BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//Black Hills Information Security, Inc. - ECPv6.15.18//NONSGML v1.0//EN
CALSCALE:GREGORIAN
METHOD:PUBLISH
X-WR-CALNAME:Black Hills Information Security, Inc.
X-ORIGINAL-URL:https://www.blackhillsinfosec.com
X-WR-CALDESC:Events for Black Hills Information Security, Inc.
REFRESH-INTERVAL;VALUE=DURATION:PT1H
X-Robots-Tag:noindex
X-PUBLISHED-TTL:PT1H
BEGIN:VTIMEZONE
TZID:America/New_York
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20210314T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20211107T060000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20220313T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20221106T060000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20230312T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20231105T060000
END:STANDARD
END:VTIMEZONE
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20221023T110000
DTEND;TZID=America/New_York:20221023T160000
DTSTAMP:20260405T184328
CREATED:20220822T224537Z
LAST-MODIFIED:20230209T184948Z
UID:10000878-1666522800-1666540800@www.blackhillsinfosec.com
SUMMARY:How to be Irresistible to Hiring Managers w/ Kip Boyle
DESCRIPTION:Register: https://www.antisyphontraining.com/how-to-be-irresistible-to-hiring-managers/ \nAre you spending hours a day trawling through the online job sites and spending even more time filling out lengthy application forms with nothing to show for it? Something’s not working\, but what could it be? Kip Boyle\, a veteran hiring manager who has personally interviewed hundreds of job applicants as well as hired dozens of successful cybersecurity candidates\, will teach you to think like a hiring manager and bend the hiring process to your advantage. After you taking this class\, you’ll understand how to ace your resume\, crush your interviews\, and negotiate your ideal salary.
URL:https://www.blackhillsinfosec.com/event/how-to-be-irresistible-to-hiring-managers-w-kip-boyle/2022-10-23/
LOCATION:FL
CATEGORIES:Training
ATTACH;FMTTYPE=image/png:https://www.blackhillsinfosec.com/wp-content/uploads/2022/08/How_to_be_Irresistible_to_Hiring_Managers_.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20221022T110000
DTEND;TZID=America/New_York:20221022T160000
DTSTAMP:20260405T184328
CREATED:20220822T224537Z
LAST-MODIFIED:20230209T184948Z
UID:10000877-1666436400-1666454400@www.blackhillsinfosec.com
SUMMARY:How to be Irresistible to Hiring Managers w/ Kip Boyle
DESCRIPTION:Register: https://www.antisyphontraining.com/how-to-be-irresistible-to-hiring-managers/ \nAre you spending hours a day trawling through the online job sites and spending even more time filling out lengthy application forms with nothing to show for it? Something’s not working\, but what could it be? Kip Boyle\, a veteran hiring manager who has personally interviewed hundreds of job applicants as well as hired dozens of successful cybersecurity candidates\, will teach you to think like a hiring manager and bend the hiring process to your advantage. After you taking this class\, you’ll understand how to ace your resume\, crush your interviews\, and negotiate your ideal salary.
URL:https://www.blackhillsinfosec.com/event/how-to-be-irresistible-to-hiring-managers-w-kip-boyle/2022-10-22/
LOCATION:FL
CATEGORIES:Training
ATTACH;FMTTYPE=image/png:https://www.blackhillsinfosec.com/wp-content/uploads/2022/08/How_to_be_Irresistible_to_Hiring_Managers_.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20221022T080000
DTEND;TZID=America/New_York:20221023T170000
DTSTAMP:20260405T184328
CREATED:20220920T220720Z
LAST-MODIFIED:20221006T184335Z
UID:10000761-1666425600-1666544400@www.blackhillsinfosec.com
SUMMARY:BSides San Diego
DESCRIPTION:Sponsoring only – BHIS will not be in attendance
URL:https://www.blackhillsinfosec.com/event/bsides-san-diego/
LOCATION:FL
CATEGORIES:Conference
ATTACH;FMTTYPE=image/jpeg:https://www.blackhillsinfosec.com/wp-content/uploads/2022/09/bsidessdlogo.jpeg
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20221021T110000
DTEND;TZID=America/New_York:20221021T160000
DTSTAMP:20260405T184328
CREATED:20220822T224537Z
LAST-MODIFIED:20230209T184948Z
UID:10000876-1666350000-1666368000@www.blackhillsinfosec.com
SUMMARY:How to be Irresistible to Hiring Managers w/ Kip Boyle
DESCRIPTION:Register: https://www.antisyphontraining.com/how-to-be-irresistible-to-hiring-managers/ \nAre you spending hours a day trawling through the online job sites and spending even more time filling out lengthy application forms with nothing to show for it? Something’s not working\, but what could it be? Kip Boyle\, a veteran hiring manager who has personally interviewed hundreds of job applicants as well as hired dozens of successful cybersecurity candidates\, will teach you to think like a hiring manager and bend the hiring process to your advantage. After you taking this class\, you’ll understand how to ace your resume\, crush your interviews\, and negotiate your ideal salary.
