMMARY:RE//verse
DESCRIPTION:RE//verse is a premier reverse engineering\, vulnerability research and malware analysis conference. We offer trainings and talks from industry-leading experts. \nRE//verse is located in Orlando\, Florida at the Caribe Royale\, minutes away from Disney World. \nThe conference is hosted by Vector 35\, creators of Binary Ninja (though this is NOT a Binary Ninja conference!) in conjunction with the same organizer from Infiltrate. \nWe’re bringing a relaxed Florida vibe where you can connect and exchange ideas in a welcoming atmosphere. \n-Information from event site
URL:https://www.blackhillsinfosec.com/event/re-verse/
LOCATION:Caribe Royale Orlando\, 8101 World Center Drive\, Orlando\, FL\, 32821\, United States
CATEGORIES:Conference,Training
END:VEVENT
BEGIN:VEVENT
DTSTART;VALUE=DATE:20250204
DTEND;VALUE=DATE:20250206
DTSTAMP:20260407T072910
CREATED:20250115T160351Z
LAST-MODIFIED:20250115T160351Z
UID:10001867-1738627200-1738799999@www.blackhillsinfosec.com
SUMMARY:Wild West Hackin' Fest @ Mile High: Pre-Conference Training
DESCRIPTION:This NEW Denver Cybersecurity Conference is taking InfoSec to new heights in 2025! Join us for Wild West Hackin’ Fest @ Mile High: Pre-Conference Training! Conference and training tickets are now available.\nThe theme of Wild West Hackin’ Fest @ Mile High is Tools\, Techniques\, and Trailblazing!
URL:https://www.blackhillsinfosec.com/event/wild-west-hackin-fest-mile-high-pre-conference-training/
LOCATION:Hilton Denver City Center\, 1701 California St.\, Denver\, CO\, 80202\, United States
CATEGORIES:Training
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20241120T080000
DTEND;TZID=America/New_York:20241120T170000
DTSTAMP:20260407T072910
CREATED:20241121T015634Z
LAST-MODIFIED:20241121T015634Z
UID:10001856-1732089600-1732122000@www.blackhillsinfosec.com
SUMMARY:Blue Team Con
DESCRIPTION:Blue Team Con is the only annual in-person conference created for cybersecurity defenders\, inclusive of anyone interested in safeguarding organizations. \nJoin more than 800 community-minded defensive cybersecurity experts for information sharing\, relationship and career building events\, and defense-focused talks held by some of the industry’s leading cybersecurity minds. \n-Information from event site \nCFP/CFT Closed in March last year.   See News section on site for updates Latest Blue Team Con News – Blue Team Con
URL:https://www.blackhillsinfosec.com/event/blue-team-con/
LOCATION:Fairmont Chicago\, 200 N Columbus Drive\, Chicago\, IL\, 60601\, United States
CATEGORIES:CFP,CFT,Conference,Training
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20240405T110000
DTEND;TZID=America/New_York:20240405T150000
DTSTAMP:20260407T072910
CREATED:20240223T193328Z
LAST-MODIFIED:20240402T193254Z
UID:10001502-1712314800-1712329200@www.blackhillsinfosec.com
SUMMARY:4-Hour Hands-on IR Workshop: Rapid Windows Endpoint Triage w/ Patterson Cake
DESCRIPTION:
URL:https://www.blackhillsinfosec.com/event/4-hour-hands-on-ir-workshop-rapid-windows-endpoint-triage-w-patterson-cake-4-5/
LOCATION:CO
CATEGORIES:BHIS Webcast,Training
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20240308T110000
DTEND;TZID=America/New_York:20240308T160000
DTSTAMP:20260407T072910
CREATED:20240110T172201Z
LAST-MODIFIED:20240110T172933Z
UID:10001495-1709895600-1709913600@www.blackhillsinfosec.com
SUMMARY:4-Hour Hands-on IR Workshop: Rapid Windows Endpoint Triage w/ Patterson Cake
DESCRIPTION:
URL:https://www.blackhillsinfosec.com/event/4-hour-hands-on-ir-workshop-rapid-windows-endpoint-triage-w-patterson-cake/
LOCATION:CO
CATEGORIES:BHIS Webcast,Training
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20231108T120000
DTEND;TZID=America/New_York:20231108T160000
DTSTAMP:20260407T072910
CREATED:20230209T222555Z
LAST-MODIFIED:20230209T222556Z
UID:10000927-1699444800-1699459200@www.blackhillsinfosec.com
SUMMARY:Professionally Evil Container Security (PECSEC) w/ Cory Sabol
DESCRIPTION:Register: https://www.antisyphontraining.com/professionally-evil-container-security \nThis course is designed to cover the core fundamentals of container and container orchestration security. We’ll explore container security concerns\, configuration issues\, and how to abuse them as an attacker. Then we’ll switch gears and explore the ways that we can prevent the attacks we just carried out. This will all be done in a hands-on lab driven manner. This class is focused primarily on Docker and Kubernetes but many of the core concepts can be applied to other container technologies.
