BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//Black Hills Information Security, Inc. - ECPv6.15.18//NONSGML v1.0//EN
CALSCALE:GREGORIAN
METHOD:PUBLISH
X-ORIGINAL-URL:https://www.blackhillsinfosec.com
X-WR-CALDESC:Events for Black Hills Information Security, Inc.
REFRESH-INTERVAL;VALUE=DURATION:PT1H
X-Robots-Tag:noindex
X-PUBLISHED-TTL:PT1H
BEGIN:VTIMEZONE
TZID:America/New_York
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20210314T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20211107T060000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20220313T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20221106T060000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20230312T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20231105T060000
END:STANDARD
END:VTIMEZONE
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20220815T080000
DTEND;TZID=America/New_York:20220815T140000
DTSTAMP:20260404T055116
CREATED:20220628T214206Z
LAST-MODIFIED:20230829T223957Z
UID:10000928-1660550400-1660572000@www.blackhillsinfosec.com
SUMMARY:Getting Started in Security with BHIS and MITRE ATT&CK w/ John Strand
DESCRIPTION:Register: https://www.antisyphontraining.com/getting-started-in-security-with-bhis-and-mitre-attck-w-john-strand/ \nThis 16-hour (4-days\, 4-hour sessions) information security training class is designed for people who are new to computer security. We will cover the core fundamentals with lots of hands-on labs demonstrating the attacks and defenses every security professional must know to be successful. \nAt Black Hills Information Security we conduct over 500 security assessments per year. This Antisyphon training class takes the top vulnerabilities we discover and boils it down to the top 11 things every organization should be doing to protect themselves. We call this the Atomic Controls. \nWhile many security classes can be overwhelming with the amount of data they force on you in a short period of time\, this class is designed to help you focus on what matters to your day-to-day job. So no\, we are not going to force you to learn archaic technologies and the underpinnings of crypto algorithms. Instead\, we will focus on what actually works for repelling and detecting attackers.
URL:https://www.blackhillsinfosec.com/event/getting-started-in-security-with-bhis-and-mitre-attck-w-john-strand/2022-08-15/
LOCATION:MD
CATEGORIES:Pay What You Can,Training
ATTACH;FMTTYPE=image/jpeg:https://www.blackhillsinfosec.com/wp-content/uploads/2021/10/Training_GettingStarted_BHIMITREATTACK_1920x1080.jpg
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20220815T120000
DTEND;TZID=America/New_York:20220815T160000
DTSTAMP:20260404T055116
CREATED:20220627T205029Z
LAST-MODIFIED:20230209T184749Z
UID:10000838-1660564800-1660579200@www.blackhillsinfosec.com
SUMMARY:HackerOps w/ Ralph May
DESCRIPTION:To conduct an advanced attack\, you need more than just a collection of simple scripts. In addition to talent\, you need a large amount of managed and unmanaged code. The more code and resources that are required to conduct an engagement\, the more time we need. Time is something we don’t have a lot of on an engagement. \nToday\, to be an advanced and effective attacker\, you need to move fast\, and that speed requires a move to a DevOps style of managing infrastructure and code. With cloud resources and APIs to manage these resources\, the days of manual setup are long behind us. \nWhere do we get started? And how does it all work? \nIn this training\, we learn the fundamentals of DevOps and how we can code our TTPs. Coding TTPs allows for new tactics and improved OPSEC to be shared without the cost of knowledge transfer and manual setup. This class will introduce students to Terraform Ansible and Docker with the goal of writing TTPs to use and share. \nIn this class\, we will learn the fundamentals of Terraform Ansible and Docker with an emphasis on how we can use these tools to code our TTPs. After we have the fundamentals\, we will start coding and get comfortable with YAML and will review how to create resources and customize TTPs. Lastly\, we will work through multiple labs and examples that you can take with you for your next engagement. \nhttps://www.antisyphontraining.com/hackerops-w-ralph-may/
URL:https://www.blackhillsinfosec.com/event/hackerops/2022-08-15/
LOCATION:MD
CATEGORIES:Training
ATTACH;FMTTYPE=image/png:https://www.blackhillsinfosec.com/wp-content/uploads/2022/06/hackerops-Training-Graphics.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20220815T163000
DTEND;TZID=America/New_York:20220815T173000
DTSTAMP:20260404T055116
CREATED:20220624T174740Z
LAST-MODIFIED:20220627T143602Z
UID:10000399-1660581000-1660584600@www.blackhillsinfosec.com
SUMMARY:BHIS | Talkin' Bout Infosec News
DESCRIPTION:Join the BHIS team as we talk about current infosec news. \nStreamed live every Monday @ 4:30 pm. \nhttps://www.youtube.com/BlackHillsInformationSecurity
URL:https://www.blackhillsinfosec.com/event/bhis-talkin-bout-infosec-news/2022-08-15/
LOCATION:MD
CATEGORIES:Newscast
ATTACH;FMTTYPE=image/jpeg:https://www.blackhillsinfosec.com/wp-content/uploads/2022/06/MicrosoftTeams-image-10.jpg
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20220816T080000
DTEND;TZID=America/New_York:20220816T140000
DTSTAMP:20260404T055116
CREATED:20220628T214206Z
LAST-MODIFIED:20230829T223957Z
UID:10000929-1660636800-1660658400@www.blackhillsinfosec.com
SUMMARY:Getting Started in Security with BHIS and MITRE ATT&CK w/ John Strand
DESCRIPTION:Register: https://www.antisyphontraining.com/getting-started-in-security-with-bhis-and-mitre-attck-w-john-strand/ \nThis 16-hour (4-days\, 4-hour sessions) information security training class is designed for people who are new to computer security. We will cover the core fundamentals with lots of hands-on labs demonstrating the attacks and defenses every security professional must know to be successful. \nAt Black Hills Information Security we conduct over 500 security assessments per year. This Antisyphon training class takes the top vulnerabilities we discover and boils it down to the top 11 things every organization should be doing to protect themselves. We call this the Atomic Controls. \nWhile many security classes can be overwhelming with the amount of data they force on you in a short period of time\, this class is designed to help you focus on what matters to your day-to-day job. So no\, we are not going to force you to learn archaic technologies and the underpinnings of crypto algorithms. Instead\, we will focus on what actually works for repelling and detecting attackers.