URL:https://www.blackhillsinfosec.com/event/how-to-be-irresistible-to-hiring-managers-w-kip-boyle/2022-10-21/
LOCATION:FL
CATEGORIES:Training
ATTACH;FMTTYPE=image/png:https://www.blackhillsinfosec.com/wp-content/uploads/2022/08/How_to_be_Irresistible_to_Hiring_Managers_.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20221020T110000
DTEND;TZID=America/New_York:20221020T160000
DTSTAMP:20260405T184328
CREATED:20220822T224537Z
LAST-MODIFIED:20230209T184948Z
UID:10000875-1666263600-1666281600@www.blackhillsinfosec.com
SUMMARY:How to be Irresistible to Hiring Managers w/ Kip Boyle
DESCRIPTION:Register: https://www.antisyphontraining.com/how-to-be-irresistible-to-hiring-managers/ \nAre you spending hours a day trawling through the online job sites and spending even more time filling out lengthy application forms with nothing to show for it? Something’s not working\, but what could it be? Kip Boyle\, a veteran hiring manager who has personally interviewed hundreds of job applicants as well as hired dozens of successful cybersecurity candidates\, will teach you to think like a hiring manager and bend the hiring process to your advantage. After you taking this class\, you’ll understand how to ace your resume\, crush your interviews\, and negotiate your ideal salary.
URL:https://www.blackhillsinfosec.com/event/how-to-be-irresistible-to-hiring-managers-w-kip-boyle/2022-10-20/
LOCATION:FL
CATEGORIES:Training
ATTACH;FMTTYPE=image/png:https://www.blackhillsinfosec.com/wp-content/uploads/2022/08/How_to_be_Irresistible_to_Hiring_Managers_.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20221019T163000
DTEND;TZID=America/New_York:20221019T173000
DTSTAMP:20260405T184328
CREATED:20220624T204221Z
LAST-MODIFIED:20220920T184909Z
UID:10000485-1666197000-1666200600@www.blackhillsinfosec.com
SUMMARY:AASLR: Antisyphon Address Space Layout Randomization
DESCRIPTION:AASLR will have infosec professionals sharing their knowledge on tools\, techniques\, and procedures and then answering a lot of your questions on everything you can think to ask. \nStreamed live every Tuesday and Wednesday @ 4:30 pm. \nhttps://www.twitch.tv/antisyphon
URL:https://www.blackhillsinfosec.com/event/aaslr-antisyphon-address-space-layout-randomization/2022-10-19/
LOCATION:FL
CATEGORIES:Livestream
ATTACH;FMTTYPE=image/png:https://www.blackhillsinfosec.com/wp-content/uploads/2022/06/antisyphon_livestream_v1.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20221019T110000
DTEND;TZID=America/New_York:20221019T160000
DTSTAMP:20260405T184329
CREATED:20220822T224537Z
LAST-MODIFIED:20230209T184948Z
UID:10000874-1666177200-1666195200@www.blackhillsinfosec.com
SUMMARY:How to be Irresistible to Hiring Managers w/ Kip Boyle
DESCRIPTION:Register: https://www.antisyphontraining.com/how-to-be-irresistible-to-hiring-managers/ \nAre you spending hours a day trawling through the online job sites and spending even more time filling out lengthy application forms with nothing to show for it? Something’s not working\, but what could it be? Kip Boyle\, a veteran hiring manager who has personally interviewed hundreds of job applicants as well as hired dozens of successful cybersecurity candidates\, will teach you to think like a hiring manager and bend the hiring process to your advantage. After you taking this class\, you’ll understand how to ace your resume\, crush your interviews\, and negotiate your ideal salary.
URL:https://www.blackhillsinfosec.com/event/how-to-be-irresistible-to-hiring-managers-w-kip-boyle/2022-10-19/
LOCATION:FL
CATEGORIES:Training
ATTACH;FMTTYPE=image/png:https://www.blackhillsinfosec.com/wp-content/uploads/2022/08/How_to_be_Irresistible_to_Hiring_Managers_.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20221018T163000
DTEND;TZID=America/New_York:20221018T173000
DTSTAMP:20260405T184329
CREATED:20220624T204221Z
LAST-MODIFIED:20220920T184909Z
UID:10000484-1666110600-1666114200@www.blackhillsinfosec.com
SUMMARY:AASLR: Antisyphon Address Space Layout Randomization
DESCRIPTION:AASLR will have infosec professionals sharing their knowledge on tools\, techniques\, and procedures and then answering a lot of your questions on everything you can think to ask. \nStreamed live every Tuesday and Wednesday @ 4:30 pm. \nhttps://www.twitch.tv/antisyphon
URL:https://www.blackhillsinfosec.com/event/aaslr-antisyphon-address-space-layout-randomization/2022-10-18/
LOCATION:FL
CATEGORIES:Livestream
ATTACH;FMTTYPE=image/png:https://www.blackhillsinfosec.com/wp-content/uploads/2022/06/antisyphon_livestream_v1.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20221018T140000
DTEND;TZID=America/New_York:20221018T160000
DTSTAMP:20260405T184329
CREATED:20220822T221830Z
LAST-MODIFIED:20220822T222319Z
UID:10000714-1666101600-1666108800@www.blackhillsinfosec.com
SUMMARY:Professionally Evil CISSP Mentorship Program
DESCRIPTION:Register: https://www.antisyphontraining.com/professionally-evil-cissp-mentorship-program/ \nISC2 describes the CISSP as a way to prove “you have what it takes to effectively design\, implement and manage a best-in-class cybersecurity program”. It is one of the primary certifications used as a stepping point in your cybersecurity career. To accomplish this\, Secure Ideas has developed a mentorship program designed to provide the knowledge necessary to pass the certification\, while working through the common body of knowledge (CBK) in a manner that encourages retention of the knowledge. The mentorship program is designed as a 10-week series of sessions along with various student support and communication methods. These work together to provide the student a solid foundation to not only help in passing the certification but to continue as a collection of information for everyday work. This class is set up to cover the 8 domains of the ISC2 CBK.