URL:https://www.blackhillsinfosec.com/event/professionally-evil-container-security-pecsec-w-cory-sabol/2023-11-08/
LOCATION:CO
CATEGORIES:Training
ATTACH;FMTTYPE=image/png:https://www.blackhillsinfosec.com/wp-content/uploads/2023/02/Container-Security-.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20231107T110000
DTEND;TZID=America/New_York:20231107T160000
DTSTAMP:20260407T072910
CREATED:20230209T222555Z
LAST-MODIFIED:20230209T222556Z
UID:10000926-1699354800-1699372800@www.blackhillsinfosec.com
SUMMARY:Professionally Evil Container Security (PECSEC) w/ Cory Sabol
DESCRIPTION:Register: https://www.antisyphontraining.com/professionally-evil-container-security \nThis course is designed to cover the core fundamentals of container and container orchestration security. We’ll explore container security concerns\, configuration issues\, and how to abuse them as an attacker. Then we’ll switch gears and explore the ways that we can prevent the attacks we just carried out. This will all be done in a hands-on lab driven manner. This class is focused primarily on Docker and Kubernetes but many of the core concepts can be applied to other container technologies.
URL:https://www.blackhillsinfosec.com/event/professionally-evil-container-security-pecsec-w-cory-sabol/2023-11-07/
LOCATION:CO
CATEGORIES:Training
ATTACH;FMTTYPE=image/png:https://www.blackhillsinfosec.com/wp-content/uploads/2023/02/Container-Security-.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20230921T120000
DTEND;TZID=America/New_York:20230921T160000
DTSTAMP:20260407T072910
CREATED:20220628T214206Z
LAST-MODIFIED:20230829T223957Z
UID:10000973-1695297600-1695312000@www.blackhillsinfosec.com
SUMMARY:Getting Started in Security with BHIS and MITRE ATT&CK w/ John Strand
DESCRIPTION:Register: https://www.antisyphontraining.com/getting-started-in-security-with-bhis-and-mitre-attck-w-john-strand/ \nThis 16-hour (4-days\, 4-hour sessions) information security training class is designed for people who are new to computer security. We will cover the core fundamentals with lots of hands-on labs demonstrating the attacks and defenses every security professional must know to be successful. \nAt Black Hills Information Security we conduct over 500 security assessments per year. This Antisyphon training class takes the top vulnerabilities we discover and boils it down to the top 11 things every organization should be doing to protect themselves. We call this the Atomic Controls. \nWhile many security classes can be overwhelming with the amount of data they force on you in a short period of time\, this class is designed to help you focus on what matters to your day-to-day job. So no\, we are not going to force you to learn archaic technologies and the underpinnings of crypto algorithms. Instead\, we will focus on what actually works for repelling and detecting attackers.
URL:https://www.blackhillsinfosec.com/event/getting-started-in-security-with-bhis-and-mitre-attck-w-john-strand/2023-09-21/
LOCATION:CO
CATEGORIES:Pay What You Can,Training
ATTACH;FMTTYPE=image/jpeg:https://www.blackhillsinfosec.com/wp-content/uploads/2021/10/Training_GettingStarted_BHIMITREATTACK_1920x1080.jpg
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20230920T120000
DTEND;TZID=America/New_York:20230920T160000
DTSTAMP:20260407T072910
CREATED:20220628T214206Z
LAST-MODIFIED:20230829T223957Z
UID:10000972-1695211200-1695225600@www.blackhillsinfosec.com
SUMMARY:Getting Started in Security with BHIS and MITRE ATT&CK w/ John Strand
DESCRIPTION:Register: https://www.antisyphontraining.com/getting-started-in-security-with-bhis-and-mitre-attck-w-john-strand/ \nThis 16-hour (4-days\, 4-hour sessions) information security training class is designed for people who are new to computer security. We will cover the core fundamentals with lots of hands-on labs demonstrating the attacks and defenses every security professional must know to be successful. \nAt Black Hills Information Security we conduct over 500 security assessments per year. This Antisyphon training class takes the top vulnerabilities we discover and boils it down to the top 11 things every organization should be doing to protect themselves. We call this the Atomic Controls. \nWhile many security classes can be overwhelming with the amount of data they force on you in a short period of time\, this class is designed to help you focus on what matters to your day-to-day job. So no\, we are not going to force you to learn archaic technologies and the underpinnings of crypto algorithms. Instead\, we will focus on what actually works for repelling and detecting attackers.