URL:https://www.blackhillsinfosec.com/event/getting-started-in-security-with-bhis-and-mitre-attck-w-john-strand/2022-08-16/
LOCATION:MD
CATEGORIES:Pay What You Can,Training
ATTACH;FMTTYPE=image/jpeg:https://www.blackhillsinfosec.com/wp-content/uploads/2021/10/Training_GettingStarted_BHIMITREATTACK_1920x1080.jpg
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20220816T120000
DTEND;TZID=America/New_York:20220816T160000
DTSTAMP:20260404T055116
CREATED:20220627T205029Z
LAST-MODIFIED:20230209T184749Z
UID:10000839-1660651200-1660665600@www.blackhillsinfosec.com
SUMMARY:HackerOps w/ Ralph May
DESCRIPTION:To conduct an advanced attack\, you need more than just a collection of simple scripts. In addition to talent\, you need a large amount of managed and unmanaged code. The more code and resources that are required to conduct an engagement\, the more time we need. Time is something we don’t have a lot of on an engagement. \nToday\, to be an advanced and effective attacker\, you need to move fast\, and that speed requires a move to a DevOps style of managing infrastructure and code. With cloud resources and APIs to manage these resources\, the days of manual setup are long behind us. \nWhere do we get started? And how does it all work? \nIn this training\, we learn the fundamentals of DevOps and how we can code our TTPs. Coding TTPs allows for new tactics and improved OPSEC to be shared without the cost of knowledge transfer and manual setup. This class will introduce students to Terraform Ansible and Docker with the goal of writing TTPs to use and share. \nIn this class\, we will learn the fundamentals of Terraform Ansible and Docker with an emphasis on how we can use these tools to code our TTPs. After we have the fundamentals\, we will start coding and get comfortable with YAML and will review how to create resources and customize TTPs. Lastly\, we will work through multiple labs and examples that you can take with you for your next engagement. \nhttps://www.antisyphontraining.com/hackerops-w-ralph-may/
URL:https://www.blackhillsinfosec.com/event/hackerops/2022-08-16/
LOCATION:MD
CATEGORIES:Training
ATTACH;FMTTYPE=image/png:https://www.blackhillsinfosec.com/wp-content/uploads/2022/06/hackerops-Training-Graphics.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20220816T120000
DTEND;TZID=America/New_York:20220816T160000
DTSTAMP:20260404T055116
CREATED:20220715T165009Z
LAST-MODIFIED:20220715T165138Z
UID:10000669-1660651200-1660665600@www.blackhillsinfosec.com
SUMMARY:Security Leadership and Management w/ Chris Brenton
DESCRIPTION:https://www.antisyphontraining.com/security-leadership-and-management-w-chris-brenton/
URL:https://www.blackhillsinfosec.com/event/security-leadership-and-management/2022-08-16/
LOCATION:MD
CATEGORIES:Training
ATTACH;FMTTYPE=image/png:https://www.blackhillsinfosec.com/wp-content/uploads/2022/07/sec-leadership-graphic.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20220816T163000
DTEND;TZID=America/New_York:20220816T173000
DTSTAMP:20260404T055116
CREATED:20220624T204221Z
LAST-MODIFIED:20220920T184909Z
UID:10000466-1660667400-1660671000@www.blackhillsinfosec.com
SUMMARY:AASLR: Antisyphon Address Space Layout Randomization
DESCRIPTION:AASLR will have infosec professionals sharing their knowledge on tools\, techniques\, and procedures and then answering a lot of your questions on everything you can think to ask. \nStreamed live every Tuesday and Wednesday @ 4:30 pm. \nhttps://www.twitch.tv/antisyphon
URL:https://www.blackhillsinfosec.com/event/aaslr-antisyphon-address-space-layout-randomization/2022-08-16/
LOCATION:MD
CATEGORIES:Livestream
ATTACH;FMTTYPE=image/png:https://www.blackhillsinfosec.com/wp-content/uploads/2022/06/antisyphon_livestream_v1.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20220817T080000
DTEND;TZID=America/New_York:20220817T140000
DTSTAMP:20260404T055116
CREATED:20220628T214206Z
LAST-MODIFIED:20230829T223957Z
UID:10000930-1660723200-1660744800@www.blackhillsinfosec.com
SUMMARY:Getting Started in Security with BHIS and MITRE ATT&CK w/ John Strand
DESCRIPTION:Register: https://www.antisyphontraining.com/getting-started-in-security-with-bhis-and-mitre-attck-w-john-strand/ \nThis 16-hour (4-days\, 4-hour sessions) information security training class is designed for people who are new to computer security. We will cover the core fundamentals with lots of hands-on labs demonstrating the attacks and defenses every security professional must know to be successful. \nAt Black Hills Information Security we conduct over 500 security assessments per year. This Antisyphon training class takes the top vulnerabilities we discover and boils it down to the top 11 things every organization should be doing to protect themselves. We call this the Atomic Controls. \nWhile many security classes can be overwhelming with the amount of data they force on you in a short period of time\, this class is designed to help you focus on what matters to your day-to-day job. So no\, we are not going to force you to learn archaic technologies and the underpinnings of crypto algorithms. Instead\, we will focus on what actually works for repelling and detecting attackers.
