BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//Black Hills Information Security, Inc. - ECPv6.15.19//NONSGML v1.0//EN
CALSCALE:GREGORIAN
METHOD:PUBLISH
X-WR-CALNAME:Black Hills Information Security, Inc.
X-ORIGINAL-URL:https://www.blackhillsinfosec.com
X-WR-CALDESC:Events for Black Hills Information Security, Inc.
REFRESH-INTERVAL;VALUE=DURATION:PT1H
X-Robots-Tag:noindex
X-PUBLISHED-TTL:PT1H
BEGIN:VTIMEZONE
TZID:America/New_York
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20210314T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20211107T060000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20220313T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20221106T060000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20230312T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20231105T060000
END:STANDARD
END:VTIMEZONE
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20220709T120000
DTEND;TZID=America/New_York:20220709T160000
DTSTAMP:20260408T050106
CREATED:20220627T205029Z
LAST-MODIFIED:20230209T184749Z
UID:10000801-1657368000-1657382400@www.blackhillsinfosec.com
SUMMARY:HackerOps w/ Ralph May
DESCRIPTION:To conduct an advanced attack\, you need more than just a collection of simple scripts. In addition to talent\, you need a large amount of managed and unmanaged code. The more code and resources that are required to conduct an engagement\, the more time we need. Time is something we don’t have a lot of on an engagement. \nToday\, to be an advanced and effective attacker\, you need to move fast\, and that speed requires a move to a DevOps style of managing infrastructure and code. With cloud resources and APIs to manage these resources\, the days of manual setup are long behind us. \nWhere do we get started? And how does it all work? \nIn this training\, we learn the fundamentals of DevOps and how we can code our TTPs. Coding TTPs allows for new tactics and improved OPSEC to be shared without the cost of knowledge transfer and manual setup. This class will introduce students to Terraform Ansible and Docker with the goal of writing TTPs to use and share. \nIn this class\, we will learn the fundamentals of Terraform Ansible and Docker with an emphasis on how we can use these tools to code our TTPs. After we have the fundamentals\, we will start coding and get comfortable with YAML and will review how to create resources and customize TTPs. Lastly\, we will work through multiple labs and examples that you can take with you for your next engagement. \nhttps://www.antisyphontraining.com/hackerops-w-ralph-may/
URL:https://www.blackhillsinfosec.com/event/hackerops/2022-07-09/
LOCATION:IL
CATEGORIES:Training
ATTACH;FMTTYPE=image/png:https://www.blackhillsinfosec.com/wp-content/uploads/2022/06/hackerops-Training-Graphics.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20220708T120000
DTEND;TZID=America/New_York:20220708T160000
DTSTAMP:20260408T050106
CREATED:20220627T205029Z
LAST-MODIFIED:20230209T184749Z
UID:10000800-1657281600-1657296000@www.blackhillsinfosec.com
SUMMARY:HackerOps w/ Ralph May
DESCRIPTION:To conduct an advanced attack\, you need more than just a collection of simple scripts. In addition to talent\, you need a large amount of managed and unmanaged code. The more code and resources that are required to conduct an engagement\, the more time we need. Time is something we don’t have a lot of on an engagement. \nToday\, to be an advanced and effective attacker\, you need to move fast\, and that speed requires a move to a DevOps style of managing infrastructure and code. With cloud resources and APIs to manage these resources\, the days of manual setup are long behind us. \nWhere do we get started? And how does it all work? \nIn this training\, we learn the fundamentals of DevOps and how we can code our TTPs. Coding TTPs allows for new tactics and improved OPSEC to be shared without the cost of knowledge transfer and manual setup. This class will introduce students to Terraform Ansible and Docker with the goal of writing TTPs to use and share. \nIn this class\, we will learn the fundamentals of Terraform Ansible and Docker with an emphasis on how we can use these tools to code our TTPs. After we have the fundamentals\, we will start coding and get comfortable with YAML and will review how to create resources and customize TTPs. Lastly\, we will work through multiple labs and examples that you can take with you for your next engagement. \nhttps://www.antisyphontraining.com/hackerops-w-ralph-may/
URL:https://www.blackhillsinfosec.com/event/hackerops/2022-07-08/
LOCATION:IL
CATEGORIES:Training
ATTACH;FMTTYPE=image/png:https://www.blackhillsinfosec.com/wp-content/uploads/2022/06/hackerops-Training-Graphics.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20220708T090000
DTEND;TZID=America/New_York:20220708T170000
DTSTAMP:20260408T050106
CREATED:20220624T203040Z
LAST-MODIFIED:20220624T203220Z
UID:10000450-1657270800-1657299600@www.blackhillsinfosec.com
SUMMARY:BSides Pittsburgh
DESCRIPTION:
URL:https://www.blackhillsinfosec.com/event/bsides-pittsburgh/
LOCATION:Rivers Casino\, 777 Casino Drive\, Pittsburgh\, PA\, 15212\, United States
CATEGORIES:Conference
ATTACH;FMTTYPE=image/png:https://www.blackhillsinfosec.com/wp-content/uploads/2022/06/BSidesForever.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20220707T170000
DTEND;TZID=America/New_York:20220707T190000
DTSTAMP:20260408T050106
CREATED:20220624T202741Z
LAST-MODIFIED:20220624T202741Z
UID:10000449-1657213200-1657220400@www.blackhillsinfosec.com
SUMMARY:Pittsburgh Meet-up
DESCRIPTION:Hi friends! \nThe Black Hills Team is in town for BSides Pittsburgh on Friday\, July 8th\, and we would love to catch up with you the Thursday before! \nIf you’d like to hang out with us\, hang out with each other\, and pick up some cool swag\, RSVP so we’ll know how to plan. \nhttp://evite.me/zvFgU39ANJ
URL:https://www.blackhillsinfosec.com/event/pittsburgh-meet-up/
