BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//Black Hills Information Security, Inc. - ECPv6.15.18//NONSGML v1.0//EN
CALSCALE:GREGORIAN
METHOD:PUBLISH
X-WR-CALNAME:Black Hills Information Security, Inc.
X-ORIGINAL-URL:https://www.blackhillsinfosec.com
X-WR-CALDESC:Events for Black Hills Information Security, Inc.
REFRESH-INTERVAL;VALUE=DURATION:PT1H
X-Robots-Tag:noindex
X-PUBLISHED-TTL:PT1H
BEGIN:VTIMEZONE
TZID:America/New_York
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20210314T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20211107T060000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20220313T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20221106T060000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20230312T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20231105T060000
END:STANDARD
END:VTIMEZONE
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20221114T110000
DTEND;TZID=America/New_York:20221114T160000
DTSTAMP:20260404T165804
CREATED:20220628T203522Z
LAST-MODIFIED:20230515T211629Z
UID:10000611-1668423600-1668441600@www.blackhillsinfosec.com
SUMMARY:SOC Core Skills w/ John Strand
DESCRIPTION:Register: https://www.antisyphontraining.com/soc-core-skills-w-john-strand/ \nThis 16-hour information security training course will cover the core security skills all Security Operation Center (SOC) analysts need to have. These are the skills that all Black Hills Information Security (BHIS) SOC team members need to have. \n\n\n 
URL:https://www.blackhillsinfosec.com/event/soc-core-skills-w-john-strand/2022-11-14/
CATEGORIES:Pay What You Can,Training
ATTACH;FMTTYPE=image/png:https://www.blackhillsinfosec.com/wp-content/uploads/2022/06/SOC_CoreSkills_1920x1080.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20221109T163000
DTEND;TZID=America/New_York:20221109T173000
DTSTAMP:20260404T165804
CREATED:20220624T204221Z
LAST-MODIFIED:20220920T184909Z
UID:10000491-1668011400-1668015000@www.blackhillsinfosec.com
SUMMARY:AASLR: Antisyphon Address Space Layout Randomization
DESCRIPTION:AASLR will have infosec professionals sharing their knowledge on tools\, techniques\, and procedures and then answering a lot of your questions on everything you can think to ask. \nStreamed live every Tuesday and Wednesday @ 4:30 pm. \nhttps://www.twitch.tv/antisyphon
URL:https://www.blackhillsinfosec.com/event/aaslr-antisyphon-address-space-layout-randomization/2022-11-09/
CATEGORIES:Livestream
ATTACH;FMTTYPE=image/png:https://www.blackhillsinfosec.com/wp-content/uploads/2022/06/antisyphon_livestream_v1.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20221108T163000
DTEND;TZID=America/New_York:20221108T173000
DTSTAMP:20260404T165804
CREATED:20220624T204221Z
LAST-MODIFIED:20220920T184909Z
UID:10000490-1667925000-1667928600@www.blackhillsinfosec.com
SUMMARY:AASLR: Antisyphon Address Space Layout Randomization
DESCRIPTION:AASLR will have infosec professionals sharing their knowledge on tools\, techniques\, and procedures and then answering a lot of your questions on everything you can think to ask. \nStreamed live every Tuesday and Wednesday @ 4:30 pm. \nhttps://www.twitch.tv/antisyphon
URL:https://www.blackhillsinfosec.com/event/aaslr-antisyphon-address-space-layout-randomization/2022-11-08/
CATEGORIES:Livestream
ATTACH;FMTTYPE=image/png:https://www.blackhillsinfosec.com/wp-content/uploads/2022/06/antisyphon_livestream_v1.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20221108T140000
DTEND;TZID=America/New_York:20221108T160000
DTSTAMP:20260404T165804
CREATED:20220822T221830Z
LAST-MODIFIED:20220822T222319Z
UID:10000717-1667916000-1667923200@www.blackhillsinfosec.com
SUMMARY:Professionally Evil CISSP Mentorship Program
DESCRIPTION:Register: https://www.antisyphontraining.com/professionally-evil-cissp-mentorship-program/ \nISC2 describes the CISSP as a way to prove “you have what it takes to effectively design\, implement and manage a best-in-class cybersecurity program”. It is one of the primary certifications used as a stepping point in your cybersecurity career. To accomplish this\, Secure Ideas has developed a mentorship program designed to provide the knowledge necessary to pass the certification\, while working through the common body of knowledge (CBK) in a manner that encourages retention of the knowledge. The mentorship program is designed as a 10-week series of sessions along with various student support and communication methods. These work together to provide the student a solid foundation to not only help in passing the certification but to continue as a collection of information for everyday work. This class is set up to cover the 8 domains of the ISC2 CBK.