URL:https://www.blackhillsinfosec.com/event/getting-started-in-security-with-bhis-and-mitre-attck-w-john-strand/2022-08-17/
LOCATION:MD
CATEGORIES:Pay What You Can,Training
ATTACH;FMTTYPE=image/jpeg:https://www.blackhillsinfosec.com/wp-content/uploads/2021/10/Training_GettingStarted_BHIMITREATTACK_1920x1080.jpg
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20220817T120000
DTEND;TZID=America/New_York:20220817T160000
DTSTAMP:20260404T055116
CREATED:20220627T205029Z
LAST-MODIFIED:20230209T184749Z
UID:10000840-1660737600-1660752000@www.blackhillsinfosec.com
SUMMARY:HackerOps w/ Ralph May
DESCRIPTION:To conduct an advanced attack\, you need more than just a collection of simple scripts. In addition to talent\, you need a large amount of managed and unmanaged code. The more code and resources that are required to conduct an engagement\, the more time we need. Time is something we don’t have a lot of on an engagement. \nToday\, to be an advanced and effective attacker\, you need to move fast\, and that speed requires a move to a DevOps style of managing infrastructure and code. With cloud resources and APIs to manage these resources\, the days of manual setup are long behind us. \nWhere do we get started? And how does it all work? \nIn this training\, we learn the fundamentals of DevOps and how we can code our TTPs. Coding TTPs allows for new tactics and improved OPSEC to be shared without the cost of knowledge transfer and manual setup. This class will introduce students to Terraform Ansible and Docker with the goal of writing TTPs to use and share. \nIn this class\, we will learn the fundamentals of Terraform Ansible and Docker with an emphasis on how we can use these tools to code our TTPs. After we have the fundamentals\, we will start coding and get comfortable with YAML and will review how to create resources and customize TTPs. Lastly\, we will work through multiple labs and examples that you can take with you for your next engagement. \nhttps://www.antisyphontraining.com/hackerops-w-ralph-may/
URL:https://www.blackhillsinfosec.com/event/hackerops/2022-08-17/
LOCATION:MD
CATEGORIES:Training
ATTACH;FMTTYPE=image/png:https://www.blackhillsinfosec.com/wp-content/uploads/2022/06/hackerops-Training-Graphics.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20220817T120000
DTEND;TZID=America/New_York:20220817T160000
DTSTAMP:20260404T055116
CREATED:20220715T165009Z
LAST-MODIFIED:20220715T165138Z
UID:10000670-1660737600-1660752000@www.blackhillsinfosec.com
SUMMARY:Security Leadership and Management w/ Chris Brenton
DESCRIPTION:https://www.antisyphontraining.com/security-leadership-and-management-w-chris-brenton/
URL:https://www.blackhillsinfosec.com/event/security-leadership-and-management/2022-08-17/
LOCATION:MD
CATEGORIES:Training
ATTACH;FMTTYPE=image/png:https://www.blackhillsinfosec.com/wp-content/uploads/2022/07/sec-leadership-graphic.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20220817T163000
DTEND;TZID=America/New_York:20220817T173000
DTSTAMP:20260404T055116
CREATED:20220624T204221Z
LAST-MODIFIED:20220920T184909Z
UID:10000467-1660753800-1660757400@www.blackhillsinfosec.com
SUMMARY:AASLR: Antisyphon Address Space Layout Randomization
DESCRIPTION:AASLR will have infosec professionals sharing their knowledge on tools\, techniques\, and procedures and then answering a lot of your questions on everything you can think to ask. \nStreamed live every Tuesday and Wednesday @ 4:30 pm. \nhttps://www.twitch.tv/antisyphon
URL:https://www.blackhillsinfosec.com/event/aaslr-antisyphon-address-space-layout-randomization/2022-08-17/
LOCATION:MD
CATEGORIES:Livestream
ATTACH;FMTTYPE=image/png:https://www.blackhillsinfosec.com/wp-content/uploads/2022/06/antisyphon_livestream_v1.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20220818T080000
DTEND;TZID=America/New_York:20220818T140000
DTSTAMP:20260404T055116
CREATED:20220628T214206Z
LAST-MODIFIED:20230829T223957Z
UID:10000931-1660809600-1660831200@www.blackhillsinfosec.com
SUMMARY:Getting Started in Security with BHIS and MITRE ATT&CK w/ John Strand
DESCRIPTION:Register: https://www.antisyphontraining.com/getting-started-in-security-with-bhis-and-mitre-attck-w-john-strand/ \nThis 16-hour (4-days\, 4-hour sessions) information security training class is designed for people who are new to computer security. We will cover the core fundamentals with lots of hands-on labs demonstrating the attacks and defenses every security professional must know to be successful. \nAt Black Hills Information Security we conduct over 500 security assessments per year. This Antisyphon training class takes the top vulnerabilities we discover and boils it down to the top 11 things every organization should be doing to protect themselves. We call this the Atomic Controls. \nWhile many security classes can be overwhelming with the amount of data they force on you in a short period of time\, this class is designed to help you focus on what matters to your day-to-day job. So no\, we are not going to force you to learn archaic technologies and the underpinnings of crypto algorithms. Instead\, we will focus on what actually works for repelling and detecting attackers.