LOCATION:East End Brewing Company\, 147 Julius St.\, Pittsburgh\, PA\, 15206\, United States
CATEGORIES:Meet-up
ATTACH;FMTTYPE=image/png:https://www.blackhillsinfosec.com/wp-content/uploads/2022/06/Screen-Shot-2022-06-24-at-3.25.34-PM.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20220707T120000
DTEND;TZID=America/New_York:20220707T160000
DTSTAMP:20260408T050106
CREATED:20220627T205029Z
LAST-MODIFIED:20230209T184749Z
UID:10000799-1657195200-1657209600@www.blackhillsinfosec.com
SUMMARY:HackerOps w/ Ralph May
DESCRIPTION:To conduct an advanced attack\, you need more than just a collection of simple scripts. In addition to talent\, you need a large amount of managed and unmanaged code. The more code and resources that are required to conduct an engagement\, the more time we need. Time is something we don’t have a lot of on an engagement. \nToday\, to be an advanced and effective attacker\, you need to move fast\, and that speed requires a move to a DevOps style of managing infrastructure and code. With cloud resources and APIs to manage these resources\, the days of manual setup are long behind us. \nWhere do we get started? And how does it all work? \nIn this training\, we learn the fundamentals of DevOps and how we can code our TTPs. Coding TTPs allows for new tactics and improved OPSEC to be shared without the cost of knowledge transfer and manual setup. This class will introduce students to Terraform Ansible and Docker with the goal of writing TTPs to use and share. \nIn this class\, we will learn the fundamentals of Terraform Ansible and Docker with an emphasis on how we can use these tools to code our TTPs. After we have the fundamentals\, we will start coding and get comfortable with YAML and will review how to create resources and customize TTPs. Lastly\, we will work through multiple labs and examples that you can take with you for your next engagement. \nhttps://www.antisyphontraining.com/hackerops-w-ralph-may/
URL:https://www.blackhillsinfosec.com/event/hackerops/2022-07-07/
LOCATION:IL
CATEGORIES:Training
ATTACH;FMTTYPE=image/png:https://www.blackhillsinfosec.com/wp-content/uploads/2022/06/hackerops-Training-Graphics.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20220706T163000
DTEND;TZID=America/New_York:20220706T173000
DTSTAMP:20260408T050106
CREATED:20220624T204221Z
LAST-MODIFIED:20220920T184909Z
UID:10000455-1657125000-1657128600@www.blackhillsinfosec.com
SUMMARY:AASLR: Antisyphon Address Space Layout Randomization
DESCRIPTION:AASLR will have infosec professionals sharing their knowledge on tools\, techniques\, and procedures and then answering a lot of your questions on everything you can think to ask. \nStreamed live every Tuesday and Wednesday @ 4:30 pm. \nhttps://www.twitch.tv/antisyphon
URL:https://www.blackhillsinfosec.com/event/aaslr-antisyphon-address-space-layout-randomization/2022-07-06/
LOCATION:IL
CATEGORIES:Livestream
ATTACH;FMTTYPE=image/png:https://www.blackhillsinfosec.com/wp-content/uploads/2022/06/antisyphon_livestream_v1.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20220706T120000
DTEND;TZID=America/New_York:20220706T160000
DTSTAMP:20260408T050106
CREATED:20220627T205029Z
LAST-MODIFIED:20230209T184749Z
UID:10000798-1657108800-1657123200@www.blackhillsinfosec.com
SUMMARY:HackerOps w/ Ralph May
DESCRIPTION:To conduct an advanced attack\, you need more than just a collection of simple scripts. In addition to talent\, you need a large amount of managed and unmanaged code. The more code and resources that are required to conduct an engagement\, the more time we need. Time is something we don’t have a lot of on an engagement. \nToday\, to be an advanced and effective attacker\, you need to move fast\, and that speed requires a move to a DevOps style of managing infrastructure and code. With cloud resources and APIs to manage these resources\, the days of manual setup are long behind us. \nWhere do we get started? And how does it all work? \nIn this training\, we learn the fundamentals of DevOps and how we can code our TTPs. Coding TTPs allows for new tactics and improved OPSEC to be shared without the cost of knowledge transfer and manual setup. This class will introduce students to Terraform Ansible and Docker with the goal of writing TTPs to use and share. \nIn this class\, we will learn the fundamentals of Terraform Ansible and Docker with an emphasis on how we can use these tools to code our TTPs. After we have the fundamentals\, we will start coding and get comfortable with YAML and will review how to create resources and customize TTPs. Lastly\, we will work through multiple labs and examples that you can take with you for your next engagement. \nhttps://www.antisyphontraining.com/hackerops-w-ralph-may/
URL:https://www.blackhillsinfosec.com/event/hackerops/2022-07-06/
LOCATION:IL
CATEGORIES:Training
ATTACH;FMTTYPE=image/png:https://www.blackhillsinfosec.com/wp-content/uploads/2022/06/hackerops-Training-Graphics.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20220705T163000
DTEND;TZID=America/New_York:20220705T173000
DTSTAMP:20260408T050106
CREATED:20220624T204221Z
LAST-MODIFIED:20220920T184909Z
UID:10000454-1657038600-1657042200@www.blackhillsinfosec.com
SUMMARY:AASLR: Antisyphon Address Space Layout Randomization
DESCRIPTION:AASLR will have infosec professionals sharing their knowledge on tools\, techniques\, and procedures and then answering a lot of your questions on everything you can think to ask. \nStreamed live every Tuesday and Wednesday @ 4:30 pm. \nhttps://www.twitch.tv/antisyphon
URL:https://www.blackhillsinfosec.com/event/aaslr-antisyphon-address-space-layout-randomization/2022-07-05/
LOCATION:IL
CATEGORIES:Livestream
ATTACH;FMTTYPE=image/png:https://www.blackhillsinfosec.com/wp-content/uploads/2022/06/antisyphon_livestream_v1.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20220705T120000