URL:https://www.blackhillsinfosec.com/event/professionally-evil-cissp-mentorship-program/2022-10-18/
LOCATION:FL
CATEGORIES:Training
ATTACH;FMTTYPE=image/png:https://www.blackhillsinfosec.com/wp-content/uploads/2022/08/Professionally-Evil-CISSP-Mentorship-Program-updated.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20221018T110000
DTEND;TZID=America/New_York:20221018T160000
DTSTAMP:20260405T184329
CREATED:20220822T224537Z
LAST-MODIFIED:20230209T184948Z
UID:10000873-1666090800-1666108800@www.blackhillsinfosec.com
SUMMARY:How to be Irresistible to Hiring Managers w/ Kip Boyle
DESCRIPTION:Register: https://www.antisyphontraining.com/how-to-be-irresistible-to-hiring-managers/ \nAre you spending hours a day trawling through the online job sites and spending even more time filling out lengthy application forms with nothing to show for it? Something’s not working\, but what could it be? Kip Boyle\, a veteran hiring manager who has personally interviewed hundreds of job applicants as well as hired dozens of successful cybersecurity candidates\, will teach you to think like a hiring manager and bend the hiring process to your advantage. After you taking this class\, you’ll understand how to ace your resume\, crush your interviews\, and negotiate your ideal salary.
URL:https://www.blackhillsinfosec.com/event/how-to-be-irresistible-to-hiring-managers-w-kip-boyle/2022-10-18/
LOCATION:FL
CATEGORIES:Training
ATTACH;FMTTYPE=image/png:https://www.blackhillsinfosec.com/wp-content/uploads/2022/08/How_to_be_Irresistible_to_Hiring_Managers_.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20221017T163000
DTEND;TZID=America/New_York:20221017T173000
DTSTAMP:20260405T184329
CREATED:20220624T174740Z
LAST-MODIFIED:20220627T143602Z
UID:10000408-1666024200-1666027800@www.blackhillsinfosec.com
SUMMARY:BHIS | Talkin' Bout Infosec News
DESCRIPTION:Join the BHIS team as we talk about current infosec news. \nStreamed live every Monday @ 4:30 pm. \nhttps://www.youtube.com/BlackHillsInformationSecurity
URL:https://www.blackhillsinfosec.com/event/bhis-talkin-bout-infosec-news/2022-10-17/
LOCATION:FL
CATEGORIES:Newscast
ATTACH;FMTTYPE=image/jpeg:https://www.blackhillsinfosec.com/wp-content/uploads/2022/06/MicrosoftTeams-image-10.jpg
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20221017T110000
DTEND;TZID=America/New_York:20221017T160000
DTSTAMP:20260405T184329
CREATED:20220822T224537Z
LAST-MODIFIED:20230209T184948Z
UID:10000872-1666004400-1666022400@www.blackhillsinfosec.com
SUMMARY:How to be Irresistible to Hiring Managers w/ Kip Boyle
DESCRIPTION:Register: https://www.antisyphontraining.com/how-to-be-irresistible-to-hiring-managers/ \nAre you spending hours a day trawling through the online job sites and spending even more time filling out lengthy application forms with nothing to show for it? Something’s not working\, but what could it be? Kip Boyle\, a veteran hiring manager who has personally interviewed hundreds of job applicants as well as hired dozens of successful cybersecurity candidates\, will teach you to think like a hiring manager and bend the hiring process to your advantage. After you taking this class\, you’ll understand how to ace your resume\, crush your interviews\, and negotiate your ideal salary.
URL:https://www.blackhillsinfosec.com/event/how-to-be-irresistible-to-hiring-managers-w-kip-boyle/2022-10-17/
LOCATION:FL
CATEGORIES:Training
ATTACH;FMTTYPE=image/png:https://www.blackhillsinfosec.com/wp-content/uploads/2022/08/How_to_be_Irresistible_to_Hiring_Managers_.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20221016T110000
DTEND;TZID=America/New_York:20221016T160000
DTSTAMP:20260405T184329
CREATED:20220822T224537Z
LAST-MODIFIED:20230209T184948Z
UID:10000871-1665918000-1665936000@www.blackhillsinfosec.com
SUMMARY:How to be Irresistible to Hiring Managers w/ Kip Boyle
DESCRIPTION:Register: https://www.antisyphontraining.com/how-to-be-irresistible-to-hiring-managers/ \nAre you spending hours a day trawling through the online job sites and spending even more time filling out lengthy application forms with nothing to show for it? Something’s not working\, but what could it be? Kip Boyle\, a veteran hiring manager who has personally interviewed hundreds of job applicants as well as hired dozens of successful cybersecurity candidates\, will teach you to think like a hiring manager and bend the hiring process to your advantage. After you taking this class\, you’ll understand how to ace your resume\, crush your interviews\, and negotiate your ideal salary.