URL:https://www.blackhillsinfosec.com/event/getting-started-in-security-with-bhis-and-mitre-attck-w-john-strand/2022-08-18/
LOCATION:MD
CATEGORIES:Pay What You Can,Training
ATTACH;FMTTYPE=image/jpeg:https://www.blackhillsinfosec.com/wp-content/uploads/2021/10/Training_GettingStarted_BHIMITREATTACK_1920x1080.jpg
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20220818T120000
DTEND;TZID=America/New_York:20220818T160000
DTSTAMP:20260404T055116
CREATED:20220627T205029Z
LAST-MODIFIED:20230209T184749Z
UID:10000841-1660824000-1660838400@www.blackhillsinfosec.com
SUMMARY:HackerOps w/ Ralph May
DESCRIPTION:To conduct an advanced attack\, you need more than just a collection of simple scripts. In addition to talent\, you need a large amount of managed and unmanaged code. The more code and resources that are required to conduct an engagement\, the more time we need. Time is something we don’t have a lot of on an engagement. \nToday\, to be an advanced and effective attacker\, you need to move fast\, and that speed requires a move to a DevOps style of managing infrastructure and code. With cloud resources and APIs to manage these resources\, the days of manual setup are long behind us. \nWhere do we get started? And how does it all work? \nIn this training\, we learn the fundamentals of DevOps and how we can code our TTPs. Coding TTPs allows for new tactics and improved OPSEC to be shared without the cost of knowledge transfer and manual setup. This class will introduce students to Terraform Ansible and Docker with the goal of writing TTPs to use and share. \nIn this class\, we will learn the fundamentals of Terraform Ansible and Docker with an emphasis on how we can use these tools to code our TTPs. After we have the fundamentals\, we will start coding and get comfortable with YAML and will review how to create resources and customize TTPs. Lastly\, we will work through multiple labs and examples that you can take with you for your next engagement. \nhttps://www.antisyphontraining.com/hackerops-w-ralph-may/
URL:https://www.blackhillsinfosec.com/event/hackerops/2022-08-18/
LOCATION:MD
CATEGORIES:Training
ATTACH;FMTTYPE=image/png:https://www.blackhillsinfosec.com/wp-content/uploads/2022/06/hackerops-Training-Graphics.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20220818T120000
DTEND;TZID=America/New_York:20220818T160000
DTSTAMP:20260404T055116
CREATED:20220715T165009Z
LAST-MODIFIED:20220715T165138Z
UID:10000671-1660824000-1660838400@www.blackhillsinfosec.com
SUMMARY:Security Leadership and Management w/ Chris Brenton
DESCRIPTION:https://www.antisyphontraining.com/security-leadership-and-management-w-chris-brenton/
URL:https://www.blackhillsinfosec.com/event/security-leadership-and-management/2022-08-18/
LOCATION:MD
CATEGORIES:Training
ATTACH;FMTTYPE=image/png:https://www.blackhillsinfosec.com/wp-content/uploads/2022/07/sec-leadership-graphic.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20220819T120000
DTEND;TZID=America/New_York:20220819T160000
DTSTAMP:20260404T055116
CREATED:20220627T205029Z
LAST-MODIFIED:20230209T184749Z
UID:10000842-1660910400-1660924800@www.blackhillsinfosec.com
SUMMARY:HackerOps w/ Ralph May
DESCRIPTION:To conduct an advanced attack\, you need more than just a collection of simple scripts. In addition to talent\, you need a large amount of managed and unmanaged code. The more code and resources that are required to conduct an engagement\, the more time we need. Time is something we don’t have a lot of on an engagement. \nToday\, to be an advanced and effective attacker\, you need to move fast\, and that speed requires a move to a DevOps style of managing infrastructure and code. With cloud resources and APIs to manage these resources\, the days of manual setup are long behind us. \nWhere do we get started? And how does it all work? \nIn this training\, we learn the fundamentals of DevOps and how we can code our TTPs. Coding TTPs allows for new tactics and improved OPSEC to be shared without the cost of knowledge transfer and manual setup. This class will introduce students to Terraform Ansible and Docker with the goal of writing TTPs to use and share. \nIn this class\, we will learn the fundamentals of Terraform Ansible and Docker with an emphasis on how we can use these tools to code our TTPs. After we have the fundamentals\, we will start coding and get comfortable with YAML and will review how to create resources and customize TTPs. Lastly\, we will work through multiple labs and examples that you can take with you for your next engagement. \nhttps://www.antisyphontraining.com/hackerops-w-ralph-may/
URL:https://www.blackhillsinfosec.com/event/hackerops/2022-08-19/
LOCATION:MD
CATEGORIES:Training
ATTACH;FMTTYPE=image/png:https://www.blackhillsinfosec.com/wp-content/uploads/2022/06/hackerops-Training-Graphics.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20220819T120000
DTEND;TZID=America/New_York:20220819T160000
DTSTAMP:20260404T055116
CREATED:20220715T165009Z
LAST-MODIFIED:20220715T165138Z
UID:10000672-1660910400-1660924800@www.blackhillsinfosec.com