URL:https://www.blackhillsinfosec.com/event/professionally-evil-cissp-mentorship-program/2022-11-08/
CATEGORIES:Training
ATTACH;FMTTYPE=image/png:https://www.blackhillsinfosec.com/wp-content/uploads/2022/08/Professionally-Evil-CISSP-Mentorship-Program-updated.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20221107T163000
DTEND;TZID=America/New_York:20221107T173000
DTSTAMP:20260404T165804
CREATED:20220624T174740Z
LAST-MODIFIED:20220627T143602Z
UID:10000411-1667838600-1667842200@www.blackhillsinfosec.com
SUMMARY:BHIS | Talkin' Bout Infosec News
DESCRIPTION:Join the BHIS team as we talk about current infosec news. \nStreamed live every Monday @ 4:30 pm. \nhttps://www.youtube.com/BlackHillsInformationSecurity
URL:https://www.blackhillsinfosec.com/event/bhis-talkin-bout-infosec-news/2022-11-07/
CATEGORIES:Newscast
ATTACH;FMTTYPE=image/jpeg:https://www.blackhillsinfosec.com/wp-content/uploads/2022/06/MicrosoftTeams-image-10.jpg
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20221103T120000
DTEND;TZID=America/New_York:20221103T160000
DTSTAMP:20260404T165804
CREATED:20220719T221156Z
LAST-MODIFIED:20230209T223825Z
UID:10000687-1667476800-1667491200@www.blackhillsinfosec.com
SUMMARY:Active Defense & Cyber Deception w/ John Strand
DESCRIPTION:Register: https://www.antisyphontraining.com/active-defense-cyber-deception-w-john-strand/ \nActive Defenses have been capturing a large amount of attention in the media lately. There are those who thirst for vengeance and want to directly attack the attackers. There are those who believe that any sort of active response directed at an attacker is wrong. We believe the answer is somewhere in between. \nIn this class\, you will learn how to force an attacker to take more moves to attack your network. These moves may increase your ability to detect them. You will learn how to gain better attribution as to who is attacking you and why. You will also find out how to get access to a bad guy’s system. And most importantly\, you will find out how to do the above legally. \nThe current threat landscape is shifting. Traditional defenses are failing us. We need to develop new strategies to defend ourselves. Even more importantly\, we need to better understand who is attacking us and why. Some of the things we talk about you may implement immediately\, others may take you a while to implement. Either way\, consider what we discuss as a collection of tools at your disposal when you need them to annoy attackers\, attribute who is attacking you\, and finally\, attack the attackers. \nThis class is based on the DARPA funded Active Defense Harbinger Distribution live Linux environment. This VM is built from the ground up for defenders to quickly implement Active Defenses in their environments. This class is also very heavy with hands-on labs. We will not just talk about Active Defenses. We will be doing hands-on labs and through them in a way that can be quickly and easily implemented in your environment.
URL:https://www.blackhillsinfosec.com/event/active-defense-cyber-deception-w-john-strand/2022-11-03/
CATEGORIES:Pay What You Can,Training
ATTACH;FMTTYPE=image/jpeg:https://www.blackhillsinfosec.com/wp-content/uploads/2022/07/ActDefCybDecept_1920x1080.jpg
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20221102T163000
DTEND;TZID=America/New_York:20221102T173000
DTSTAMP:20260404T165804
CREATED:20220624T204221Z
LAST-MODIFIED:20220920T184909Z
UID:10000489-1667406600-1667410200@www.blackhillsinfosec.com
SUMMARY:AASLR: Antisyphon Address Space Layout Randomization
DESCRIPTION:AASLR will have infosec professionals sharing their knowledge on tools\, techniques\, and procedures and then answering a lot of your questions on everything you can think to ask. \nStreamed live every Tuesday and Wednesday @ 4:30 pm. \nhttps://www.twitch.tv/antisyphon
URL:https://www.blackhillsinfosec.com/event/aaslr-antisyphon-address-space-layout-randomization/2022-11-02/
CATEGORIES:Livestream
ATTACH;FMTTYPE=image/png:https://www.blackhillsinfosec.com/wp-content/uploads/2022/06/antisyphon_livestream_v1.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20221102T120000
DTEND;TZID=America/New_York:20221102T160000
DTSTAMP:20260404T165804
CREATED:20220719T221156Z
LAST-MODIFIED:20230209T223825Z
UID:10000686-1667390400-1667404800@www.blackhillsinfosec.com
SUMMARY:Active Defense & Cyber Deception w/ John Strand
DESCRIPTION:Register: https://www.antisyphontraining.com/active-defense-cyber-deception-w-john-strand/ \nActive Defenses have been capturing a large amount of attention in the media lately. There are those who thirst for vengeance and want to directly attack the attackers. There are those who believe that any sort of active response directed at an attacker is wrong. We believe the answer is somewhere in between. \nIn this class\, you will learn how to force an attacker to take more moves to attack your network. These moves may increase your ability to detect them. You will learn how to gain better attribution as to who is attacking you and why. You will also find out how to get access to a bad guy’s system. And most importantly\, you will find out how to do the above legally. \nThe current threat landscape is shifting. Traditional defenses are failing us. We need to develop new strategies to defend ourselves. Even more importantly\, we need to better understand who is attacking us and why. Some of the things we talk about you may implement immediately\, others may take you a while to implement. Either way\, consider what we discuss as a collection of tools at your disposal when you need them to annoy attackers\, attribute who is attacking you\, and finally\, attack the attackers. \nThis class is based on the DARPA funded Active Defense Harbinger Distribution live Linux environment. This VM is built from the ground up for defenders to quickly implement Active Defenses in their environments. This class is also very heavy with hands-on labs. We will not just talk about Active Defenses. We will be doing hands-on labs and through them in a way that can be quickly and easily implemented in your environment.