URL:https://www.blackhillsinfosec.com/event/how-to-be-irresistible-to-hiring-managers-w-kip-boyle/2022-10-16/
LOCATION:FL
CATEGORIES:Training
ATTACH;FMTTYPE=image/png:https://www.blackhillsinfosec.com/wp-content/uploads/2022/08/How_to_be_Irresistible_to_Hiring_Managers_.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20221015T110000
DTEND;TZID=America/New_York:20221015T160000
DTSTAMP:20260405T184329
CREATED:20220822T224537Z
LAST-MODIFIED:20230209T184948Z
UID:10000870-1665831600-1665849600@www.blackhillsinfosec.com
SUMMARY:How to be Irresistible to Hiring Managers w/ Kip Boyle
DESCRIPTION:Register: https://www.antisyphontraining.com/how-to-be-irresistible-to-hiring-managers/ \nAre you spending hours a day trawling through the online job sites and spending even more time filling out lengthy application forms with nothing to show for it? Something’s not working\, but what could it be? Kip Boyle\, a veteran hiring manager who has personally interviewed hundreds of job applicants as well as hired dozens of successful cybersecurity candidates\, will teach you to think like a hiring manager and bend the hiring process to your advantage. After you taking this class\, you’ll understand how to ace your resume\, crush your interviews\, and negotiate your ideal salary.
URL:https://www.blackhillsinfosec.com/event/how-to-be-irresistible-to-hiring-managers-w-kip-boyle/2022-10-15/
LOCATION:FL
CATEGORIES:Training
ATTACH;FMTTYPE=image/png:https://www.blackhillsinfosec.com/wp-content/uploads/2022/08/How_to_be_Irresistible_to_Hiring_Managers_.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20221015T090000
DTEND;TZID=America/New_York:20221015T170000
DTSTAMP:20260405T184329
CREATED:20221006T184225Z
LAST-MODIFIED:20221006T184225Z
UID:10000763-1665824400-1665853200@www.blackhillsinfosec.com
SUMMARY:BSides Raleigh-Durham
DESCRIPTION:Sponsoring only – BHIS will not be in attendance \nSecurity BSides is a community-driven framework for building events for and by cyber security community members. The goal is to expand the spectrum of conversation beyond the traditional confines of space and time. It creates opportunities for individuals to both present and participate in an intimate atmosphere that encourages collaboration. It is an intense event with discussions\, demos\, and interaction from participants. It is where conversations for the next-big-thing are happening. \nSecurity is top of mind across the entire sphere of IT and the world beyond. Therefore\, more people and organizations are interested in the next new thing in security. BSides is the place where these people come to collaborate\, learn and share. \nWith many tech-companies\, colleges and universities in Raleigh\, Durham\, Chapel Hill and surrounding areas\, it is also an international center of innovation in the security industry. \nSecurity B-Sides Raleigh-Durham (B-Sides RDU) is proud to have had great speaker lineups at our events including keynotes by Dan Kaminsky\, Dave Kennedy\, Paul Vixie\, BenTen\, Jay Beale\, G.Mark Hardy\, Cliff Stoll\, Shahid Buttar\, Chris Wysopal and Bruce Potter.
URL:https://www.blackhillsinfosec.com/event/bsides-raleigh-durham/
LOCATION:FL
CATEGORIES:Conference
ATTACH;FMTTYPE=image/png:https://www.blackhillsinfosec.com/wp-content/uploads/2022/10/RDU.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20221014T110000
DTEND;TZID=America/New_York:20221014T160000
DTSTAMP:20260405T184329
CREATED:20220822T224537Z
LAST-MODIFIED:20230209T184948Z
UID:10000869-1665745200-1665763200@www.blackhillsinfosec.com
SUMMARY:How to be Irresistible to Hiring Managers w/ Kip Boyle
DESCRIPTION:Register: https://www.antisyphontraining.com/how-to-be-irresistible-to-hiring-managers/ \nAre you spending hours a day trawling through the online job sites and spending even more time filling out lengthy application forms with nothing to show for it? Something’s not working\, but what could it be? Kip Boyle\, a veteran hiring manager who has personally interviewed hundreds of job applicants as well as hired dozens of successful cybersecurity candidates\, will teach you to think like a hiring manager and bend the hiring process to your advantage. After you taking this class\, you’ll understand how to ace your resume\, crush your interviews\, and negotiate your ideal salary.
URL:https://www.blackhillsinfosec.com/event/how-to-be-irresistible-to-hiring-managers-w-kip-boyle/2022-10-14/
LOCATION:FL
CATEGORIES:Training
ATTACH;FMTTYPE=image/png:https://www.blackhillsinfosec.com/wp-content/uploads/2022/08/How_to_be_Irresistible_to_Hiring_Managers_.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20221013T110000
DTEND;TZID=America/New_York:20221013T160000
DTSTAMP:20260405T184329
CREATED:20220822T224537Z
LAST-MODIFIED:20230209T184948Z
UID:10000868-1665658800-1665676800@www.blackhillsinfosec.com
SUMMARY:How to be Irresistible to Hiring Managers w/ Kip Boyle
DESCRIPTION:Register: https://www.antisyphontraining.com/how-to-be-irresistible-to-hiring-managers/ \nAre you spending hours a day trawling through the online job sites and spending even more time filling out lengthy application forms with nothing to show for it? Something’s not working\, but what could it be? Kip Boyle\, a veteran hiring manager who has personally interviewed hundreds of job applicants as well as hired dozens of successful cybersecurity candidates\, will teach you to think like a hiring manager and bend the hiring process to your advantage. After you taking this class\, you’ll understand how to ace your resume\, crush your interviews\, and negotiate your ideal salary.