DTEND;TZID=America/New_York:20220705T160000
DTSTAMP:20260408T050106
CREATED:20220627T205029Z
LAST-MODIFIED:20230209T184749Z
UID:10000797-1657022400-1657036800@www.blackhillsinfosec.com
SUMMARY:HackerOps w/ Ralph May
DESCRIPTION:To conduct an advanced attack\, you need more than just a collection of simple scripts. In addition to talent\, you need a large amount of managed and unmanaged code. The more code and resources that are required to conduct an engagement\, the more time we need. Time is something we don’t have a lot of on an engagement. \nToday\, to be an advanced and effective attacker\, you need to move fast\, and that speed requires a move to a DevOps style of managing infrastructure and code. With cloud resources and APIs to manage these resources\, the days of manual setup are long behind us. \nWhere do we get started? And how does it all work? \nIn this training\, we learn the fundamentals of DevOps and how we can code our TTPs. Coding TTPs allows for new tactics and improved OPSEC to be shared without the cost of knowledge transfer and manual setup. This class will introduce students to Terraform Ansible and Docker with the goal of writing TTPs to use and share. \nIn this class\, we will learn the fundamentals of Terraform Ansible and Docker with an emphasis on how we can use these tools to code our TTPs. After we have the fundamentals\, we will start coding and get comfortable with YAML and will review how to create resources and customize TTPs. Lastly\, we will work through multiple labs and examples that you can take with you for your next engagement. \nhttps://www.antisyphontraining.com/hackerops-w-ralph-may/
URL:https://www.blackhillsinfosec.com/event/hackerops/2022-07-05/
LOCATION:IL
CATEGORIES:Training
ATTACH;FMTTYPE=image/png:https://www.blackhillsinfosec.com/wp-content/uploads/2022/06/hackerops-Training-Graphics.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20220704T163000
DTEND;TZID=America/New_York:20220704T173000
DTSTAMP:20260408T050106
CREATED:20220624T174740Z
LAST-MODIFIED:20220627T143602Z
UID:10000393-1656952200-1656955800@www.blackhillsinfosec.com
SUMMARY:BHIS | Talkin' Bout Infosec News
DESCRIPTION:Join the BHIS team as we talk about current infosec news. \nStreamed live every Monday @ 4:30 pm. \nhttps://www.youtube.com/BlackHillsInformationSecurity
URL:https://www.blackhillsinfosec.com/event/bhis-talkin-bout-infosec-news/2022-07-04/
LOCATION:IL
CATEGORIES:Newscast
ATTACH;FMTTYPE=image/jpeg:https://www.blackhillsinfosec.com/wp-content/uploads/2022/06/MicrosoftTeams-image-10.jpg
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20220704T120000
DTEND;TZID=America/New_York:20220704T160000
DTSTAMP:20260408T050106
CREATED:20220627T205029Z
LAST-MODIFIED:20230209T184749Z
UID:10000796-1656936000-1656950400@www.blackhillsinfosec.com
SUMMARY:HackerOps w/ Ralph May
DESCRIPTION:To conduct an advanced attack\, you need more than just a collection of simple scripts. In addition to talent\, you need a large amount of managed and unmanaged code. The more code and resources that are required to conduct an engagement\, the more time we need. Time is something we don’t have a lot of on an engagement. \nToday\, to be an advanced and effective attacker\, you need to move fast\, and that speed requires a move to a DevOps style of managing infrastructure and code. With cloud resources and APIs to manage these resources\, the days of manual setup are long behind us. \nWhere do we get started? And how does it all work? \nIn this training\, we learn the fundamentals of DevOps and how we can code our TTPs. Coding TTPs allows for new tactics and improved OPSEC to be shared without the cost of knowledge transfer and manual setup. This class will introduce students to Terraform Ansible and Docker with the goal of writing TTPs to use and share. \nIn this class\, we will learn the fundamentals of Terraform Ansible and Docker with an emphasis on how we can use these tools to code our TTPs. After we have the fundamentals\, we will start coding and get comfortable with YAML and will review how to create resources and customize TTPs. Lastly\, we will work through multiple labs and examples that you can take with you for your next engagement. \nhttps://www.antisyphontraining.com/hackerops-w-ralph-may/
URL:https://www.blackhillsinfosec.com/event/hackerops/2022-07-04/
LOCATION:IL
CATEGORIES:Training
ATTACH;FMTTYPE=image/png:https://www.blackhillsinfosec.com/wp-content/uploads/2022/06/hackerops-Training-Graphics.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20220703T120000
DTEND;TZID=America/New_York:20220703T160000
DTSTAMP:20260408T050106
CREATED:20220627T205029Z
LAST-MODIFIED:20230209T184749Z
UID:10000795-1656849600-1656864000@www.blackhillsinfosec.com
SUMMARY:HackerOps w/ Ralph May
DESCRIPTION:To conduct an advanced attack\, you need more than just a collection of simple scripts. In addition to talent\, you need a large amount of managed and unmanaged code. The more code and resources that are required to conduct an engagement\, the more time we need. Time is something we don’t have a lot of on an engagement. \nToday\, to be an advanced and effective attacker\, you need to move fast\, and that speed requires a move to a DevOps style of managing infrastructure and code. With cloud resources and APIs to manage these resources\, the days of manual setup are long behind us. \nWhere do we get started? And how does it all work? \nIn this training\, we learn the fundamentals of DevOps and how we can code our TTPs. Coding TTPs allows for new tactics and improved OPSEC to be shared without the cost of knowledge transfer and manual setup. This class will introduce students to Terraform Ansible and Docker with the goal of writing TTPs to use and share. \nIn this class\, we will learn the fundamentals of Terraform Ansible and Docker with an emphasis on how we can use these tools to code our TTPs. After we have the fundamentals\, we will start coding and get comfortable with YAML and will review how to create resources and customize TTPs. Lastly\, we will work through multiple labs and examples that you can take with you for your next engagement. \nhttps://www.antisyphontraining.com/hackerops-w-ralph-may/