URL:https://www.blackhillsinfosec.com/event/active-defense-cyber-deception-w-john-strand/2022-11-02/
CATEGORIES:Pay What You Can,Training
ATTACH;FMTTYPE=image/jpeg:https://www.blackhillsinfosec.com/wp-content/uploads/2022/07/ActDefCybDecept_1920x1080.jpg
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20221102T110000
DTEND;TZID=America/New_York:20221102T160000
DTSTAMP:20260404T165804
CREATED:20220920T180353Z
LAST-MODIFIED:20230209T222159Z
UID:10000917-1667386800-1667404800@www.blackhillsinfosec.com
SUMMARY:Red Team Fundamentals for Active Directory w/ Eric Kuehn
DESCRIPTION:Register: https://www.antisyphontraining.com/red-team-fundamentals-for-active-directory/ \nThe Red Team Fundamentals for Active Directory course is an 8-hour class focused on explaining the fundamentals of Active Directory and how different aspects can be exploited when performing penetration tests. The goal is not only to cover different attacks but also explain the details of why they work and how an environment can be made resilient to them and potentially detect malicious activity. This combination opens the course to those looking to hone their offensive skills as well as those who are protecting an enterprise network. \nThe course mixes lecture with a number of hands-on exercises to reinforce the information and techniques. The activities will cover ways to examine an Active Directory environment\, looking for a variety of misconfigurations that are commonly seen in Active Directory implementations (even by some security-conscious entities)\, and then exploit these issues to pivot and escalate our access. Ultimately\, the students will gain full control of an AD Forest. \nWhile in class\, students will be provided access to a lab containing realistic targets and tools to learn both the attacks and defenses of Active Directory. This environment enables the attendees to understand how the covered techniques are used in the real world.
URL:https://www.blackhillsinfosec.com/event/red-team-fundamentals-for-active-directory-w-eric-kuehn-2/2022-11-02/
CATEGORIES:Training
ATTACH;FMTTYPE=image/png:https://www.blackhillsinfosec.com/wp-content/uploads/2022/09/Red_Team_Fundamentals_for_Active_Directory-1536x864-1.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20221102T110000
DTEND;TZID=America/New_York:20221102T160000
DTSTAMP:20260404T165804
CREATED:20220920T180110Z
LAST-MODIFIED:20230209T185807Z
UID:10000889-1667386800-1667404800@www.blackhillsinfosec.com
SUMMARY:Incident Response Foundations w/ Derek Banks
DESCRIPTION:Register: https://www.antisyphontraining.com/incident-response-foundations-w-derek-banks/ \nAre you just getting started with Incident Response (IR) and not sure where to begin? Do you need to stand up an IR program or establish a Computer Security and Incident Response Team and need to get started on the right foot? \nIncident Response can be one of the most difficult aspects of Information Security and foundational skills are critical. \nThe goal of this course is to provide the core components that make up a successful Incident Response program. Students will learn how to get started on their IR journey\, what to prioritize\, and why boring stuff like policies and procedures are just as important as technical digital forensics skills. \nWe will cover the logging and monitoring capabilities necessary to be able to successfully investigate and triage an incident as well as what to do when those log sources fail. The concepts and skills introduced in this class will lay the groundwork for the next steps in the IR journey of in-depth endpoint and network forensics and analysis.
URL:https://www.blackhillsinfosec.com/event/incident-response-foundations-w-derek-banks-2/2022-11-02/
CATEGORIES:Training
ATTACH;FMTTYPE=image/png:https://www.blackhillsinfosec.com/wp-content/uploads/2022/09/Incident_Response_Foundations.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20221101T163000
DTEND;TZID=America/New_York:20221101T173000
DTSTAMP:20260404T165804
CREATED:20220624T204221Z
LAST-MODIFIED:20220920T184909Z
UID:10000488-1667320200-1667323800@www.blackhillsinfosec.com
SUMMARY:AASLR: Antisyphon Address Space Layout Randomization
DESCRIPTION:AASLR will have infosec professionals sharing their knowledge on tools\, techniques\, and procedures and then answering a lot of your questions on everything you can think to ask. \nStreamed live every Tuesday and Wednesday @ 4:30 pm. \nhttps://www.twitch.tv/antisyphon
URL:https://www.blackhillsinfosec.com/event/aaslr-antisyphon-address-space-layout-randomization/2022-11-01/
CATEGORIES:Livestream
ATTACH;FMTTYPE=image/png:https://www.blackhillsinfosec.com/wp-content/uploads/2022/06/antisyphon_livestream_v1.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20221101T140000
DTEND;TZID=America/New_York:20221101T160000
DTSTAMP:20260404T165804
CREATED:20220822T221830Z
LAST-MODIFIED:20220822T222319Z
UID:10000716-1667311200-1667318400@www.blackhillsinfosec.com
SUMMARY:Professionally Evil CISSP Mentorship Program
DESCRIPTION:Register: https://www.antisyphontraining.com/professionally-evil-cissp-mentorship-program/ \nISC2 describes the CISSP as a way to prove “you have what it takes to effectively design\, implement and manage a best-in-class cybersecurity program”. It is one of the primary certifications used as a stepping point in your cybersecurity career. To accomplish this\, Secure Ideas has developed a mentorship program designed to provide the knowledge necessary to pass the certification\, while working through the common body of knowledge (CBK) in a manner that encourages retention of the knowledge. The mentorship program is designed as a 10-week series of sessions along with various student support and communication methods. These work together to provide the student a solid foundation to not only help in passing the certification but to continue as a collection of information for everyday work. This class is set up to cover the 8 domains of the ISC2 CBK.