SUMMARY:Security Leadership and Management w/ Chris Brenton
DESCRIPTION:https://www.antisyphontraining.com/security-leadership-and-management-w-chris-brenton/
URL:https://www.blackhillsinfosec.com/event/security-leadership-and-management/2022-08-19/
LOCATION:MD
CATEGORIES:Training
ATTACH;FMTTYPE=image/png:https://www.blackhillsinfosec.com/wp-content/uploads/2022/07/sec-leadership-graphic.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20220820T120000
DTEND;TZID=America/New_York:20220820T160000
DTSTAMP:20260404T055116
CREATED:20220627T205029Z
LAST-MODIFIED:20230209T184749Z
UID:10000843-1660996800-1661011200@www.blackhillsinfosec.com
SUMMARY:HackerOps w/ Ralph May
DESCRIPTION:To conduct an advanced attack\, you need more than just a collection of simple scripts. In addition to talent\, you need a large amount of managed and unmanaged code. The more code and resources that are required to conduct an engagement\, the more time we need. Time is something we don’t have a lot of on an engagement. \nToday\, to be an advanced and effective attacker\, you need to move fast\, and that speed requires a move to a DevOps style of managing infrastructure and code. With cloud resources and APIs to manage these resources\, the days of manual setup are long behind us. \nWhere do we get started? And how does it all work? \nIn this training\, we learn the fundamentals of DevOps and how we can code our TTPs. Coding TTPs allows for new tactics and improved OPSEC to be shared without the cost of knowledge transfer and manual setup. This class will introduce students to Terraform Ansible and Docker with the goal of writing TTPs to use and share. \nIn this class\, we will learn the fundamentals of Terraform Ansible and Docker with an emphasis on how we can use these tools to code our TTPs. After we have the fundamentals\, we will start coding and get comfortable with YAML and will review how to create resources and customize TTPs. Lastly\, we will work through multiple labs and examples that you can take with you for your next engagement. \nhttps://www.antisyphontraining.com/hackerops-w-ralph-may/
URL:https://www.blackhillsinfosec.com/event/hackerops/2022-08-20/
LOCATION:MD
CATEGORIES:Training
ATTACH;FMTTYPE=image/png:https://www.blackhillsinfosec.com/wp-content/uploads/2022/06/hackerops-Training-Graphics.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20220821T120000
DTEND;TZID=America/New_York:20220821T160000
DTSTAMP:20260404T055116
CREATED:20220627T205029Z
LAST-MODIFIED:20230209T184749Z
UID:10000844-1661083200-1661097600@www.blackhillsinfosec.com
SUMMARY:HackerOps w/ Ralph May
DESCRIPTION:To conduct an advanced attack\, you need more than just a collection of simple scripts. In addition to talent\, you need a large amount of managed and unmanaged code. The more code and resources that are required to conduct an engagement\, the more time we need. Time is something we don’t have a lot of on an engagement. \nToday\, to be an advanced and effective attacker\, you need to move fast\, and that speed requires a move to a DevOps style of managing infrastructure and code. With cloud resources and APIs to manage these resources\, the days of manual setup are long behind us. \nWhere do we get started? And how does it all work? \nIn this training\, we learn the fundamentals of DevOps and how we can code our TTPs. Coding TTPs allows for new tactics and improved OPSEC to be shared without the cost of knowledge transfer and manual setup. This class will introduce students to Terraform Ansible and Docker with the goal of writing TTPs to use and share. \nIn this class\, we will learn the fundamentals of Terraform Ansible and Docker with an emphasis on how we can use these tools to code our TTPs. After we have the fundamentals\, we will start coding and get comfortable with YAML and will review how to create resources and customize TTPs. Lastly\, we will work through multiple labs and examples that you can take with you for your next engagement. \nhttps://www.antisyphontraining.com/hackerops-w-ralph-may/
URL:https://www.blackhillsinfosec.com/event/hackerops/2022-08-21/
LOCATION:MD
CATEGORIES:Training
ATTACH;FMTTYPE=image/png:https://www.blackhillsinfosec.com/wp-content/uploads/2022/06/hackerops-Training-Graphics.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20220822T120000
DTEND;TZID=America/New_York:20220822T160000
DTSTAMP:20260404T055116
CREATED:20220627T205029Z
LAST-MODIFIED:20230209T184749Z
UID:10000845-1661169600-1661184000@www.blackhillsinfosec.com
SUMMARY:HackerOps w/ Ralph May