URL:https://www.blackhillsinfosec.com/event/getting-started-in-security-with-bhis-and-mitre-attck-w-john-strand/2023-09-20/
LOCATION:CO
CATEGORIES:Pay What You Can,Training
ATTACH;FMTTYPE=image/jpeg:https://www.blackhillsinfosec.com/wp-content/uploads/2021/10/Training_GettingStarted_BHIMITREATTACK_1920x1080.jpg
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20230919T120000
DTEND;TZID=America/New_York:20230919T160000
DTSTAMP:20260407T072910
CREATED:20220628T214206Z
LAST-MODIFIED:20230829T223957Z
UID:10000971-1695124800-1695139200@www.blackhillsinfosec.com
SUMMARY:Getting Started in Security with BHIS and MITRE ATT&CK w/ John Strand
DESCRIPTION:Register: https://www.antisyphontraining.com/getting-started-in-security-with-bhis-and-mitre-attck-w-john-strand/ \nThis 16-hour (4-days\, 4-hour sessions) information security training class is designed for people who are new to computer security. We will cover the core fundamentals with lots of hands-on labs demonstrating the attacks and defenses every security professional must know to be successful. \nAt Black Hills Information Security we conduct over 500 security assessments per year. This Antisyphon training class takes the top vulnerabilities we discover and boils it down to the top 11 things every organization should be doing to protect themselves. We call this the Atomic Controls. \nWhile many security classes can be overwhelming with the amount of data they force on you in a short period of time\, this class is designed to help you focus on what matters to your day-to-day job. So no\, we are not going to force you to learn archaic technologies and the underpinnings of crypto algorithms. Instead\, we will focus on what actually works for repelling and detecting attackers.
URL:https://www.blackhillsinfosec.com/event/getting-started-in-security-with-bhis-and-mitre-attck-w-john-strand/2023-09-19/
LOCATION:CO
CATEGORIES:Pay What You Can,Training
ATTACH;FMTTYPE=image/jpeg:https://www.blackhillsinfosec.com/wp-content/uploads/2021/10/Training_GettingStarted_BHIMITREATTACK_1920x1080.jpg
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20230918T110000
DTEND;TZID=America/New_York:20230918T160000
DTSTAMP:20260407T072910
CREATED:20220628T214206Z
LAST-MODIFIED:20230829T223957Z
UID:10000970-1695034800-1695052800@www.blackhillsinfosec.com
SUMMARY:Getting Started in Security with BHIS and MITRE ATT&CK w/ John Strand
DESCRIPTION:Register: https://www.antisyphontraining.com/getting-started-in-security-with-bhis-and-mitre-attck-w-john-strand/ \nThis 16-hour (4-days\, 4-hour sessions) information security training class is designed for people who are new to computer security. We will cover the core fundamentals with lots of hands-on labs demonstrating the attacks and defenses every security professional must know to be successful. \nAt Black Hills Information Security we conduct over 500 security assessments per year. This Antisyphon training class takes the top vulnerabilities we discover and boils it down to the top 11 things every organization should be doing to protect themselves. We call this the Atomic Controls. \nWhile many security classes can be overwhelming with the amount of data they force on you in a short period of time\, this class is designed to help you focus on what matters to your day-to-day job. So no\, we are not going to force you to learn archaic technologies and the underpinnings of crypto algorithms. Instead\, we will focus on what actually works for repelling and detecting attackers.
URL:https://www.blackhillsinfosec.com/event/getting-started-in-security-with-bhis-and-mitre-attck-w-john-strand/2023-09-18/
LOCATION:CO
CATEGORIES:Pay What You Can,Training
ATTACH;FMTTYPE=image/jpeg:https://www.blackhillsinfosec.com/wp-content/uploads/2021/10/Training_GettingStarted_BHIMITREATTACK_1920x1080.jpg
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20230615T120000
DTEND;TZID=America/New_York:20230615T160000
DTSTAMP:20260407T072910
CREATED:20220628T203522Z
LAST-MODIFIED:20230515T211629Z
UID:10000961-1686830400-1686844800@www.blackhillsinfosec.com
SUMMARY:SOC Core Skills w/ John Strand
DESCRIPTION:Register: https://www.antisyphontraining.com/soc-core-skills-w-john-strand/ \nThis 16-hour information security training course will cover the core security skills all Security Operation Center (SOC) analysts need to have. These are the skills that all Black Hills Information Security (BHIS) SOC team members need to have. \n\n\n 
URL:https://www.blackhillsinfosec.com/event/soc-core-skills-w-john-strand/2023-06-15/
LOCATION:CO
CATEGORIES:Pay What You Can,Training
ATTACH;FMTTYPE=image/png:https://www.blackhillsinfosec.com/wp-content/uploads/2022/06/SOC_CoreSkills_1920x1080.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20230614T110000
DTEND;TZID=America/New_York:20230614T160000
DTSTAMP:20260407T072910
CREATED:20220628T203522Z
LAST-MODIFIED:20230515T211629Z
UID:10000960-1686740400-1686758400@www.blackhillsinfosec.com
SUMMARY:SOC Core Skills w/ John Strand
DESCRIPTION:Register: https://www.antisyphontraining.com/soc-core-skills-w-john-strand/ \nThis 16-hour information security training course will cover the core security skills all Security Operation Center (SOC) analysts need to have. These are the skills that all Black Hills Information Security (BHIS) SOC team members need to have. \n\n\n 
URL:https://www.blackhillsinfosec.com/event/soc-core-skills-w-john-strand/2023-06-14/
LOCATION:CO
CATEGORIES:Pay What You Can,Training
ATTACH;FMTTYPE=image/png:https://www.blackhillsinfosec.com/wp-content/uploads/2022/06/SOC_CoreSkills_1920x1080.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20230613T120000
DTEND;TZID=America/New_York:20230613T160000
DTSTAMP:20260407T072910
CREATED:20220628T203522Z
LAST-MODIFIED:20230515T211629Z
UID:10000959-1686657600-1686672000@www.blackhillsinfosec.com