URL:https://www.blackhillsinfosec.com/event/hackerops/2022-07-03/
LOCATION:IL
CATEGORIES:Training
ATTACH;FMTTYPE=image/png:https://www.blackhillsinfosec.com/wp-content/uploads/2022/06/hackerops-Training-Graphics.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20220702T120000
DTEND;TZID=America/New_York:20220702T160000
DTSTAMP:20260408T050106
CREATED:20220627T205029Z
LAST-MODIFIED:20230209T184749Z
UID:10000794-1656763200-1656777600@www.blackhillsinfosec.com
SUMMARY:HackerOps w/ Ralph May
DESCRIPTION:To conduct an advanced attack\, you need more than just a collection of simple scripts. In addition to talent\, you need a large amount of managed and unmanaged code. The more code and resources that are required to conduct an engagement\, the more time we need. Time is something we don’t have a lot of on an engagement. \nToday\, to be an advanced and effective attacker\, you need to move fast\, and that speed requires a move to a DevOps style of managing infrastructure and code. With cloud resources and APIs to manage these resources\, the days of manual setup are long behind us. \nWhere do we get started? And how does it all work? \nIn this training\, we learn the fundamentals of DevOps and how we can code our TTPs. Coding TTPs allows for new tactics and improved OPSEC to be shared without the cost of knowledge transfer and manual setup. This class will introduce students to Terraform Ansible and Docker with the goal of writing TTPs to use and share. \nIn this class\, we will learn the fundamentals of Terraform Ansible and Docker with an emphasis on how we can use these tools to code our TTPs. After we have the fundamentals\, we will start coding and get comfortable with YAML and will review how to create resources and customize TTPs. Lastly\, we will work through multiple labs and examples that you can take with you for your next engagement. \nhttps://www.antisyphontraining.com/hackerops-w-ralph-may/
URL:https://www.blackhillsinfosec.com/event/hackerops/2022-07-02/
LOCATION:IL
CATEGORIES:Training
ATTACH;FMTTYPE=image/png:https://www.blackhillsinfosec.com/wp-content/uploads/2022/06/hackerops-Training-Graphics.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20220701T120000
DTEND;TZID=America/New_York:20220701T160000
DTSTAMP:20260408T050106
CREATED:20220627T205029Z
LAST-MODIFIED:20230209T184749Z
UID:10000793-1656676800-1656691200@www.blackhillsinfosec.com
SUMMARY:HackerOps w/ Ralph May
DESCRIPTION:To conduct an advanced attack\, you need more than just a collection of simple scripts. In addition to talent\, you need a large amount of managed and unmanaged code. The more code and resources that are required to conduct an engagement\, the more time we need. Time is something we don’t have a lot of on an engagement. \nToday\, to be an advanced and effective attacker\, you need to move fast\, and that speed requires a move to a DevOps style of managing infrastructure and code. With cloud resources and APIs to manage these resources\, the days of manual setup are long behind us. \nWhere do we get started? And how does it all work? \nIn this training\, we learn the fundamentals of DevOps and how we can code our TTPs. Coding TTPs allows for new tactics and improved OPSEC to be shared without the cost of knowledge transfer and manual setup. This class will introduce students to Terraform Ansible and Docker with the goal of writing TTPs to use and share. \nIn this class\, we will learn the fundamentals of Terraform Ansible and Docker with an emphasis on how we can use these tools to code our TTPs. After we have the fundamentals\, we will start coding and get comfortable with YAML and will review how to create resources and customize TTPs. Lastly\, we will work through multiple labs and examples that you can take with you for your next engagement. \nhttps://www.antisyphontraining.com/hackerops-w-ralph-may/
URL:https://www.blackhillsinfosec.com/event/hackerops/2022-07-01/
LOCATION:IL
CATEGORIES:Training
ATTACH;FMTTYPE=image/png:https://www.blackhillsinfosec.com/wp-content/uploads/2022/06/hackerops-Training-Graphics.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20220630T130000
DTEND;TZID=America/New_York:20220630T140000
DTSTAMP:20260408T050106
CREATED:20220628T214903Z
LAST-MODIFIED:20220628T214903Z
UID:10000666-1656594000-1656597600@www.blackhillsinfosec.com
SUMMARY:Getting Started with eBPF for Monitoring | Hal Pomeranz & Jon Reeve | 1-Hour
DESCRIPTION:In this Antisyphon Anti-cast\, Hal Pomeranz & Jon Reeve will focus on how to get you up and running with eBPF as an essential monitoring platform. \nYou may have heard of eBPF as an alternative for network filtering and security policy enforcement. But as with any deep inspection platform\, eBPF provides unparalleled visibility into what is happening in your Linux operating system from moment to moment. \nThis talk will get you up and running with eBPF as an essential monitoring platform\, and contrast what is available via eBPF vs the auditd output that you may be used to. \nWe’ll also have team Spyderbat drop by to show you what a mature security alerting system based on eBPF can look like. \nChat with your fellow attendees in the Infosec Knowledge Sharing Discord server here: https://discord.gg/fr5wqbF — in the #webcast-live-chat channel. \nhttps://zoom.us/webinar/register/WN_k1ixHAGSSIqx8iq-J3b9kg
URL:https://www.blackhillsinfosec.com/event/getting-started-with-ebpf-for-monitoring-hal-pomeranz-jon-reeve-1-hour/
LOCATION:IL
CATEGORIES:BHIS Webcast
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20220630T120000
DTEND;TZID=America/New_York:20220630T160000
DTSTAMP:20260408T050106
CREATED:20220627T205029Z