URL:https://www.blackhillsinfosec.com/event/professionally-evil-cissp-mentorship-program/2022-11-01/
CATEGORIES:Training
ATTACH;FMTTYPE=image/png:https://www.blackhillsinfosec.com/wp-content/uploads/2022/08/Professionally-Evil-CISSP-Mentorship-Program-updated.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20221101T120000
DTEND;TZID=America/New_York:20221101T160000
DTSTAMP:20260404T165804
CREATED:20220719T221156Z
LAST-MODIFIED:20230209T223825Z
UID:10000685-1667304000-1667318400@www.blackhillsinfosec.com
SUMMARY:Active Defense & Cyber Deception w/ John Strand
DESCRIPTION:Register: https://www.antisyphontraining.com/active-defense-cyber-deception-w-john-strand/ \nActive Defenses have been capturing a large amount of attention in the media lately. There are those who thirst for vengeance and want to directly attack the attackers. There are those who believe that any sort of active response directed at an attacker is wrong. We believe the answer is somewhere in between. \nIn this class\, you will learn how to force an attacker to take more moves to attack your network. These moves may increase your ability to detect them. You will learn how to gain better attribution as to who is attacking you and why. You will also find out how to get access to a bad guy’s system. And most importantly\, you will find out how to do the above legally. \nThe current threat landscape is shifting. Traditional defenses are failing us. We need to develop new strategies to defend ourselves. Even more importantly\, we need to better understand who is attacking us and why. Some of the things we talk about you may implement immediately\, others may take you a while to implement. Either way\, consider what we discuss as a collection of tools at your disposal when you need them to annoy attackers\, attribute who is attacking you\, and finally\, attack the attackers. \nThis class is based on the DARPA funded Active Defense Harbinger Distribution live Linux environment. This VM is built from the ground up for defenders to quickly implement Active Defenses in their environments. This class is also very heavy with hands-on labs. We will not just talk about Active Defenses. We will be doing hands-on labs and through them in a way that can be quickly and easily implemented in your environment.
URL:https://www.blackhillsinfosec.com/event/active-defense-cyber-deception-w-john-strand/2022-11-01/
CATEGORIES:Pay What You Can,Training
ATTACH;FMTTYPE=image/jpeg:https://www.blackhillsinfosec.com/wp-content/uploads/2022/07/ActDefCybDecept_1920x1080.jpg
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20221101T110000
DTEND;TZID=America/New_York:20221101T160000
DTSTAMP:20260404T165804
CREATED:20220920T180353Z
LAST-MODIFIED:20230209T222159Z
UID:10000916-1667300400-1667318400@www.blackhillsinfosec.com
SUMMARY:Red Team Fundamentals for Active Directory w/ Eric Kuehn
DESCRIPTION:Register: https://www.antisyphontraining.com/red-team-fundamentals-for-active-directory/ \nThe Red Team Fundamentals for Active Directory course is an 8-hour class focused on explaining the fundamentals of Active Directory and how different aspects can be exploited when performing penetration tests. The goal is not only to cover different attacks but also explain the details of why they work and how an environment can be made resilient to them and potentially detect malicious activity. This combination opens the course to those looking to hone their offensive skills as well as those who are protecting an enterprise network. \nThe course mixes lecture with a number of hands-on exercises to reinforce the information and techniques. The activities will cover ways to examine an Active Directory environment\, looking for a variety of misconfigurations that are commonly seen in Active Directory implementations (even by some security-conscious entities)\, and then exploit these issues to pivot and escalate our access. Ultimately\, the students will gain full control of an AD Forest. \nWhile in class\, students will be provided access to a lab containing realistic targets and tools to learn both the attacks and defenses of Active Directory. This environment enables the attendees to understand how the covered techniques are used in the real world.
URL:https://www.blackhillsinfosec.com/event/red-team-fundamentals-for-active-directory-w-eric-kuehn-2/2022-11-01/
CATEGORIES:Training
ATTACH;FMTTYPE=image/png:https://www.blackhillsinfosec.com/wp-content/uploads/2022/09/Red_Team_Fundamentals_for_Active_Directory-1536x864-1.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20221101T110000
DTEND;TZID=America/New_York:20221101T160000
DTSTAMP:20260404T165804
CREATED:20220920T180110Z
LAST-MODIFIED:20230209T185807Z
UID:10000888-1667300400-1667318400@www.blackhillsinfosec.com
SUMMARY:Incident Response Foundations w/ Derek Banks
DESCRIPTION:Register: https://www.antisyphontraining.com/incident-response-foundations-w-derek-banks/ \nAre you just getting started with Incident Response (IR) and not sure where to begin? Do you need to stand up an IR program or establish a Computer Security and Incident Response Team and need to get started on the right foot? \nIncident Response can be one of the most difficult aspects of Information Security and foundational skills are critical. \nThe goal of this course is to provide the core components that make up a successful Incident Response program. Students will learn how to get started on their IR journey\, what to prioritize\, and why boring stuff like policies and procedures are just as important as technical digital forensics skills. \nWe will cover the logging and monitoring capabilities necessary to be able to successfully investigate and triage an incident as well as what to do when those log sources fail. The concepts and skills introduced in this class will lay the groundwork for the next steps in the IR journey of in-depth endpoint and network forensics and analysis.