DESCRIPTION:To conduct an advanced attack\, you need more than just a collection of simple scripts. In addition to talent\, you need a large amount of managed and unmanaged code. The more code and resources that are required to conduct an engagement\, the more time we need. Time is something we don’t have a lot of on an engagement. \nToday\, to be an advanced and effective attacker\, you need to move fast\, and that speed requires a move to a DevOps style of managing infrastructure and code. With cloud resources and APIs to manage these resources\, the days of manual setup are long behind us. \nWhere do we get started? And how does it all work? \nIn this training\, we learn the fundamentals of DevOps and how we can code our TTPs. Coding TTPs allows for new tactics and improved OPSEC to be shared without the cost of knowledge transfer and manual setup. This class will introduce students to Terraform Ansible and Docker with the goal of writing TTPs to use and share. \nIn this class\, we will learn the fundamentals of Terraform Ansible and Docker with an emphasis on how we can use these tools to code our TTPs. After we have the fundamentals\, we will start coding and get comfortable with YAML and will review how to create resources and customize TTPs. Lastly\, we will work through multiple labs and examples that you can take with you for your next engagement. \nhttps://www.antisyphontraining.com/hackerops-w-ralph-may/
URL:https://www.blackhillsinfosec.com/event/hackerops/2022-08-22/
LOCATION:MD
CATEGORIES:Training
ATTACH;FMTTYPE=image/png:https://www.blackhillsinfosec.com/wp-content/uploads/2022/06/hackerops-Training-Graphics.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20220822T163000
DTEND;TZID=America/New_York:20220822T173000
DTSTAMP:20260404T055116
CREATED:20220624T174740Z
LAST-MODIFIED:20220627T143602Z
UID:10000400-1661185800-1661189400@www.blackhillsinfosec.com
SUMMARY:BHIS | Talkin' Bout Infosec News
DESCRIPTION:Join the BHIS team as we talk about current infosec news. \nStreamed live every Monday @ 4:30 pm. \nhttps://www.youtube.com/BlackHillsInformationSecurity
URL:https://www.blackhillsinfosec.com/event/bhis-talkin-bout-infosec-news/2022-08-22/
LOCATION:MD
CATEGORIES:Newscast
ATTACH;FMTTYPE=image/jpeg:https://www.blackhillsinfosec.com/wp-content/uploads/2022/06/MicrosoftTeams-image-10.jpg
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20220823T110000
DTEND;TZID=America/New_York:20220823T160000
DTSTAMP:20260404T055116
CREATED:20220627T205029Z
LAST-MODIFIED:20230209T184749Z
UID:10000582-1661252400-1661270400@www.blackhillsinfosec.com
SUMMARY:HackerOps w/ Ralph May
DESCRIPTION:To conduct an advanced attack\, you need more than just a collection of simple scripts. In addition to talent\, you need a large amount of managed and unmanaged code. The more code and resources that are required to conduct an engagement\, the more time we need. Time is something we don’t have a lot of on an engagement. \nToday\, to be an advanced and effective attacker\, you need to move fast\, and that speed requires a move to a DevOps style of managing infrastructure and code. With cloud resources and APIs to manage these resources\, the days of manual setup are long behind us. \nWhere do we get started? And how does it all work? \nIn this training\, we learn the fundamentals of DevOps and how we can code our TTPs. Coding TTPs allows for new tactics and improved OPSEC to be shared without the cost of knowledge transfer and manual setup. This class will introduce students to Terraform Ansible and Docker with the goal of writing TTPs to use and share. \nIn this class\, we will learn the fundamentals of Terraform Ansible and Docker with an emphasis on how we can use these tools to code our TTPs. After we have the fundamentals\, we will start coding and get comfortable with YAML and will review how to create resources and customize TTPs. Lastly\, we will work through multiple labs and examples that you can take with you for your next engagement. \nhttps://www.antisyphontraining.com/hackerops-w-ralph-may/
URL:https://www.blackhillsinfosec.com/event/hackerops/2022-08-23/1/
LOCATION:MD
CATEGORIES:Training
ATTACH;FMTTYPE=image/png:https://www.blackhillsinfosec.com/wp-content/uploads/2022/06/hackerops-Training-Graphics.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20220823T110000
DTEND;TZID=America/New_York:20220823T160000
DTSTAMP:20260404T055116
CREATED:20220628T211918Z
LAST-MODIFIED:20220719T220333Z
UID:10000642-1661252400-1661270400@www.blackhillsinfosec.com
SUMMARY:Operation Purple w/Tim Schulz
DESCRIPTION:Ever wondered how purple teaming can supercharge your cyber capability? In this 16-hour\, hands-on course\, attendees will learn the balance between threat understanding and detection understanding to run their own purple team exercises. Attendees will start by learning the underlying methodologies that make purple teaming successful and metrics for success before diving into leveraging the ATT&CK framework to create threat informed emulation plans. Once attendees have successfully built plans\, they can leverage tools like SCYTHE or the Slingshot C2 VM to automate the emulation process. Finally\, attendees will learn to identify and build detections to their emulated attacks. \n\n\n\nhttps://www.antisyphontraining.com/operation-purple-w-tim-schulz/
URL:https://www.blackhillsinfosec.com/event/operation-purple-w-tim-schulz/2022-08-23/
LOCATION:MD
CATEGORIES:Training
ATTACH;FMTTYPE=image/png:https://www.blackhillsinfosec.com/wp-content/uploads/2022/06/Operation-Purple-Placeholder-1536x864-1.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20220823T120000
DTEND;TZID=America/New_York:20220823T160000