LAST-MODIFIED:20230209T184749Z
UID:10000581-1656590400-1656604800@www.blackhillsinfosec.com
SUMMARY:HackerOps w/ Ralph May
DESCRIPTION:To conduct an advanced attack\, you need more than just a collection of simple scripts. In addition to talent\, you need a large amount of managed and unmanaged code. The more code and resources that are required to conduct an engagement\, the more time we need. Time is something we don’t have a lot of on an engagement. \nToday\, to be an advanced and effective attacker\, you need to move fast\, and that speed requires a move to a DevOps style of managing infrastructure and code. With cloud resources and APIs to manage these resources\, the days of manual setup are long behind us. \nWhere do we get started? And how does it all work? \nIn this training\, we learn the fundamentals of DevOps and how we can code our TTPs. Coding TTPs allows for new tactics and improved OPSEC to be shared without the cost of knowledge transfer and manual setup. This class will introduce students to Terraform Ansible and Docker with the goal of writing TTPs to use and share. \nIn this class\, we will learn the fundamentals of Terraform Ansible and Docker with an emphasis on how we can use these tools to code our TTPs. After we have the fundamentals\, we will start coding and get comfortable with YAML and will review how to create resources and customize TTPs. Lastly\, we will work through multiple labs and examples that you can take with you for your next engagement. \nhttps://www.antisyphontraining.com/hackerops-w-ralph-may/
URL:https://www.blackhillsinfosec.com/event/hackerops/2022-06-30/
LOCATION:IL
CATEGORIES:Training
ATTACH;FMTTYPE=image/png:https://www.blackhillsinfosec.com/wp-content/uploads/2022/06/hackerops-Training-Graphics.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20220630T120000
DTEND;TZID=America/New_York:20220630T160000
DTSTAMP:20260408T050106
CREATED:20220627T202859Z
LAST-MODIFIED:20220920T181251Z
UID:10000571-1656590400-1656604800@www.blackhillsinfosec.com
SUMMARY:Security Defense and Detection TTX w/ Amanda Berlin and Jeremy Mio
DESCRIPTION:Security Defense and Detection TTX is a comprehensive four-day tabletop exercise that involves the introduction to completion of security TTXs (tabletop exercises)\, IR playbooks\, and after-action reports. The exercises are paired with video and lab demonstrations that reinforce their purpose. The training as a whole is compatible with the world’s most popular RPG rules. \nThe preparation phase will walk students through the creation of specific IR playbooks that can be utilized in any environment as well as during later parts of the class. The next phase introduces the gamification of the TTXs. The students split up into separate “corporations” with assigned verticals\, hit points\, armor class\, budgets\, strengths\, and weaknesses. Selection of departments and skills allow the players to further their modifiers. Throughout the exercise\, each company will take turns rolling their way through decisions such as large purchases\, attack severity\, defense capability\, and incident response decisions. \nhttps://www.antisyphontraining.com/security-defense-and-detection-ttx-w-amanda-berlin-and-jeremy-mio/
URL:https://www.blackhillsinfosec.com/event/security-defense-and-detection-ttx-w-amanda-berlin-and-jeremy-mio/2022-06-30/
LOCATION:IL
CATEGORIES:Training
ATTACH;FMTTYPE=image/png:https://www.blackhillsinfosec.com/wp-content/uploads/2022/06/Security-Defense-and-Detection-TTX.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20220630T120000
DTEND;TZID=America/New_York:20220630T160000
DTSTAMP:20260408T050106
CREATED:20220627T201428Z
LAST-MODIFIED:20220627T211036Z
UID:10000567-1656590400-1656604800@www.blackhillsinfosec.com
SUMMARY:Offensive Tradecraft - Introduction to Pentesting w/ John Strand
DESCRIPTION:Are you looking to make a transition into pentesting but are overwhelmed or just don’t know how to get started? With numerous different types of engagements\, operational phases\, and a constant flood of new vulnerabilities hitting the industry\, the journey into penetration testing can quickly become confusing. \nIn this training course\, we will examine the different types of penetration testing engagements and take a deep dive into establishing a repeatable testing methodology for executing quality tests. We will look at some tools of the trade to understand what they are doing under the hood\, identify what separates a great finding from a good finding in reports\, and really zero in on establishing your own tradecraft!\nBy the end of the training\, you can expect to leave with a firm understanding of how pentests are executed and a newfound comfortability performing penetration tests. We will also provide numerous resources and tools that will help you pave your way into a pentesting career! \nhttps://www.antisyphontraining.com/offensive-tradecraft-introduction-to-pentesting/
URL:https://www.blackhillsinfosec.com/event/offensive-tradecraft-introduction-to-pentesting/2022-06-30/
LOCATION:IL
CATEGORIES:Training
ATTACH;FMTTYPE=image/png:https://www.blackhillsinfosec.com/wp-content/uploads/2022/06/offensive-tradecraft_john-s.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20220629T163000
DTEND;TZID=America/New_York:20220629T173000
DTSTAMP:20260408T050106
CREATED:20220624T204221Z
LAST-MODIFIED:20220920T184909Z
UID:10000453-1656520200-1656523800@www.blackhillsinfosec.com
SUMMARY:AASLR: Antisyphon Address Space Layout Randomization
DESCRIPTION:AASLR will have infosec professionals sharing their knowledge on tools\, techniques\, and procedures and then answering a lot of your questions on everything you can think to ask. \nStreamed live every Tuesday and Wednesday @ 4:30 pm. \nhttps://www.twitch.tv/antisyphon
URL:https://www.blackhillsinfosec.com/event/aaslr-antisyphon-address-space-layout-randomization/2022-06-29/
LOCATION:IL