URL:https://www.blackhillsinfosec.com/event/how-to-be-irresistible-to-hiring-managers-w-kip-boyle/2022-10-13/
LOCATION:FL
CATEGORIES:Training
ATTACH;FMTTYPE=image/png:https://www.blackhillsinfosec.com/wp-content/uploads/2022/08/How_to_be_Irresistible_to_Hiring_Managers_.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20221012T163000
DTEND;TZID=America/New_York:20221012T173000
DTSTAMP:20260405T184329
CREATED:20220624T204221Z
LAST-MODIFIED:20220920T184909Z
UID:10000483-1665592200-1665595800@www.blackhillsinfosec.com
SUMMARY:AASLR: Antisyphon Address Space Layout Randomization
DESCRIPTION:AASLR will have infosec professionals sharing their knowledge on tools\, techniques\, and procedures and then answering a lot of your questions on everything you can think to ask. \nStreamed live every Tuesday and Wednesday @ 4:30 pm. \nhttps://www.twitch.tv/antisyphon
URL:https://www.blackhillsinfosec.com/event/aaslr-antisyphon-address-space-layout-randomization/2022-10-12/
LOCATION:FL
CATEGORIES:Livestream
ATTACH;FMTTYPE=image/png:https://www.blackhillsinfosec.com/wp-content/uploads/2022/06/antisyphon_livestream_v1.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20221012T110000
DTEND;TZID=America/New_York:20221012T190000
DTSTAMP:20260405T184329
CREATED:20220920T172402Z
LAST-MODIFIED:20230209T215643Z
UID:10000755-1665572400-1665601200@www.blackhillsinfosec.com
SUMMARY:Network Forensics and Incident Response w/ Troy Wojewoda
DESCRIPTION:Register: https://www.antisyphontraining.com/network-forensics-and-detection-w-troy-wojewoda/ \nIncident responders are continually faced with the challenge of collecting and analyzing relevant event data—network communications is no exception. This course uses an assortment of network data acquisition tools and techniques with a focus on open-source\, vendor-neutral solutions. Students who take this course will learn how to perform network traffic and protocol analysis that ultimately supports cybersecurity incident response efforts. From reconnaissance to data exfiltration\, network traffic scales to provide a bird’s-eye view of attacker activity. Leveraging the vantage point of key network traffic chokepoints\, this course explores nearly every phase of an attacker’s methodology. Students will learn network traffic analysis concepts and work through hands-on lab exercises that reinforce the course material using real-world attack scenarios.
URL:https://www.blackhillsinfosec.com/event/network-forensics-and-incident-response-w-troy-wojewoda/2022-10-12/
LOCATION:FL
CATEGORIES:Training
ATTACH;FMTTYPE=image/png:https://www.blackhillsinfosec.com/wp-content/uploads/2022/09/Network-Forensics-Incident-Response-1536x864-1.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20221012T110000
DTEND;TZID=America/New_York:20221012T190000
DTSTAMP:20260405T184329
CREATED:20220920T172139Z
LAST-MODIFIED:20230209T195843Z
UID:10000753-1665572400-1665601200@www.blackhillsinfosec.com
SUMMARY:Modern WebApp Pentesting w/ BB King
DESCRIPTION:Register: https://www.antisyphontraining.com/modern-webapp-pentesting-w-bb-king/ \nModern Webapp Pentesting is unique in its approach to testing webapps. Too many courses are built around the assumption that a webapp pentester’s skills should grow along a straight line\, starting with something like the OWASP Top Ten and culminating in something like Attacking Web Cryptography. Real webapps don’t follow that same path\, and neither should real webapp pentesters. Attacking Web Sockets is not more difficult than attacking HTTP traffic\, it’s just different. Web APIs are not something you’re qualified to test only after you’ve put your time in on traditional webapps … they’re just different. \nThis course doesn’t worry about where a student falls on the imaginary scale of beginner to expert but instead focuses on finding and exploiting the kinds of issues found in real webapps today\, based on the instructor’s many years of ongoing experience in testing … real webapps today.
URL:https://www.blackhillsinfosec.com/event/modern-webapp-pentesting-w-bb-king-2/2022-10-12/
LOCATION:FL
CATEGORIES:Training
ATTACH;FMTTYPE=image/png:https://www.blackhillsinfosec.com/wp-content/uploads/2022/06/modern-webapp-pentesting-graphic-1536x864-1.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20221012T110000
DTEND;TZID=America/New_York:20221012T190000
DTSTAMP:20260405T184329
CREATED:20220920T171744Z
LAST-MODIFIED:20220920T171744Z
UID:10000751-1665572400-1665601200@www.blackhillsinfosec.com
SUMMARY:Operation Purple w/ Tim Schulz
DESCRIPTION:Register: https://www.antisyphontraining.com/operation-purple-w-tim-schulz/ \nEver wondered how purple teaming can supercharge your cyber capability? In this 16-hour\, hands-on course\, attendees will learn the balance between threat understanding and detection understanding to run their own purple team exercises. Attendees will start by learning the underlying methodologies that make purple teaming successful and metrics for success before diving into leveraging the ATT&CK framework to create threat informed emulation plans. Once attendees have successfully built plans\, they can leverage tools like SCYTHE or the Slingshot C2 VM to automate the emulation process. Finally\, attendees will learn to identify and build detections to their emulated attacks.