SUMMARY:SOC Core Skills w/ John Strand
DESCRIPTION:Register: https://www.antisyphontraining.com/soc-core-skills-w-john-strand/ \nThis 16-hour information security training course will cover the core security skills all Security Operation Center (SOC) analysts need to have. These are the skills that all Black Hills Information Security (BHIS) SOC team members need to have. \n\n\n 
URL:https://www.blackhillsinfosec.com/event/soc-core-skills-w-john-strand/2023-06-13/
LOCATION:CO
CATEGORIES:Pay What You Can,Training
ATTACH;FMTTYPE=image/png:https://www.blackhillsinfosec.com/wp-content/uploads/2022/06/SOC_CoreSkills_1920x1080.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20230612T110000
DTEND;TZID=America/New_York:20230612T160000
DTSTAMP:20260407T072910
CREATED:20220628T203522Z
LAST-MODIFIED:20230515T211629Z
UID:10000958-1686567600-1686585600@www.blackhillsinfosec.com
SUMMARY:SOC Core Skills w/ John Strand
DESCRIPTION:Register: https://www.antisyphontraining.com/soc-core-skills-w-john-strand/ \nThis 16-hour information security training course will cover the core security skills all Security Operation Center (SOC) analysts need to have. These are the skills that all Black Hills Information Security (BHIS) SOC team members need to have. \n\n\n 
URL:https://www.blackhillsinfosec.com/event/soc-core-skills-w-john-strand/2023-06-12/
LOCATION:CO
CATEGORIES:Pay What You Can,Training
ATTACH;FMTTYPE=image/png:https://www.blackhillsinfosec.com/wp-content/uploads/2022/06/SOC_CoreSkills_1920x1080.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20230511T120000
DTEND;TZID=America/New_York:20230511T160000
DTSTAMP:20260407T072910
CREATED:20220719T221156Z
LAST-MODIFIED:20230209T223825Z
UID:10000947-1683806400-1683820800@www.blackhillsinfosec.com
SUMMARY:Active Defense & Cyber Deception w/ John Strand
DESCRIPTION:Register: https://www.antisyphontraining.com/active-defense-cyber-deception-w-john-strand/ \nActive Defenses have been capturing a large amount of attention in the media lately. There are those who thirst for vengeance and want to directly attack the attackers. There are those who believe that any sort of active response directed at an attacker is wrong. We believe the answer is somewhere in between. \nIn this class\, you will learn how to force an attacker to take more moves to attack your network. These moves may increase your ability to detect them. You will learn how to gain better attribution as to who is attacking you and why. You will also find out how to get access to a bad guy’s system. And most importantly\, you will find out how to do the above legally. \nThe current threat landscape is shifting. Traditional defenses are failing us. We need to develop new strategies to defend ourselves. Even more importantly\, we need to better understand who is attacking us and why. Some of the things we talk about you may implement immediately\, others may take you a while to implement. Either way\, consider what we discuss as a collection of tools at your disposal when you need them to annoy attackers\, attribute who is attacking you\, and finally\, attack the attackers. \nThis class is based on the DARPA funded Active Defense Harbinger Distribution live Linux environment. This VM is built from the ground up for defenders to quickly implement Active Defenses in their environments. This class is also very heavy with hands-on labs. We will not just talk about Active Defenses. We will be doing hands-on labs and through them in a way that can be quickly and easily implemented in your environment.
URL:https://www.blackhillsinfosec.com/event/active-defense-cyber-deception-w-john-strand/2023-05-11/
LOCATION:CO
CATEGORIES:Pay What You Can,Training
ATTACH;FMTTYPE=image/jpeg:https://www.blackhillsinfosec.com/wp-content/uploads/2022/07/ActDefCybDecept_1920x1080.jpg
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20230510T120000
DTEND;TZID=America/New_York:20230510T160000
DTSTAMP:20260407T072910
CREATED:20220719T221156Z
LAST-MODIFIED:20230209T223825Z
UID:10000946-1683720000-1683734400@www.blackhillsinfosec.com
SUMMARY:Active Defense & Cyber Deception w/ John Strand
DESCRIPTION:Register: https://www.antisyphontraining.com/active-defense-cyber-deception-w-john-strand/ \nActive Defenses have been capturing a large amount of attention in the media lately. There are those who thirst for vengeance and want to directly attack the attackers. There are those who believe that any sort of active response directed at an attacker is wrong. We believe the answer is somewhere in between. \nIn this class\, you will learn how to force an attacker to take more moves to attack your network. These moves may increase your ability to detect them. You will learn how to gain better attribution as to who is attacking you and why. You will also find out how to get access to a bad guy’s system. And most importantly\, you will find out how to do the above legally. \nThe current threat landscape is shifting. Traditional defenses are failing us. We need to develop new strategies to defend ourselves. Even more importantly\, we need to better understand who is attacking us and why. Some of the things we talk about you may implement immediately\, others may take you a while to implement. Either way\, consider what we discuss as a collection of tools at your disposal when you need them to annoy attackers\, attribute who is attacking you\, and finally\, attack the attackers. \nThis class is based on the DARPA funded Active Defense Harbinger Distribution live Linux environment. This VM is built from the ground up for defenders to quickly implement Active Defenses in their environments. This class is also very heavy with hands-on labs. We will not just talk about Active Defenses. We will be doing hands-on labs and through them in a way that can be quickly and easily implemented in your environment.