CATEGORIES:Livestream
ATTACH;FMTTYPE=image/png:https://www.blackhillsinfosec.com/wp-content/uploads/2022/06/antisyphon_livestream_v1.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20220629T120000
DTEND;TZID=America/New_York:20220629T160000
DTSTAMP:20260408T050106
CREATED:20220627T205029Z
LAST-MODIFIED:20230209T184749Z
UID:10000580-1656504000-1656518400@www.blackhillsinfosec.com
SUMMARY:HackerOps w/ Ralph May
DESCRIPTION:To conduct an advanced attack\, you need more than just a collection of simple scripts. In addition to talent\, you need a large amount of managed and unmanaged code. The more code and resources that are required to conduct an engagement\, the more time we need. Time is something we don’t have a lot of on an engagement. \nToday\, to be an advanced and effective attacker\, you need to move fast\, and that speed requires a move to a DevOps style of managing infrastructure and code. With cloud resources and APIs to manage these resources\, the days of manual setup are long behind us. \nWhere do we get started? And how does it all work? \nIn this training\, we learn the fundamentals of DevOps and how we can code our TTPs. Coding TTPs allows for new tactics and improved OPSEC to be shared without the cost of knowledge transfer and manual setup. This class will introduce students to Terraform Ansible and Docker with the goal of writing TTPs to use and share. \nIn this class\, we will learn the fundamentals of Terraform Ansible and Docker with an emphasis on how we can use these tools to code our TTPs. After we have the fundamentals\, we will start coding and get comfortable with YAML and will review how to create resources and customize TTPs. Lastly\, we will work through multiple labs and examples that you can take with you for your next engagement. \nhttps://www.antisyphontraining.com/hackerops-w-ralph-may/
URL:https://www.blackhillsinfosec.com/event/hackerops/2022-06-29/
LOCATION:IL
CATEGORIES:Training
ATTACH;FMTTYPE=image/png:https://www.blackhillsinfosec.com/wp-content/uploads/2022/06/hackerops-Training-Graphics.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20220629T120000
DTEND;TZID=America/New_York:20220629T160000
DTSTAMP:20260408T050106
CREATED:20220627T202859Z
LAST-MODIFIED:20220920T181251Z
UID:10000570-1656504000-1656518400@www.blackhillsinfosec.com
SUMMARY:Security Defense and Detection TTX w/ Amanda Berlin and Jeremy Mio
DESCRIPTION:Security Defense and Detection TTX is a comprehensive four-day tabletop exercise that involves the introduction to completion of security TTXs (tabletop exercises)\, IR playbooks\, and after-action reports. The exercises are paired with video and lab demonstrations that reinforce their purpose. The training as a whole is compatible with the world’s most popular RPG rules. \nThe preparation phase will walk students through the creation of specific IR playbooks that can be utilized in any environment as well as during later parts of the class. The next phase introduces the gamification of the TTXs. The students split up into separate “corporations” with assigned verticals\, hit points\, armor class\, budgets\, strengths\, and weaknesses. Selection of departments and skills allow the players to further their modifiers. Throughout the exercise\, each company will take turns rolling their way through decisions such as large purchases\, attack severity\, defense capability\, and incident response decisions. \nhttps://www.antisyphontraining.com/security-defense-and-detection-ttx-w-amanda-berlin-and-jeremy-mio/
URL:https://www.blackhillsinfosec.com/event/security-defense-and-detection-ttx-w-amanda-berlin-and-jeremy-mio/2022-06-29/
LOCATION:IL
CATEGORIES:Training
ATTACH;FMTTYPE=image/png:https://www.blackhillsinfosec.com/wp-content/uploads/2022/06/Security-Defense-and-Detection-TTX.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20220629T120000
DTEND;TZID=America/New_York:20220629T160000
DTSTAMP:20260408T050106
CREATED:20220627T201428Z
LAST-MODIFIED:20220627T211036Z
UID:10000566-1656504000-1656518400@www.blackhillsinfosec.com
SUMMARY:Offensive Tradecraft - Introduction to Pentesting w/ John Strand
DESCRIPTION:Are you looking to make a transition into pentesting but are overwhelmed or just don’t know how to get started? With numerous different types of engagements\, operational phases\, and a constant flood of new vulnerabilities hitting the industry\, the journey into penetration testing can quickly become confusing. \nIn this training course\, we will examine the different types of penetration testing engagements and take a deep dive into establishing a repeatable testing methodology for executing quality tests. We will look at some tools of the trade to understand what they are doing under the hood\, identify what separates a great finding from a good finding in reports\, and really zero in on establishing your own tradecraft!\nBy the end of the training\, you can expect to leave with a firm understanding of how pentests are executed and a newfound comfortability performing penetration tests. We will also provide numerous resources and tools that will help you pave your way into a pentesting career! \nhttps://www.antisyphontraining.com/offensive-tradecraft-introduction-to-pentesting/
URL:https://www.blackhillsinfosec.com/event/offensive-tradecraft-introduction-to-pentesting/2022-06-29/
LOCATION:IL
CATEGORIES:Training
ATTACH;FMTTYPE=image/png:https://www.blackhillsinfosec.com/wp-content/uploads/2022/06/offensive-tradecraft_john-s.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20220628T163000
DTEND;TZID=America/New_York:20220628T173000
DTSTAMP:20260408T050106
CREATED:20220624T204221Z
LAST-MODIFIED:20220920T184909Z
UID:10000452-1656433800-1656437400@www.blackhillsinfosec.com
SUMMARY:AASLR: Antisyphon Address Space Layout Randomization