DTSTAMP:20260404T055116
CREATED:20220627T205029Z
LAST-MODIFIED:20230209T184749Z
UID:10000846-1661256000-1661270400@www.blackhillsinfosec.com
SUMMARY:HackerOps w/ Ralph May
DESCRIPTION:To conduct an advanced attack\, you need more than just a collection of simple scripts. In addition to talent\, you need a large amount of managed and unmanaged code. The more code and resources that are required to conduct an engagement\, the more time we need. Time is something we don’t have a lot of on an engagement. \nToday\, to be an advanced and effective attacker\, you need to move fast\, and that speed requires a move to a DevOps style of managing infrastructure and code. With cloud resources and APIs to manage these resources\, the days of manual setup are long behind us. \nWhere do we get started? And how does it all work? \nIn this training\, we learn the fundamentals of DevOps and how we can code our TTPs. Coding TTPs allows for new tactics and improved OPSEC to be shared without the cost of knowledge transfer and manual setup. This class will introduce students to Terraform Ansible and Docker with the goal of writing TTPs to use and share. \nIn this class\, we will learn the fundamentals of Terraform Ansible and Docker with an emphasis on how we can use these tools to code our TTPs. After we have the fundamentals\, we will start coding and get comfortable with YAML and will review how to create resources and customize TTPs. Lastly\, we will work through multiple labs and examples that you can take with you for your next engagement. \nhttps://www.antisyphontraining.com/hackerops-w-ralph-may/
URL:https://www.blackhillsinfosec.com/event/hackerops/2022-08-23/2/
LOCATION:MD
CATEGORIES:Training
ATTACH;FMTTYPE=image/png:https://www.blackhillsinfosec.com/wp-content/uploads/2022/06/hackerops-Training-Graphics.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20220823T120000
DTEND;TZID=America/New_York:20220823T160000
DTSTAMP:20260404T055116
CREATED:20220715T165308Z
LAST-MODIFIED:20220715T165609Z
UID:10000673-1661256000-1661270400@www.blackhillsinfosec.com
SUMMARY:Enterprise Attack Initial Access w/ Steve Borosh
DESCRIPTION:https://www.antisyphontraining.com/enterprise-attack-initial-access-w-steve-borosh/
URL:https://www.blackhillsinfosec.com/event/enterprise-attack-initial-access-w-steve-borosh/2022-08-23/
LOCATION:MD
CATEGORIES:Training
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20220823T120000
DTEND;TZID=America/New_York:20220823T160000
DTSTAMP:20260404T055116
CREATED:20220719T220809Z
LAST-MODIFIED:20220719T220809Z
UID:10000677-1661256000-1661270400@www.blackhillsinfosec.com
SUMMARY:OWASP TOP 10 w/ Kevin Johnson
DESCRIPTION:Since 2003\, OWASP has released the Top 10 Most Critical Web Application Security Risks list. It has been the basis of much development and consternation\, but do you really understand what each of these issues and their corresponding controls mean? As a developer\, do you know how to prevent these issues? As a security professional\, do you truly know what they are and how to evaluate their effectiveness? \nIn this course\, Secure Ideas will walk attendees through the various items in the latest OWASP Top 10 and corresponding controls. Students will leverage modern applications to explore how the vulnerabilities work and how to find them in their own applications. \nhttps://www.antisyphontraining.com/owasp-top-10/
URL:https://www.blackhillsinfosec.com/event/owasp-top-10-w-kevin-johnson/2022-08-23/
LOCATION:MD
CATEGORIES:Training
ATTACH;FMTTYPE=image/png:https://www.blackhillsinfosec.com/wp-content/uploads/2022/07/OWASP_Top_10-1536x864-1.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20220823T163000
DTEND;TZID=America/New_York:20220823T173000
DTSTAMP:20260404T055116
CREATED:20220624T204221Z
LAST-MODIFIED:20220920T184909Z
UID:10000468-1661272200-1661275800@www.blackhillsinfosec.com
SUMMARY:AASLR: Antisyphon Address Space Layout Randomization
DESCRIPTION:AASLR will have infosec professionals sharing their knowledge on tools\, techniques\, and procedures and then answering a lot of your questions on everything you can think to ask. \nStreamed live every Tuesday and Wednesday @ 4:30 pm. \nhttps://www.twitch.tv/antisyphon
URL:https://www.blackhillsinfosec.com/event/aaslr-antisyphon-address-space-layout-randomization/2022-08-23/
LOCATION:MD
CATEGORIES:Livestream
ATTACH;FMTTYPE=image/png:https://www.blackhillsinfosec.com/wp-content/uploads/2022/06/antisyphon_livestream_v1.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20220824T080000
DTEND;TZID=America/New_York:20220824T170000
DTSTAMP:20260404T055116
CREATED:20220627T205029Z
LAST-MODIFIED:20230209T184749Z
UID:10000847-1661328000-1661360400@www.blackhillsinfosec.com
SUMMARY:HackerOps w/ Ralph May