URL:https://www.blackhillsinfosec.com/event/active-defense-cyber-deception-w-john-strand/2023-05-10/
LOCATION:CO
CATEGORIES:Pay What You Can,Training
ATTACH;FMTTYPE=image/jpeg:https://www.blackhillsinfosec.com/wp-content/uploads/2022/07/ActDefCybDecept_1920x1080.jpg
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20230509T120000
DTEND;TZID=America/New_York:20230509T160000
DTSTAMP:20260407T072910
CREATED:20220719T221156Z
LAST-MODIFIED:20230209T223825Z
UID:10000945-1683633600-1683648000@www.blackhillsinfosec.com
SUMMARY:Active Defense & Cyber Deception w/ John Strand
DESCRIPTION:Register: https://www.antisyphontraining.com/active-defense-cyber-deception-w-john-strand/ \nActive Defenses have been capturing a large amount of attention in the media lately. There are those who thirst for vengeance and want to directly attack the attackers. There are those who believe that any sort of active response directed at an attacker is wrong. We believe the answer is somewhere in between. \nIn this class\, you will learn how to force an attacker to take more moves to attack your network. These moves may increase your ability to detect them. You will learn how to gain better attribution as to who is attacking you and why. You will also find out how to get access to a bad guy’s system. And most importantly\, you will find out how to do the above legally. \nThe current threat landscape is shifting. Traditional defenses are failing us. We need to develop new strategies to defend ourselves. Even more importantly\, we need to better understand who is attacking us and why. Some of the things we talk about you may implement immediately\, others may take you a while to implement. Either way\, consider what we discuss as a collection of tools at your disposal when you need them to annoy attackers\, attribute who is attacking you\, and finally\, attack the attackers. \nThis class is based on the DARPA funded Active Defense Harbinger Distribution live Linux environment. This VM is built from the ground up for defenders to quickly implement Active Defenses in their environments. This class is also very heavy with hands-on labs. We will not just talk about Active Defenses. We will be doing hands-on labs and through them in a way that can be quickly and easily implemented in your environment.
URL:https://www.blackhillsinfosec.com/event/active-defense-cyber-deception-w-john-strand/2023-05-09/
LOCATION:CO
CATEGORIES:Pay What You Can,Training
ATTACH;FMTTYPE=image/jpeg:https://www.blackhillsinfosec.com/wp-content/uploads/2022/07/ActDefCybDecept_1920x1080.jpg
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20230508T110000
DTEND;TZID=America/New_York:20230508T160000
DTSTAMP:20260407T072910
CREATED:20220719T221156Z
LAST-MODIFIED:20230209T223825Z
UID:10000944-1683543600-1683561600@www.blackhillsinfosec.com
SUMMARY:Active Defense & Cyber Deception w/ John Strand
DESCRIPTION:Register: https://www.antisyphontraining.com/active-defense-cyber-deception-w-john-strand/ \nActive Defenses have been capturing a large amount of attention in the media lately. There are those who thirst for vengeance and want to directly attack the attackers. There are those who believe that any sort of active response directed at an attacker is wrong. We believe the answer is somewhere in between. \nIn this class\, you will learn how to force an attacker to take more moves to attack your network. These moves may increase your ability to detect them. You will learn how to gain better attribution as to who is attacking you and why. You will also find out how to get access to a bad guy’s system. And most importantly\, you will find out how to do the above legally. \nThe current threat landscape is shifting. Traditional defenses are failing us. We need to develop new strategies to defend ourselves. Even more importantly\, we need to better understand who is attacking us and why. Some of the things we talk about you may implement immediately\, others may take you a while to implement. Either way\, consider what we discuss as a collection of tools at your disposal when you need them to annoy attackers\, attribute who is attacking you\, and finally\, attack the attackers. \nThis class is based on the DARPA funded Active Defense Harbinger Distribution live Linux environment. This VM is built from the ground up for defenders to quickly implement Active Defenses in their environments. This class is also very heavy with hands-on labs. We will not just talk about Active Defenses. We will be doing hands-on labs and through them in a way that can be quickly and easily implemented in your environment.