DESCRIPTION:AASLR will have infosec professionals sharing their knowledge on tools\, techniques\, and procedures and then answering a lot of your questions on everything you can think to ask. \nStreamed live every Tuesday and Wednesday @ 4:30 pm. \nhttps://www.twitch.tv/antisyphon
URL:https://www.blackhillsinfosec.com/event/aaslr-antisyphon-address-space-layout-randomization/2022-06-28/
LOCATION:IL
CATEGORIES:Livestream
ATTACH;FMTTYPE=image/png:https://www.blackhillsinfosec.com/wp-content/uploads/2022/06/antisyphon_livestream_v1.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20220628T120000
DTEND;TZID=America/New_York:20220628T160000
DTSTAMP:20260408T050106
CREATED:20220627T205029Z
LAST-MODIFIED:20230209T184749Z
UID:10000579-1656417600-1656432000@www.blackhillsinfosec.com
SUMMARY:HackerOps w/ Ralph May
DESCRIPTION:To conduct an advanced attack\, you need more than just a collection of simple scripts. In addition to talent\, you need a large amount of managed and unmanaged code. The more code and resources that are required to conduct an engagement\, the more time we need. Time is something we don’t have a lot of on an engagement. \nToday\, to be an advanced and effective attacker\, you need to move fast\, and that speed requires a move to a DevOps style of managing infrastructure and code. With cloud resources and APIs to manage these resources\, the days of manual setup are long behind us. \nWhere do we get started? And how does it all work? \nIn this training\, we learn the fundamentals of DevOps and how we can code our TTPs. Coding TTPs allows for new tactics and improved OPSEC to be shared without the cost of knowledge transfer and manual setup. This class will introduce students to Terraform Ansible and Docker with the goal of writing TTPs to use and share. \nIn this class\, we will learn the fundamentals of Terraform Ansible and Docker with an emphasis on how we can use these tools to code our TTPs. After we have the fundamentals\, we will start coding and get comfortable with YAML and will review how to create resources and customize TTPs. Lastly\, we will work through multiple labs and examples that you can take with you for your next engagement. \nhttps://www.antisyphontraining.com/hackerops-w-ralph-may/
URL:https://www.blackhillsinfosec.com/event/hackerops/2022-06-28/
LOCATION:IL
CATEGORIES:Training
ATTACH;FMTTYPE=image/png:https://www.blackhillsinfosec.com/wp-content/uploads/2022/06/hackerops-Training-Graphics.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20220628T120000
DTEND;TZID=America/New_York:20220628T160000
DTSTAMP:20260408T050106
CREATED:20220627T202859Z
LAST-MODIFIED:20220920T181251Z
UID:10000569-1656417600-1656432000@www.blackhillsinfosec.com
SUMMARY:Security Defense and Detection TTX w/ Amanda Berlin and Jeremy Mio
DESCRIPTION:Security Defense and Detection TTX is a comprehensive four-day tabletop exercise that involves the introduction to completion of security TTXs (tabletop exercises)\, IR playbooks\, and after-action reports. The exercises are paired with video and lab demonstrations that reinforce their purpose. The training as a whole is compatible with the world’s most popular RPG rules. \nThe preparation phase will walk students through the creation of specific IR playbooks that can be utilized in any environment as well as during later parts of the class. The next phase introduces the gamification of the TTXs. The students split up into separate “corporations” with assigned verticals\, hit points\, armor class\, budgets\, strengths\, and weaknesses. Selection of departments and skills allow the players to further their modifiers. Throughout the exercise\, each company will take turns rolling their way through decisions such as large purchases\, attack severity\, defense capability\, and incident response decisions. \nhttps://www.antisyphontraining.com/security-defense-and-detection-ttx-w-amanda-berlin-and-jeremy-mio/
URL:https://www.blackhillsinfosec.com/event/security-defense-and-detection-ttx-w-amanda-berlin-and-jeremy-mio/2022-06-28/
LOCATION:IL
CATEGORIES:Training
ATTACH;FMTTYPE=image/png:https://www.blackhillsinfosec.com/wp-content/uploads/2022/06/Security-Defense-and-Detection-TTX.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20220628T120000
DTEND;TZID=America/New_York:20220628T160000
DTSTAMP:20260408T050106
CREATED:20220627T201428Z
LAST-MODIFIED:20220627T211036Z
UID:10000565-1656417600-1656432000@www.blackhillsinfosec.com
SUMMARY:Offensive Tradecraft - Introduction to Pentesting w/ John Strand
DESCRIPTION:Are you looking to make a transition into pentesting but are overwhelmed or just don’t know how to get started? With numerous different types of engagements\, operational phases\, and a constant flood of new vulnerabilities hitting the industry\, the journey into penetration testing can quickly become confusing. \nIn this training course\, we will examine the different types of penetration testing engagements and take a deep dive into establishing a repeatable testing methodology for executing quality tests. We will look at some tools of the trade to understand what they are doing under the hood\, identify what separates a great finding from a good finding in reports\, and really zero in on establishing your own tradecraft!\nBy the end of the training\, you can expect to leave with a firm understanding of how pentests are executed and a newfound comfortability performing penetration tests. We will also provide numerous resources and tools that will help you pave your way into a pentesting career! \nhttps://www.antisyphontraining.com/offensive-tradecraft-introduction-to-pentesting/
URL:https://www.blackhillsinfosec.com/event/offensive-tradecraft-introduction-to-pentesting/2022-06-28/
LOCATION:IL
CATEGORIES:Training
ATTACH;FMTTYPE=image/png:https://www.blackhillsinfosec.com/wp-content/uploads/2022/06/offensive-tradecraft_john-s.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20220627T163000
DTEND;TZID=America/New_York:20220627T173000
DTSTAMP:20260408T050106
CREATED:20220624T174740Z