URL:https://www.blackhillsinfosec.com/event/incident-response-foundations-w-derek-banks-2/2022-11-01/
CATEGORIES:Training
ATTACH;FMTTYPE=image/png:https://www.blackhillsinfosec.com/wp-content/uploads/2022/09/Incident_Response_Foundations.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20221031T163000
DTEND;TZID=America/New_York:20221031T173000
DTSTAMP:20260404T165804
CREATED:20220624T174740Z
LAST-MODIFIED:20220627T143602Z
UID:10000410-1667233800-1667237400@www.blackhillsinfosec.com
SUMMARY:BHIS | Talkin' Bout Infosec News
DESCRIPTION:Join the BHIS team as we talk about current infosec news. \nStreamed live every Monday @ 4:30 pm. \nhttps://www.youtube.com/BlackHillsInformationSecurity
URL:https://www.blackhillsinfosec.com/event/bhis-talkin-bout-infosec-news/2022-10-31/
CATEGORIES:Newscast
ATTACH;FMTTYPE=image/jpeg:https://www.blackhillsinfosec.com/wp-content/uploads/2022/06/MicrosoftTeams-image-10.jpg
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20221031T110000
DTEND;TZID=America/New_York:20221031T160000
DTSTAMP:20260404T165804
CREATED:20220719T221156Z
LAST-MODIFIED:20230209T223825Z
UID:10000684-1667214000-1667232000@www.blackhillsinfosec.com
SUMMARY:Active Defense & Cyber Deception w/ John Strand
DESCRIPTION:Register: https://www.antisyphontraining.com/active-defense-cyber-deception-w-john-strand/ \nActive Defenses have been capturing a large amount of attention in the media lately. There are those who thirst for vengeance and want to directly attack the attackers. There are those who believe that any sort of active response directed at an attacker is wrong. We believe the answer is somewhere in between. \nIn this class\, you will learn how to force an attacker to take more moves to attack your network. These moves may increase your ability to detect them. You will learn how to gain better attribution as to who is attacking you and why. You will also find out how to get access to a bad guy’s system. And most importantly\, you will find out how to do the above legally. \nThe current threat landscape is shifting. Traditional defenses are failing us. We need to develop new strategies to defend ourselves. Even more importantly\, we need to better understand who is attacking us and why. Some of the things we talk about you may implement immediately\, others may take you a while to implement. Either way\, consider what we discuss as a collection of tools at your disposal when you need them to annoy attackers\, attribute who is attacking you\, and finally\, attack the attackers. \nThis class is based on the DARPA funded Active Defense Harbinger Distribution live Linux environment. This VM is built from the ground up for defenders to quickly implement Active Defenses in their environments. This class is also very heavy with hands-on labs. We will not just talk about Active Defenses. We will be doing hands-on labs and through them in a way that can be quickly and easily implemented in your environment.
URL:https://www.blackhillsinfosec.com/event/active-defense-cyber-deception-w-john-strand/2022-10-31/
CATEGORIES:Pay What You Can,Training
ATTACH;FMTTYPE=image/jpeg:https://www.blackhillsinfosec.com/wp-content/uploads/2022/07/ActDefCybDecept_1920x1080.jpg
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20221028T110000
DTEND;TZID=America/New_York:20221028T160000
DTSTAMP:20260404T165804
CREATED:20220822T224537Z
LAST-MODIFIED:20230209T184948Z
UID:10000885-1666954800-1666972800@www.blackhillsinfosec.com
SUMMARY:How to be Irresistible to Hiring Managers w/ Kip Boyle
DESCRIPTION:Register: https://www.antisyphontraining.com/how-to-be-irresistible-to-hiring-managers/ \nAre you spending hours a day trawling through the online job sites and spending even more time filling out lengthy application forms with nothing to show for it? Something’s not working\, but what could it be? Kip Boyle\, a veteran hiring manager who has personally interviewed hundreds of job applicants as well as hired dozens of successful cybersecurity candidates\, will teach you to think like a hiring manager and bend the hiring process to your advantage. After you taking this class\, you’ll understand how to ace your resume\, crush your interviews\, and negotiate your ideal salary.