URL:https://www.blackhillsinfosec.com/event/operation-purple-w-tim-schulz-2/2022-10-12/
LOCATION:FL
CATEGORIES:Training
ATTACH;FMTTYPE=image/png:https://www.blackhillsinfosec.com/wp-content/uploads/2022/09/Operation-Purple-Placeholder-1536x864-1.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20221012T110000
DTEND;TZID=America/New_York:20221012T190000
DTSTAMP:20260405T184329
CREATED:20220920T171541Z
LAST-MODIFIED:20230209T215840Z
UID:10000749-1665572400-1665601200@www.blackhillsinfosec.com
SUMMARY:Offensive Development w/ Greg Hatcher & John Stigerwalt
DESCRIPTION:Register: https://www.antisyphontraining.com/offensive-development-w-greg-hatcher-john-stigerwalt/ \nDive deep into cutting edge techniques that bypass or neuter modern endpoint defenses. Learn how these solutions work to mitigate their utility and hide deep within code on the endpoint. The days of downloading that binary from the internet and pointing it at a remote machine are over. Today’s defenses oftentimes call for multiple bypasses within a single piece of code. \nThis course is designed to take you deep into defensive and offensive tooling – an apex attacker must know the own indicators of compromise (IOCs) they’re creating and the artifacts they’re\nleaving behind.
URL:https://www.blackhillsinfosec.com/event/offensive-development-w-greg-hatcher-john-stigerwalt-2/2022-10-12/
LOCATION:FL
CATEGORIES:Training
ATTACH;FMTTYPE=image/png:https://www.blackhillsinfosec.com/wp-content/uploads/2022/09/Offensive-Development-1536x864-1.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20221012T110000
DTEND;TZID=America/New_York:20221012T190000
DTSTAMP:20260405T184329
CREATED:20220920T171151Z
LAST-MODIFIED:20220920T174647Z
UID:10000747-1665572400-1665601200@www.blackhillsinfosec.com
SUMMARY:Linux Forensics w/ Hal Pomeranz | 16-Hours
DESCRIPTION:Register: https://www.antisyphontraining.com/linux-forensics-w-hal-pomeranz/ \nLinux is everywhere– running in the cloud\, on cell phones\, and in embedded devices that make up the “Internet of Things”. Often neglected by their owners\, vulnerable Linux systems are low-hanging fruit for attackers wishing to create powerful botnets or mine cryptocurrencies. Ransomware-type attacks may target Linux-based database systems and other important infrastructure. \nAs attacks against Linux become more and more common\, there is an increasing demand for skilled Linux investigators. But even experienced forensics professionals may lack sufficient background to properly conduct Linux investigations. Linux is its own particular religion and requires dedicated study and practice to become comfortable. \nThis 16-hour\, hands-on course is a quick start into the world of Linux forensics. Learn how to use memory forensics to rapidly triage systems and spot attacker malware and rootkits. Learn where the most critical on-disk artifacts live and how they can help further an investigation. Rapidly process Linux logs and build a clearer picture of what happened on the system.
URL:https://www.blackhillsinfosec.com/event/linux-forensics-w-hal-pomeranz-16-hours/2022-10-12/
LOCATION:FL
CATEGORIES:Training
ATTACH;FMTTYPE=image/png:https://www.blackhillsinfosec.com/wp-content/uploads/2022/09/Linux-Forensics-1536x864-1.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20221012T110000
DTEND;TZID=America/New_York:20221012T190000
DTSTAMP:20260405T184329
CREATED:20220901T223450Z
LAST-MODIFIED:20220901T223450Z
UID:10000745-1665572400-1665601200@www.blackhillsinfosec.com
SUMMARY:Introduction to Pentesting w/ John Strand
DESCRIPTION:Are you looking to make a transition into pentesting but are overwhelmed or just don’t know how to get started? With numerous different types of engagements\, operational phases\, and a constant flood of new vulnerabilities hitting the industry\, the journey into penetration testing can quickly become confusing. \nIn this training course\, we will examine the different types of penetration testing engagements and take a deep dive into establishing a repeatable testing methodology for executing quality tests. We will look at some tools of the trade to understand what they are doing under the hood\, identify what separates a great finding from a good finding in reports\, and really zero in on establishing your own methodology! \nBy the end of the training\, you can expect to leave with a firm understanding of how pentests are executed and a newfound comfortability performing penetration tests. We will also provide numerous resources and tools that will help you pave your way into a pentesting career!