LAST-MODIFIED:20220627T143602Z
UID:10000392-1656347400-1656351000@www.blackhillsinfosec.com
SUMMARY:BHIS | Talkin' Bout Infosec News
DESCRIPTION:Join the BHIS team as we talk about current infosec news. \nStreamed live every Monday @ 4:30 pm. \nhttps://www.youtube.com/BlackHillsInformationSecurity
URL:https://www.blackhillsinfosec.com/event/bhis-talkin-bout-infosec-news/2022-06-27/
LOCATION:IL
CATEGORIES:Newscast
ATTACH;FMTTYPE=image/jpeg:https://www.blackhillsinfosec.com/wp-content/uploads/2022/06/MicrosoftTeams-image-10.jpg
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20220627T120000
DTEND;TZID=America/New_York:20220627T160000
DTSTAMP:20260408T050106
CREATED:20220627T205029Z
LAST-MODIFIED:20230209T184749Z
UID:10000578-1656331200-1656345600@www.blackhillsinfosec.com
SUMMARY:HackerOps w/ Ralph May
DESCRIPTION:To conduct an advanced attack\, you need more than just a collection of simple scripts. In addition to talent\, you need a large amount of managed and unmanaged code. The more code and resources that are required to conduct an engagement\, the more time we need. Time is something we don’t have a lot of on an engagement. \nToday\, to be an advanced and effective attacker\, you need to move fast\, and that speed requires a move to a DevOps style of managing infrastructure and code. With cloud resources and APIs to manage these resources\, the days of manual setup are long behind us. \nWhere do we get started? And how does it all work? \nIn this training\, we learn the fundamentals of DevOps and how we can code our TTPs. Coding TTPs allows for new tactics and improved OPSEC to be shared without the cost of knowledge transfer and manual setup. This class will introduce students to Terraform Ansible and Docker with the goal of writing TTPs to use and share. \nIn this class\, we will learn the fundamentals of Terraform Ansible and Docker with an emphasis on how we can use these tools to code our TTPs. After we have the fundamentals\, we will start coding and get comfortable with YAML and will review how to create resources and customize TTPs. Lastly\, we will work through multiple labs and examples that you can take with you for your next engagement. \nhttps://www.antisyphontraining.com/hackerops-w-ralph-may/
URL:https://www.blackhillsinfosec.com/event/hackerops/2022-06-27/
LOCATION:IL
CATEGORIES:Training
ATTACH;FMTTYPE=image/png:https://www.blackhillsinfosec.com/wp-content/uploads/2022/06/hackerops-Training-Graphics.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20220627T120000
DTEND;TZID=America/New_York:20220627T160000
DTSTAMP:20260408T050106
CREATED:20220627T202859Z
LAST-MODIFIED:20220920T181251Z
UID:10000568-1656331200-1656345600@www.blackhillsinfosec.com
SUMMARY:Security Defense and Detection TTX w/ Amanda Berlin and Jeremy Mio
DESCRIPTION:Security Defense and Detection TTX is a comprehensive four-day tabletop exercise that involves the introduction to completion of security TTXs (tabletop exercises)\, IR playbooks\, and after-action reports. The exercises are paired with video and lab demonstrations that reinforce their purpose. The training as a whole is compatible with the world’s most popular RPG rules. \nThe preparation phase will walk students through the creation of specific IR playbooks that can be utilized in any environment as well as during later parts of the class. The next phase introduces the gamification of the TTXs. The students split up into separate “corporations” with assigned verticals\, hit points\, armor class\, budgets\, strengths\, and weaknesses. Selection of departments and skills allow the players to further their modifiers. Throughout the exercise\, each company will take turns rolling their way through decisions such as large purchases\, attack severity\, defense capability\, and incident response decisions. \nhttps://www.antisyphontraining.com/security-defense-and-detection-ttx-w-amanda-berlin-and-jeremy-mio/
URL:https://www.blackhillsinfosec.com/event/security-defense-and-detection-ttx-w-amanda-berlin-and-jeremy-mio/2022-06-27/
LOCATION:IL
CATEGORIES:Training
ATTACH;FMTTYPE=image/png:https://www.blackhillsinfosec.com/wp-content/uploads/2022/06/Security-Defense-and-Detection-TTX.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20220627T120000
DTEND;TZID=America/New_York:20220627T160000
DTSTAMP:20260408T050106
CREATED:20220627T201428Z
LAST-MODIFIED:20220627T211036Z
UID:10000564-1656331200-1656345600@www.blackhillsinfosec.com
SUMMARY:Offensive Tradecraft - Introduction to Pentesting w/ John Strand
DESCRIPTION:Are you looking to make a transition into pentesting but are overwhelmed or just don’t know how to get started? With numerous different types of engagements\, operational phases\, and a constant flood of new vulnerabilities hitting the industry\, the journey into penetration testing can quickly become confusing. \nIn this training course\, we will examine the different types of penetration testing engagements and take a deep dive into establishing a repeatable testing methodology for executing quality tests. We will look at some tools of the trade to understand what they are doing under the hood\, identify what separates a great finding from a good finding in reports\, and really zero in on establishing your own tradecraft!\nBy the end of the training\, you can expect to leave with a firm understanding of how pentests are executed and a newfound comfortability performing penetration tests. We will also provide numerous resources and tools that will help you pave your way into a pentesting career! \nhttps://www.antisyphontraining.com/offensive-tradecraft-introduction-to-pentesting/
URL:https://www.blackhillsinfosec.com/event/offensive-tradecraft-introduction-to-pentesting/2022-06-27/
LOCATION:IL
CATEGORIES:Training
ATTACH;FMTTYPE=image/png:https://www.blackhillsinfosec.com/wp-content/uploads/2022/06/offensive-tradecraft_john-s.png
END:VEVENT
END:VCALENDAR