URL:https://www.blackhillsinfosec.com/event/active-defense-cyber-deception-w-john-strand/2023-05-08/
LOCATION:CO
CATEGORIES:Pay What You Can,Training
ATTACH;FMTTYPE=image/jpeg:https://www.blackhillsinfosec.com/wp-content/uploads/2022/07/ActDefCybDecept_1920x1080.jpg
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20230503T100000
DTEND;TZID=America/New_York:20230503T180000
DTSTAMP:20260407T072910
CREATED:20230209T223614Z
LAST-MODIFIED:20230209T223614Z
UID:10000939-1683108000-1683136800@www.blackhillsinfosec.com
SUMMARY:Professionally Evil API Testing
DESCRIPTION:Register: https://www.antisyphontraining.com/professionally-evil-api-testing \nThis workshop-style intermediate course is designed to complement a student’s understanding of traditional Web Application Security. It focuses on modern application and API security features and tactics to protect APIs and microservices from attacks. Because the material in this course leans on standard HTTP and browser features\, and standard web and API security best practices\, the lessons and labs are applicable across programming languages and platform implementations. This material in this course is approached both from the perspective of an adversary and that of a defender.
URL:https://www.blackhillsinfosec.com/event/professionally-evil-api-testing-3/2023-05-03/
LOCATION:CO
CATEGORIES:Training
ATTACH;FMTTYPE=image/png:https://www.blackhillsinfosec.com/wp-content/uploads/2023/02/API-Testing.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20230502T090000
DTEND;TZID=America/New_York:20230502T180000
DTSTAMP:20260407T072910
CREATED:20230209T223614Z
LAST-MODIFIED:20230209T223614Z
UID:10000938-1683018000-1683050400@www.blackhillsinfosec.com
SUMMARY:Professionally Evil API Testing
DESCRIPTION:Register: https://www.antisyphontraining.com/professionally-evil-api-testing \nThis workshop-style intermediate course is designed to complement a student’s understanding of traditional Web Application Security. It focuses on modern application and API security features and tactics to protect APIs and microservices from attacks. Because the material in this course leans on standard HTTP and browser features\, and standard web and API security best practices\, the lessons and labs are applicable across programming languages and platform implementations. This material in this course is approached both from the perspective of an adversary and that of a defender.
URL:https://www.blackhillsinfosec.com/event/professionally-evil-api-testing-3/2023-05-02/
LOCATION:CO
CATEGORIES:Training
ATTACH;FMTTYPE=image/png:https://www.blackhillsinfosec.com/wp-content/uploads/2023/02/API-Testing.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20230420T120000
DTEND;TZID=America/New_York:20230420T160000
DTSTAMP:20260407T072910
CREATED:20220628T214206Z
LAST-MODIFIED:20230829T223957Z
UID:10000935-1681992000-1682006400@www.blackhillsinfosec.com
SUMMARY:Getting Started in Security with BHIS and MITRE ATT&CK w/ John Strand
DESCRIPTION:Register: https://www.antisyphontraining.com/getting-started-in-security-with-bhis-and-mitre-attck-w-john-strand/ \nThis 16-hour (4-days\, 4-hour sessions) information security training class is designed for people who are new to computer security. We will cover the core fundamentals with lots of hands-on labs demonstrating the attacks and defenses every security professional must know to be successful. \nAt Black Hills Information Security we conduct over 500 security assessments per year. This Antisyphon training class takes the top vulnerabilities we discover and boils it down to the top 11 things every organization should be doing to protect themselves. We call this the Atomic Controls. \nWhile many security classes can be overwhelming with the amount of data they force on you in a short period of time\, this class is designed to help you focus on what matters to your day-to-day job. So no\, we are not going to force you to learn archaic technologies and the underpinnings of crypto algorithms. Instead\, we will focus on what actually works for repelling and detecting attackers.
URL:https://www.blackhillsinfosec.com/event/getting-started-in-security-with-bhis-and-mitre-attck-w-john-strand/2023-04-20/
LOCATION:CO
CATEGORIES:Pay What You Can,Training
ATTACH;FMTTYPE=image/jpeg:https://www.blackhillsinfosec.com/wp-content/uploads/2021/10/Training_GettingStarted_BHIMITREATTACK_1920x1080.jpg
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20230419T120000
DTEND;TZID=America/New_York:20230419T160000
DTSTAMP:20260407T072910
CREATED:20230209T223226Z
LAST-MODIFIED:20230209T223226Z
UID:10000937-1681905600-1681920000@www.blackhillsinfosec.com
SUMMARY:Professionally Evil PCI 101 w/ Nathan Sweaney
DESCRIPTION:Register: https://www.antisyphontraining.com/professionally-evil-pci-101 \nThis course is designed to introduce IT professionals to the Payment Card Industry collection of standards as defined and enforced by the Payment Card Industry Security Standards Council. The first half of the course summarizes the structure and history of PCI\, the primary standards documents\, and the various certification programs for professionals. The second half of the course dives into a summary of the components of the PCI Data Security Standard (PCI DSS). This is a high-level\, introductory summary designed to provide a general understanding of the requirements in the PCI DSS.