URL:https://www.blackhillsinfosec.com/event/introduction-to-pentesting-w-john-strand/2022-10-12/
LOCATION:FL
CATEGORIES:Training
ATTACH;FMTTYPE=image/png:https://www.blackhillsinfosec.com/wp-content/uploads/2022/09/Introduction-to-Pentesting.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20221012T110000
DTEND;TZID=America/New_York:20221012T190000
DTSTAMP:20260405T184329
CREATED:20220822T233940Z
LAST-MODIFIED:20220920T171230Z
UID:10000738-1665572400-1665601200@www.blackhillsinfosec.com
SUMMARY:Introduction to IOT Device Hacking w/ Rick Wisser and David Fletcher – 16 Hours
DESCRIPTION:Register: https://wildwesthackinfest.com/antisyphon/introduction-to-iot-device-hacking-w-rick-wisser-and-david-fletcher/ \n\nWith over 21.5 billion interconnected devices in the world and a future estimate of 6.2 trillion devices by 2025\, understanding and learning how to methodologically assess those devices is sure to be a valuable skill. “Introduction to IOT Device Hacking” will present a methodological approach for understanding attack surfaces\, interacting with various protocols and interfaces\, determining exploitative scale\, and ultimately attacking various types of IOT devices. Beginning with reconnaissance and ending with compromising the IOT device\, students will get hands-on experience and valuable skills. This course provides students with a vulnerable device and tools to perform typical attacks using various protocols and interfaces.
URL:https://www.blackhillsinfosec.com/event/introduction-to-iot-device-hacking-w-rick-wisser-and-david-fletcher-16-hours/2022-10-12/
LOCATION:FL
CATEGORIES:Training
ATTACH;FMTTYPE=image/png:https://www.blackhillsinfosec.com/wp-content/uploads/2021/09/antisyphon-final-logo.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20221012T110000
DTEND;TZID=America/New_York:20221012T190000
DTSTAMP:20260405T184329
CREATED:20220822T232602Z
LAST-MODIFIED:20220920T174606Z
UID:10000736-1665572400-1665601200@www.blackhillsinfosec.com
SUMMARY:Hiring Handbook: How to Build an InfoSec Team that Gets Stuff Done w/ Kip Boyle
DESCRIPTION:Register: https://www.antisyphontraining.com/hiring-handbook-how-to-build-an-infosec-team-that-gets-stuff-done-w-kip-boyle/ \nIn this class\, Kip shows InfoSec supervisors how to build the team of their dreams. Students will learn how to attract and retain top tier talent. The kind of talented people who could work anywhere\, but choose to work with you. Team members who get stuff done and don’t think much about changing employers. \nWhat’s more\, this kind of team throws open the door for you to become a powerful influencer on InfoSec strategy with your senior decision makers. Why? Because your team will let you work “on your program” instead of working “in your program.” And that will allow you to spend more time learning about the business your team protects and building relationships with the other top influencers across your organization. \nDuring this workshop\, we’ll be referring to the “Cybersecurity Hiring Manager Handbook” an open source document published under the Creative Commons Attribution 4.0 International (CC BY 4.0) license.
URL:https://www.blackhillsinfosec.com/event/hiring-handbook-how-to-build-an-infosec-team-that-gets-stuff-done-w-kip-boyle-2/2022-10-12/
LOCATION:FL
CATEGORIES:Training
ATTACH;FMTTYPE=image/png:https://www.blackhillsinfosec.com/wp-content/uploads/2022/07/Hiring_Handbook_Graphic.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20221012T110000
DTEND;TZID=America/New_York:20221012T190000
DTSTAMP:20260405T184329
CREATED:20220822T231754Z
LAST-MODIFIED:20230209T184158Z
UID:10000734-1665572400-1665601200@www.blackhillsinfosec.com
SUMMARY:Enterprise Attack Initial Access w/ Steve Borosh
DESCRIPTION:Register: https://www.antisyphontraining.com/enterprise-attack-initial-access-w-steve-borosh/ \nEnterprises have been working tirelessly to improve their security postures through defense-in-depth approaches. Offensive teams have also been putting in long hours of research into bypassing the latest EDR’s and defensive products that keep them on their toes. Long gone “hopefully” are the days of hurdling an HTA file laced with a download cradle at a mature organization with a “Free iPad” ruse and watching your screen fill with incoming agents. \nAn offense-in-depth approach may be applied to offensive practitioners looking for success against organizations well-versed in defending a large enterprise. Today’s organizations have assets in multiple geo regions\, networks\, cloud services\, border hosts\, and many of them are tied to the internal network in some way.\nThis course aims to help offensive practitioners successfully exercise their client environments from a multi-faceted approach using the latest TTPs blended with esoteric practices to gain the upper hand on your assessments.