URL:https://www.blackhillsinfosec.com/event/how-to-be-irresistible-to-hiring-managers-w-kip-boyle/2022-10-28/2/
CATEGORIES:Training
ATTACH;FMTTYPE=image/png:https://www.blackhillsinfosec.com/wp-content/uploads/2022/08/How_to_be_Irresistible_to_Hiring_Managers_.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20221028T080000
DTEND;TZID=America/New_York:20221028T170000
DTSTAMP:20260404T165804
CREATED:20220822T224537Z
LAST-MODIFIED:20230209T184948Z
UID:10000884-1666944000-1666976400@www.blackhillsinfosec.com
SUMMARY:How to be Irresistible to Hiring Managers w/ Kip Boyle
DESCRIPTION:Register: https://www.antisyphontraining.com/how-to-be-irresistible-to-hiring-managers/ \nAre you spending hours a day trawling through the online job sites and spending even more time filling out lengthy application forms with nothing to show for it? Something’s not working\, but what could it be? Kip Boyle\, a veteran hiring manager who has personally interviewed hundreds of job applicants as well as hired dozens of successful cybersecurity candidates\, will teach you to think like a hiring manager and bend the hiring process to your advantage. After you taking this class\, you’ll understand how to ace your resume\, crush your interviews\, and negotiate your ideal salary.
URL:https://www.blackhillsinfosec.com/event/how-to-be-irresistible-to-hiring-managers-w-kip-boyle/2022-10-28/1/
CATEGORIES:Training
ATTACH;FMTTYPE=image/png:https://www.blackhillsinfosec.com/wp-content/uploads/2022/08/How_to_be_Irresistible_to_Hiring_Managers_.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20221027T130000
DTEND;TZID=America/New_York:20221027T140000
DTSTAMP:20260404T165804
CREATED:20221017T200511Z
LAST-MODIFIED:20221018T131535Z
UID:10000768-1666875600-1666879200@www.blackhillsinfosec.com
SUMMARY:BHIS Webcast: Tactics\, Techniques\, and Procedures (TTPs) with Chris Traynor
DESCRIPTION:Thursday\, October 27\, 2022 – 1 pm EST (UTC -4) \nRegister: https://zoom.us/webinar/register/WN_ZswxCZ-pT9G99X3-vEWFxw \nPenetration Testing is often considered a dark art that’s shrouded in mystery. This unfortunate perception can hold back organizations from being more secure and keep people from an exciting career. \nIn this Black Hills Information Security (BHIS) webcast\, join Chris Traynor (@cstraynor) as he shares the tactics\, techniques\, and procedures (TTPs) for a Pen Tester in this introductory webcast. \nChat with your fellow attendees in the Infosec Knowledge Sharing Discord server here: https://discord.gg/fr5wqbF — in the #webcast-live-chat channel.
URL:https://www.blackhillsinfosec.com/event/bhis-webcast-pentester-techniques-tools-and-procedures-ttps-with-chris-traynor/
CATEGORIES:BHIS Webcast
ATTACH;FMTTYPE=image/jpeg:https://www.blackhillsinfosec.com/wp-content/uploads/2022/10/311918128_783002259471927_4020012564900763753_n-e1666033543783.jpg
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20221027T120000
DTEND;TZID=America/New_York:20221027T160000
DTSTAMP:20260404T165804
CREATED:20220628T214206Z
LAST-MODIFIED:20230829T223957Z
UID:10000659-1666872000-1666886400@www.blackhillsinfosec.com
SUMMARY:Getting Started in Security with BHIS and MITRE ATT&CK w/ John Strand
DESCRIPTION:Register: https://www.antisyphontraining.com/getting-started-in-security-with-bhis-and-mitre-attck-w-john-strand/ \nThis 16-hour (4-days\, 4-hour sessions) information security training class is designed for people who are new to computer security. We will cover the core fundamentals with lots of hands-on labs demonstrating the attacks and defenses every security professional must know to be successful. \nAt Black Hills Information Security we conduct over 500 security assessments per year. This Antisyphon training class takes the top vulnerabilities we discover and boils it down to the top 11 things every organization should be doing to protect themselves. We call this the Atomic Controls. \nWhile many security classes can be overwhelming with the amount of data they force on you in a short period of time\, this class is designed to help you focus on what matters to your day-to-day job. So no\, we are not going to force you to learn archaic technologies and the underpinnings of crypto algorithms. Instead\, we will focus on what actually works for repelling and detecting attackers.
URL:https://www.blackhillsinfosec.com/event/getting-started-in-security-with-bhis-and-mitre-attck-w-john-strand/2022-10-27/
CATEGORIES:Pay What You Can,Training
ATTACH;FMTTYPE=image/jpeg:https://www.blackhillsinfosec.com/wp-content/uploads/2021/10/Training_GettingStarted_BHIMITREATTACK_1920x1080.jpg
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20221027T110000
DTEND;TZID=America/New_York:20221027T160000
DTSTAMP:20260404T165804
CREATED:20220822T224537Z
LAST-MODIFIED:20230209T184948Z
UID:10000883-1666868400-1666886400@www.blackhillsinfosec.com
SUMMARY:How to be Irresistible to Hiring Managers w/ Kip Boyle
DESCRIPTION:Register: https://www.antisyphontraining.com/how-to-be-irresistible-to-hiring-managers/ \nAre you spending hours a day trawling through the online job sites and spending even more time filling out lengthy application forms with nothing to show for it? Something’s not working\, but what could it be? Kip Boyle\, a veteran hiring manager who has personally interviewed hundreds of job applicants as well as hired dozens of successful cybersecurity candidates\, will teach you to think like a hiring manager and bend the hiring process to your advantage. After you taking this class\, you’ll understand how to ace your resume\, crush your interviews\, and negotiate your ideal salary.