URL:https://www.blackhillsinfosec.com/event/professionally-evil-pci-101-w-nathan-sweaney/2023-04-19/
LOCATION:CO
CATEGORIES:Training
ATTACH;FMTTYPE=image/png:https://www.blackhillsinfosec.com/wp-content/uploads/2023/02/Intro-to-PCI.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20230419T120000
DTEND;TZID=America/New_York:20230419T160000
DTSTAMP:20260407T072910
CREATED:20220628T214206Z
LAST-MODIFIED:20230829T223957Z
UID:10000934-1681905600-1681920000@www.blackhillsinfosec.com
SUMMARY:Getting Started in Security with BHIS and MITRE ATT&CK w/ John Strand
DESCRIPTION:Register: https://www.antisyphontraining.com/getting-started-in-security-with-bhis-and-mitre-attck-w-john-strand/ \nThis 16-hour (4-days\, 4-hour sessions) information security training class is designed for people who are new to computer security. We will cover the core fundamentals with lots of hands-on labs demonstrating the attacks and defenses every security professional must know to be successful. \nAt Black Hills Information Security we conduct over 500 security assessments per year. This Antisyphon training class takes the top vulnerabilities we discover and boils it down to the top 11 things every organization should be doing to protect themselves. We call this the Atomic Controls. \nWhile many security classes can be overwhelming with the amount of data they force on you in a short period of time\, this class is designed to help you focus on what matters to your day-to-day job. So no\, we are not going to force you to learn archaic technologies and the underpinnings of crypto algorithms. Instead\, we will focus on what actually works for repelling and detecting attackers.
URL:https://www.blackhillsinfosec.com/event/getting-started-in-security-with-bhis-and-mitre-attck-w-john-strand/2023-04-19/
LOCATION:CO
CATEGORIES:Pay What You Can,Training
ATTACH;FMTTYPE=image/jpeg:https://www.blackhillsinfosec.com/wp-content/uploads/2021/10/Training_GettingStarted_BHIMITREATTACK_1920x1080.jpg
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20230418T120000
DTEND;TZID=America/New_York:20230418T160000
DTSTAMP:20260407T072910
CREATED:20220628T214206Z
LAST-MODIFIED:20230829T223957Z
UID:10000933-1681819200-1681833600@www.blackhillsinfosec.com
SUMMARY:Getting Started in Security with BHIS and MITRE ATT&CK w/ John Strand
DESCRIPTION:Register: https://www.antisyphontraining.com/getting-started-in-security-with-bhis-and-mitre-attck-w-john-strand/ \nThis 16-hour (4-days\, 4-hour sessions) information security training class is designed for people who are new to computer security. We will cover the core fundamentals with lots of hands-on labs demonstrating the attacks and defenses every security professional must know to be successful. \nAt Black Hills Information Security we conduct over 500 security assessments per year. This Antisyphon training class takes the top vulnerabilities we discover and boils it down to the top 11 things every organization should be doing to protect themselves. We call this the Atomic Controls. \nWhile many security classes can be overwhelming with the amount of data they force on you in a short period of time\, this class is designed to help you focus on what matters to your day-to-day job. So no\, we are not going to force you to learn archaic technologies and the underpinnings of crypto algorithms. Instead\, we will focus on what actually works for repelling and detecting attackers.
URL:https://www.blackhillsinfosec.com/event/getting-started-in-security-with-bhis-and-mitre-attck-w-john-strand/2023-04-18/
LOCATION:CO
CATEGORIES:Pay What You Can,Training
ATTACH;FMTTYPE=image/jpeg:https://www.blackhillsinfosec.com/wp-content/uploads/2021/10/Training_GettingStarted_BHIMITREATTACK_1920x1080.jpg
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20230418T110000
DTEND;TZID=America/New_York:20230418T160000
DTSTAMP:20260407T072910
CREATED:20230209T223226Z
LAST-MODIFIED:20230209T223226Z
UID:10000936-1681815600-1681833600@www.blackhillsinfosec.com
SUMMARY:Professionally Evil PCI 101 w/ Nathan Sweaney
DESCRIPTION:Register: https://www.antisyphontraining.com/professionally-evil-pci-101 \nThis course is designed to introduce IT professionals to the Payment Card Industry collection of standards as defined and enforced by the Payment Card Industry Security Standards Council. The first half of the course summarizes the structure and history of PCI\, the primary standards documents\, and the various certification programs for professionals. The second half of the course dives into a summary of the components of the PCI Data Security Standard (PCI DSS). This is a high-level\, introductory summary designed to provide a general understanding of the requirements in the PCI DSS.