URL:https://www.blackhillsinfosec.com/event/enterprise-attack-initial-access-w-steve-borosh-2/2022-10-12/
LOCATION:FL
CATEGORIES:Training
ATTACH;FMTTYPE=image/png:https://www.blackhillsinfosec.com/wp-content/uploads/2022/08/Enterprise-Attack-Initial-Access.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20221012T110000
DTEND;TZID=America/New_York:20221012T190000
DTSTAMP:20260405T184329
CREATED:20220822T231448Z
LAST-MODIFIED:20220920T171329Z
UID:10000732-1665572400-1665601200@www.blackhillsinfosec.com
SUMMARY:Defending the Enterprise w/ Kent Ickler and Jordan Drysdale
DESCRIPTION:Register: https://www.antisyphontraining.com/defending-the-enterprise-w-kent-ickler-and-jordan-drysdale/ \nFor the luckiest of enterprises\, the awareness of an insecure environment is proven not in public discord after a breach but instead by effective security penetration tests. Time and time again Jordan and Kent have witnessed organizations struggle with network management\, Active Directory\, organizational change\, and an increasingly experienced adversary. \nFor new and legacy enterprises alike\, Defending the Enterprise explores the configuration practices and opportunities that secure networks\, Windows\, and Active Directory from the most common and effective adversarial techniques. Have the confidence that your organization is prepared for tomorrow’s security threats by learning how to defend against network poisoning\, credential abuse\, exploitable vulnerabilities\, lateral movement\, and privilege escalation. Learn cost-effective mitigations to contemporary adversarial attacks. \nThe best defended networks are those which have matured from countless penetration tests and security incidents. Learn from Kent and Jordan\, two seasoned offensive and defensive security experts\, to shortcut your organization’s security posture into a well-fortified fortress.
URL:https://www.blackhillsinfosec.com/event/defending-the-enterprise-w-kent-ickler-and-jordan-drysdale/2022-10-12/
LOCATION:FL
CATEGORIES:Training
ATTACH;FMTTYPE=image/png:https://www.blackhillsinfosec.com/wp-content/uploads/2016/03/Defending-enterprise-Training-Graphics-1024x576-1.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20221012T110000
DTEND;TZID=America/New_York:20221012T190000
DTSTAMP:20260405T184329
CREATED:20220822T230850Z
LAST-MODIFIED:20230209T184019Z
UID:10000730-1665572400-1665601200@www.blackhillsinfosec.com
SUMMARY:Breaching the Cloud w/ Beau Bullock
DESCRIPTION:Register: https://www.antisyphontraining.com/breaching-the-cloud-w-beau-bullock/ \nDo you want to level up your cloud penetration testing skills? The attack surface of many organizations has changed to include third-party hosted services such as Amazon Web Services\, Microsoft Azure\, and Google Cloud Platform. In this training course\, hacking concepts will be introduced for each of those services. \nThis training walks through a complete penetration testing methodology of cloud-based infrastructure. Starting with no information other than the company name you will learn to discover what cloud-specific assets your target is using. Following the enumeration of cloud services\, you will learn how to discover misconfigurations that commonly expose sensitive data as well as a thorough understanding of how to get an initial foothold into a cloud-based organization. \nPost-compromise techniques of cloud infrastructure differ from the techniques used in typical on-premise environments. You will learn situational awareness techniques that ultimately will impact how you will escalate privileges in the cloud. With most cloud-based authentication being publicly exposed this presents new and interesting persistence techniques that are non-existent to on-premise environments. With productivity tools like G-Suite and Microsoft 365 many organizations are making their email and other data that is normally protected by a firewall available to remote employees. You will learn how to discover\, pillage\, and exfiltrate data from these services. \nMany organizations are fully leveraging cloud services for their production infrastructure. This can include web servers\, SQL databases\, storage\, virtual machines\, and more. In this training\, you will learn how to assess and compromise these resources. Some cloud deployments are directly connected to on-premise environments via VPN. This presents an opportunity to pivot access from cloud to on-prem or vice-versa. \nFinally\, in this training\, we will not only be attacking cloud infrastructure but also leveraging it for red team operations. You will learn techniques that leverage cloud services for techniques such as phishing\, domain fronting\, and command & control. \nTools and techniques used on real-world penetration tests against cloud assets will be shared including hands-on demonstrations. At the end of this training\, you will have new skills for assessing cloud-based infrastructure!
URL:https://www.blackhillsinfosec.com/event/breaching-the-cloud-w-beau-bullock-2/2022-10-12/
LOCATION:FL
CATEGORIES:Training
ATTACH;FMTTYPE=image/jpeg:https://www.blackhillsinfosec.com/wp-content/uploads/2022/06/BreachingCloud_1920x1080-1-1536x864-1.jpeg
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20221012T110000
DTEND;TZID=America/New_York:20221012T190000
DTSTAMP:20260405T184329
CREATED:20220822T230555Z
LAST-MODIFIED:20230209T183606Z
UID:10000728-1665572400-1665601200@www.blackhillsinfosec.com
SUMMARY:Advanced Network Threat Hunting w/ Chris Brenton
DESCRIPTION:Register: https://www.antisyphontraining.com/advanced-network-threat-hunting-w-chris-brenton/ \nSo far we’ve had over 21\,000 students attend our one-day network threat hunting course. Many have asked that we provide an extended class with more hands-on lab time. That is exactly what we have rolled into this 16-hour course! \nWe will spend most of this class analyzing pcap files for Command and Control (C2) communications in order to identify malware back channels. It is assumed that the student will already understand the basics of network threat hunting\, so we can immediately jump into applying that knowledge. The goal will be to create a threat hunting runbook that you can use within your own organization in order to identify systems that have been compromised.
URL:https://www.blackhillsinfosec.com/event/advanced-network-threat-hunting-w-chris-brenton/2022-10-12/
LOCATION:FL
CATEGORIES:Training
ATTACH;FMTTYPE=image/png:https://www.blackhillsinfosec.com/wp-content/uploads/2022/08/Adv-Network-Threat-Hunting-Training-Graphics.png
END:VEVENT
END:VCALENDAR