DESCRIPTION:To conduct an advanced attack\, you need more than just a collection of simple scripts. In addition to talent\, you need a large amount of managed and unmanaged code. The more code and resources that are required to conduct an engagement\, the more time we need. Time is something we don’t have a lot of on an engagement. \nToday\, to be an advanced and effective attacker\, you need to move fast\, and that speed requires a move to a DevOps style of managing infrastructure and code. With cloud resources and APIs to manage these resources\, the days of manual setup are long behind us. \nWhere do we get started? And how does it all work? \nIn this training\, we learn the fundamentals of DevOps and how we can code our TTPs. Coding TTPs allows for new tactics and improved OPSEC to be shared without the cost of knowledge transfer and manual setup. This class will introduce students to Terraform Ansible and Docker with the goal of writing TTPs to use and share. \nIn this class\, we will learn the fundamentals of Terraform Ansible and Docker with an emphasis on how we can use these tools to code our TTPs. After we have the fundamentals\, we will start coding and get comfortable with YAML and will review how to create resources and customize TTPs. Lastly\, we will work through multiple labs and examples that you can take with you for your next engagement. \nhttps://www.antisyphontraining.com/hackerops-w-ralph-may/
URL:https://www.blackhillsinfosec.com/event/hackerops/2022-08-24/1/
LOCATION:MD
CATEGORIES:Training
ATTACH;FMTTYPE=image/png:https://www.blackhillsinfosec.com/wp-content/uploads/2022/06/hackerops-Training-Graphics.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20220824T120000
DTEND;TZID=America/New_York:20220824T160000
DTSTAMP:20260404T055116
CREATED:20220627T205029Z
LAST-MODIFIED:20230209T184749Z
UID:10000583-1661342400-1661356800@www.blackhillsinfosec.com
SUMMARY:HackerOps w/ Ralph May
DESCRIPTION:To conduct an advanced attack\, you need more than just a collection of simple scripts. In addition to talent\, you need a large amount of managed and unmanaged code. The more code and resources that are required to conduct an engagement\, the more time we need. Time is something we don’t have a lot of on an engagement. \nToday\, to be an advanced and effective attacker\, you need to move fast\, and that speed requires a move to a DevOps style of managing infrastructure and code. With cloud resources and APIs to manage these resources\, the days of manual setup are long behind us. \nWhere do we get started? And how does it all work? \nIn this training\, we learn the fundamentals of DevOps and how we can code our TTPs. Coding TTPs allows for new tactics and improved OPSEC to be shared without the cost of knowledge transfer and manual setup. This class will introduce students to Terraform Ansible and Docker with the goal of writing TTPs to use and share. \nIn this class\, we will learn the fundamentals of Terraform Ansible and Docker with an emphasis on how we can use these tools to code our TTPs. After we have the fundamentals\, we will start coding and get comfortable with YAML and will review how to create resources and customize TTPs. Lastly\, we will work through multiple labs and examples that you can take with you for your next engagement. \nhttps://www.antisyphontraining.com/hackerops-w-ralph-may/
URL:https://www.blackhillsinfosec.com/event/hackerops/2022-08-24/2/
LOCATION:MD
CATEGORIES:Training
ATTACH;FMTTYPE=image/png:https://www.blackhillsinfosec.com/wp-content/uploads/2022/06/hackerops-Training-Graphics.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20220824T120000
DTEND;TZID=America/New_York:20220824T160000
DTSTAMP:20260404T055116
CREATED:20220628T211918Z
LAST-MODIFIED:20220719T220333Z
UID:10000643-1661342400-1661356800@www.blackhillsinfosec.com
SUMMARY:Operation Purple w/Tim Schulz
DESCRIPTION:Ever wondered how purple teaming can supercharge your cyber capability? In this 16-hour\, hands-on course\, attendees will learn the balance between threat understanding and detection understanding to run their own purple team exercises. Attendees will start by learning the underlying methodologies that make purple teaming successful and metrics for success before diving into leveraging the ATT&CK framework to create threat informed emulation plans. Once attendees have successfully built plans\, they can leverage tools like SCYTHE or the Slingshot C2 VM to automate the emulation process. Finally\, attendees will learn to identify and build detections to their emulated attacks. \n\n\n\nhttps://www.antisyphontraining.com/operation-purple-w-tim-schulz/
URL:https://www.blackhillsinfosec.com/event/operation-purple-w-tim-schulz/2022-08-24/
LOCATION:MD
CATEGORIES:Training
ATTACH;FMTTYPE=image/png:https://www.blackhillsinfosec.com/wp-content/uploads/2022/06/Operation-Purple-Placeholder-1536x864-1.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20220824T120000
DTEND;TZID=America/New_York:20220824T160000
DTSTAMP:20260404T055116
CREATED:20220715T165308Z
LAST-MODIFIED:20220715T165609Z
UID:10000674-1661342400-1661356800@www.blackhillsinfosec.com
SUMMARY:Enterprise Attack Initial Access w/ Steve Borosh
DESCRIPTION:https://www.antisyphontraining.com/enterprise-attack-initial-access-w-steve-borosh/
URL:https://www.blackhillsinfosec.com/event/enterprise-attack-initial-access-w-steve-borosh/2022-08-24/
LOCATION:MD
CATEGORIES:Training
END:VEVENT
END:VCALENDAR