URL:https://www.blackhillsinfosec.com/event/how-to-be-irresistible-to-hiring-managers-w-kip-boyle/2022-10-27/2/
CATEGORIES:Training
ATTACH;FMTTYPE=image/png:https://www.blackhillsinfosec.com/wp-content/uploads/2022/08/How_to_be_Irresistible_to_Hiring_Managers_.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20221027T080000
DTEND;TZID=America/New_York:20221027T170000
DTSTAMP:20260404T165804
CREATED:20220822T224537Z
LAST-MODIFIED:20230209T184948Z
UID:10000882-1666857600-1666890000@www.blackhillsinfosec.com
SUMMARY:How to be Irresistible to Hiring Managers w/ Kip Boyle
DESCRIPTION:Register: https://www.antisyphontraining.com/how-to-be-irresistible-to-hiring-managers/ \nAre you spending hours a day trawling through the online job sites and spending even more time filling out lengthy application forms with nothing to show for it? Something’s not working\, but what could it be? Kip Boyle\, a veteran hiring manager who has personally interviewed hundreds of job applicants as well as hired dozens of successful cybersecurity candidates\, will teach you to think like a hiring manager and bend the hiring process to your advantage. After you taking this class\, you’ll understand how to ace your resume\, crush your interviews\, and negotiate your ideal salary.
URL:https://www.blackhillsinfosec.com/event/how-to-be-irresistible-to-hiring-managers-w-kip-boyle/2022-10-27/1/
CATEGORIES:Training
ATTACH;FMTTYPE=image/png:https://www.blackhillsinfosec.com/wp-content/uploads/2022/08/How_to_be_Irresistible_to_Hiring_Managers_.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20221026T163000
DTEND;TZID=America/New_York:20221026T173000
DTSTAMP:20260404T165804
CREATED:20220624T204221Z
LAST-MODIFIED:20220920T184909Z
UID:10000487-1666801800-1666805400@www.blackhillsinfosec.com
SUMMARY:AASLR: Antisyphon Address Space Layout Randomization
DESCRIPTION:AASLR will have infosec professionals sharing their knowledge on tools\, techniques\, and procedures and then answering a lot of your questions on everything you can think to ask. \nStreamed live every Tuesday and Wednesday @ 4:30 pm. \nhttps://www.twitch.tv/antisyphon
URL:https://www.blackhillsinfosec.com/event/aaslr-antisyphon-address-space-layout-randomization/2022-10-26/
CATEGORIES:Livestream
ATTACH;FMTTYPE=image/png:https://www.blackhillsinfosec.com/wp-content/uploads/2022/06/antisyphon_livestream_v1.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20221026T120000
DTEND;TZID=America/New_York:20221026T160000
DTSTAMP:20260404T165804
CREATED:20220628T214206Z
LAST-MODIFIED:20230829T223957Z
UID:10000658-1666785600-1666800000@www.blackhillsinfosec.com
SUMMARY:Getting Started in Security with BHIS and MITRE ATT&CK w/ John Strand
DESCRIPTION:Register: https://www.antisyphontraining.com/getting-started-in-security-with-bhis-and-mitre-attck-w-john-strand/ \nThis 16-hour (4-days\, 4-hour sessions) information security training class is designed for people who are new to computer security. We will cover the core fundamentals with lots of hands-on labs demonstrating the attacks and defenses every security professional must know to be successful. \nAt Black Hills Information Security we conduct over 500 security assessments per year. This Antisyphon training class takes the top vulnerabilities we discover and boils it down to the top 11 things every organization should be doing to protect themselves. We call this the Atomic Controls. \nWhile many security classes can be overwhelming with the amount of data they force on you in a short period of time\, this class is designed to help you focus on what matters to your day-to-day job. So no\, we are not going to force you to learn archaic technologies and the underpinnings of crypto algorithms. Instead\, we will focus on what actually works for repelling and detecting attackers.
URL:https://www.blackhillsinfosec.com/event/getting-started-in-security-with-bhis-and-mitre-attck-w-john-strand/2022-10-26/
CATEGORIES:Pay What You Can,Training
ATTACH;FMTTYPE=image/jpeg:https://www.blackhillsinfosec.com/wp-content/uploads/2021/10/Training_GettingStarted_BHIMITREATTACK_1920x1080.jpg
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20221026T110000
DTEND;TZID=America/New_York:20221026T160000
DTSTAMP:20260404T165804
CREATED:20220920T175300Z
LAST-MODIFIED:20220920T175300Z
UID:10000915-1666782000-1666800000@www.blackhillsinfosec.com
SUMMARY:Professionally Evil API Testing
DESCRIPTION:Register: https://www.antisyphontraining.com/professionally-evil-api-testing/ \n\n\nThis workshop-style intermediate course is designed to complement a student’s understanding of traditional Web Application Security. It focuses on modern application and API security features and tactics to protect APIs and microservices from attacks. Because the material in this course leans on standard HTTP and browser features\, and standard web and API security best practices\, the lessons and labs are applicable across programming languages and platform implementations. This material in this course is approached both from the perspective of an adversary and that of a defender.