URL:https://www.blackhillsinfosec.com/event/professionally-evil-pci-101-w-nathan-sweaney/2023-04-18/
LOCATION:CO
CATEGORIES:Training
ATTACH;FMTTYPE=image/png:https://www.blackhillsinfosec.com/wp-content/uploads/2023/02/Intro-to-PCI.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20230417T110000
DTEND;TZID=America/New_York:20230417T160000
DTSTAMP:20260407T072910
CREATED:20220628T214206Z
LAST-MODIFIED:20230829T223957Z
UID:10000932-1681729200-1681747200@www.blackhillsinfosec.com
SUMMARY:Getting Started in Security with BHIS and MITRE ATT&CK w/ John Strand
DESCRIPTION:Register: https://www.antisyphontraining.com/getting-started-in-security-with-bhis-and-mitre-attck-w-john-strand/ \nThis 16-hour (4-days\, 4-hour sessions) information security training class is designed for people who are new to computer security. We will cover the core fundamentals with lots of hands-on labs demonstrating the attacks and defenses every security professional must know to be successful. \nAt Black Hills Information Security we conduct over 500 security assessments per year. This Antisyphon training class takes the top vulnerabilities we discover and boils it down to the top 11 things every organization should be doing to protect themselves. We call this the Atomic Controls. \nWhile many security classes can be overwhelming with the amount of data they force on you in a short period of time\, this class is designed to help you focus on what matters to your day-to-day job. So no\, we are not going to force you to learn archaic technologies and the underpinnings of crypto algorithms. Instead\, we will focus on what actually works for repelling and detecting attackers.
URL:https://www.blackhillsinfosec.com/event/getting-started-in-security-with-bhis-and-mitre-attck-w-john-strand/2023-04-17/
LOCATION:CO
CATEGORIES:Pay What You Can,Training
ATTACH;FMTTYPE=image/jpeg:https://www.blackhillsinfosec.com/wp-content/uploads/2021/10/Training_GettingStarted_BHIMITREATTACK_1920x1080.jpg
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20230412T120000
DTEND;TZID=America/New_York:20230412T160000
DTSTAMP:20260407T072910
CREATED:20230209T222555Z
LAST-MODIFIED:20230209T222556Z
UID:10000925-1681300800-1681315200@www.blackhillsinfosec.com
SUMMARY:Professionally Evil Container Security (PECSEC) w/ Cory Sabol
DESCRIPTION:Register: https://www.antisyphontraining.com/professionally-evil-container-security \nThis course is designed to cover the core fundamentals of container and container orchestration security. We’ll explore container security concerns\, configuration issues\, and how to abuse them as an attacker. Then we’ll switch gears and explore the ways that we can prevent the attacks we just carried out. This will all be done in a hands-on lab driven manner. This class is focused primarily on Docker and Kubernetes but many of the core concepts can be applied to other container technologies.
URL:https://www.blackhillsinfosec.com/event/professionally-evil-container-security-pecsec-w-cory-sabol/2023-04-12/
LOCATION:CO
CATEGORIES:Training
ATTACH;FMTTYPE=image/png:https://www.blackhillsinfosec.com/wp-content/uploads/2023/02/Container-Security-.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20230411T110000
DTEND;TZID=America/New_York:20230411T160000
DTSTAMP:20260407T072910
CREATED:20230209T222555Z
LAST-MODIFIED:20230209T222556Z
UID:10000924-1681210800-1681228800@www.blackhillsinfosec.com
SUMMARY:Professionally Evil Container Security (PECSEC) w/ Cory Sabol
DESCRIPTION:Register: https://www.antisyphontraining.com/professionally-evil-container-security \nThis course is designed to cover the core fundamentals of container and container orchestration security. We’ll explore container security concerns\, configuration issues\, and how to abuse them as an attacker. Then we’ll switch gears and explore the ways that we can prevent the attacks we just carried out. This will all be done in a hands-on lab driven manner. This class is focused primarily on Docker and Kubernetes but many of the core concepts can be applied to other container technologies.
URL:https://www.blackhillsinfosec.com/event/professionally-evil-container-security-pecsec-w-cory-sabol/2023-04-11/
LOCATION:CO
CATEGORIES:Training
ATTACH;FMTTYPE=image/png:https://www.blackhillsinfosec.com/wp-content/uploads/2023/02/Container-Security-.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20230330T120000
DTEND;TZID=America/New_York:20230330T160000
DTSTAMP:20260407T072910
CREATED:20220628T203522Z
LAST-MODIFIED:20230515T211629Z
UID:10000618-1680177600-1680192000@www.blackhillsinfosec.com
SUMMARY:SOC Core Skills w/ John Strand
DESCRIPTION:Register: https://www.antisyphontraining.com/soc-core-skills-w-john-strand/ \nThis 16-hour information security training course will cover the core security skills all Security Operation Center (SOC) analysts need to have. These are the skills that all Black Hills Information Security (BHIS) SOC team members need to have. \n\n\n 
URL:https://www.blackhillsinfosec.com/event/soc-core-skills-w-john-strand/2023-03-30/
LOCATION:CO
CATEGORIES:Pay What You Can,Training
ATTACH;FMTTYPE=image/png:https://www.blackhillsinfosec.com/wp-content/uploads/2022/06/SOC_CoreSkills_1920x1080.png
END:VEVENT
END:VCALENDAR