URL:https://www.blackhillsinfosec.com/event/professionally-evil-api-testing/2022-10-26/
CATEGORIES:Training
ATTACH;FMTTYPE=image/png:https://www.blackhillsinfosec.com/wp-content/uploads/2022/09/Professionally-Evil-API-Cory-Sabol-Temp-1536x864-1.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20221026T110000
DTEND;TZID=America/New_York:20221026T160000
DTSTAMP:20260404T165804
CREATED:20220822T224537Z
LAST-MODIFIED:20230209T184948Z
UID:10000881-1666782000-1666800000@www.blackhillsinfosec.com
SUMMARY:How to be Irresistible to Hiring Managers w/ Kip Boyle
DESCRIPTION:Register: https://www.antisyphontraining.com/how-to-be-irresistible-to-hiring-managers/ \nAre you spending hours a day trawling through the online job sites and spending even more time filling out lengthy application forms with nothing to show for it? Something’s not working\, but what could it be? Kip Boyle\, a veteran hiring manager who has personally interviewed hundreds of job applicants as well as hired dozens of successful cybersecurity candidates\, will teach you to think like a hiring manager and bend the hiring process to your advantage. After you taking this class\, you’ll understand how to ace your resume\, crush your interviews\, and negotiate your ideal salary.
URL:https://www.blackhillsinfosec.com/event/how-to-be-irresistible-to-hiring-managers-w-kip-boyle/2022-10-26/2/
CATEGORIES:Training
ATTACH;FMTTYPE=image/png:https://www.blackhillsinfosec.com/wp-content/uploads/2022/08/How_to_be_Irresistible_to_Hiring_Managers_.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20221026T080000
DTEND;TZID=America/New_York:20221026T170000
DTSTAMP:20260404T165804
CREATED:20220822T224537Z
LAST-MODIFIED:20230209T184948Z
UID:10000880-1666771200-1666803600@www.blackhillsinfosec.com
SUMMARY:How to be Irresistible to Hiring Managers w/ Kip Boyle
DESCRIPTION:Register: https://www.antisyphontraining.com/how-to-be-irresistible-to-hiring-managers/ \nAre you spending hours a day trawling through the online job sites and spending even more time filling out lengthy application forms with nothing to show for it? Something’s not working\, but what could it be? Kip Boyle\, a veteran hiring manager who has personally interviewed hundreds of job applicants as well as hired dozens of successful cybersecurity candidates\, will teach you to think like a hiring manager and bend the hiring process to your advantage. After you taking this class\, you’ll understand how to ace your resume\, crush your interviews\, and negotiate your ideal salary.
URL:https://www.blackhillsinfosec.com/event/how-to-be-irresistible-to-hiring-managers-w-kip-boyle/2022-10-26/1/
CATEGORIES:Training
ATTACH;FMTTYPE=image/png:https://www.blackhillsinfosec.com/wp-content/uploads/2022/08/How_to_be_Irresistible_to_Hiring_Managers_.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20221025T163000
DTEND;TZID=America/New_York:20221025T173000
DTSTAMP:20260404T165804
CREATED:20220624T204221Z
LAST-MODIFIED:20220920T184909Z
UID:10000486-1666715400-1666719000@www.blackhillsinfosec.com
SUMMARY:AASLR: Antisyphon Address Space Layout Randomization
DESCRIPTION:AASLR will have infosec professionals sharing their knowledge on tools\, techniques\, and procedures and then answering a lot of your questions on everything you can think to ask. \nStreamed live every Tuesday and Wednesday @ 4:30 pm. \nhttps://www.twitch.tv/antisyphon
URL:https://www.blackhillsinfosec.com/event/aaslr-antisyphon-address-space-layout-randomization/2022-10-25/
CATEGORIES:Livestream
ATTACH;FMTTYPE=image/png:https://www.blackhillsinfosec.com/wp-content/uploads/2022/06/antisyphon_livestream_v1.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20221025T140000
DTEND;TZID=America/New_York:20221025T160000
DTSTAMP:20260404T165804
CREATED:20220822T221830Z
LAST-MODIFIED:20220822T222319Z
UID:10000715-1666706400-1666713600@www.blackhillsinfosec.com
SUMMARY:Professionally Evil CISSP Mentorship Program
DESCRIPTION:Register: https://www.antisyphontraining.com/professionally-evil-cissp-mentorship-program/ \nISC2 describes the CISSP as a way to prove “you have what it takes to effectively design\, implement and manage a best-in-class cybersecurity program”. It is one of the primary certifications used as a stepping point in your cybersecurity career. To accomplish this\, Secure Ideas has developed a mentorship program designed to provide the knowledge necessary to pass the certification\, while working through the common body of knowledge (CBK) in a manner that encourages retention of the knowledge. The mentorship program is designed as a 10-week series of sessions along with various student support and communication methods. These work together to provide the student a solid foundation to not only help in passing the certification but to continue as a collection of information for everyday work. This class is set up to cover the 8 domains of the ISC2 CBK.
URL:https://www.blackhillsinfosec.com/event/professionally-evil-cissp-mentorship-program/2022-10-25/
CATEGORIES:Training
ATTACH;FMTTYPE=image/png:https://www.blackhillsinfosec.com/wp-content/uploads/2022/08/Professionally-Evil-CISSP-Mentorship-Program-updated.png
END:VEVENT
END:VCALENDAR