BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//Black Hills Information Security, Inc. - ECPv6.15.18//NONSGML v1.0//EN
CALSCALE:GREGORIAN
METHOD:PUBLISH
X-WR-CALNAME:Black Hills Information Security, Inc.
X-ORIGINAL-URL:https://www.blackhillsinfosec.com
X-WR-CALDESC:Events for Black Hills Information Security, Inc.
REFRESH-INTERVAL;VALUE=DURATION:PT1H
X-Robots-Tag:noindex
X-PUBLISHED-TTL:PT1H
BEGIN:VTIMEZONE
TZID:America/New_York
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20210314T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20211107T060000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20220313T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20221106T060000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20230312T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20231105T060000
END:STANDARD
END:VTIMEZONE
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20221219T163000
DTEND;TZID=America/New_York:20221219T173000
DTSTAMP:20260404T062940
CREATED:20220624T174740Z
LAST-MODIFIED:20220627T143602Z
UID:10000417-1671467400-1671471000@www.blackhillsinfosec.com
SUMMARY:BHIS | Talkin' Bout Infosec News
DESCRIPTION:Join the BHIS team as we talk about current infosec news. \nStreamed live every Monday @ 4:30 pm. \nhttps://www.youtube.com/BlackHillsInformationSecurity
URL:https://www.blackhillsinfosec.com/event/bhis-talkin-bout-infosec-news/2022-12-19/
LOCATION:IL
CATEGORIES:Newscast
ATTACH;FMTTYPE=image/jpeg:https://www.blackhillsinfosec.com/wp-content/uploads/2022/06/MicrosoftTeams-image-10.jpg
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20221216T170000
DTEND;TZID=America/New_York:20221216T210000
DTSTAMP:20260404T062940
CREATED:20221216T194447Z
LAST-MODIFIED:20221216T194531Z
UID:10000633-1671210000-1671224400@www.blackhillsinfosec.com
SUMMARY:BHIS Annual Baltimore Meet-up!
DESCRIPTION:The Black Hills Information Security (BHIS) Content & Community crew is hosting a holiday meet-up in the Baltimore area on Friday\, December 16th from 5 – 9 pm\, and YOU are invited! \nWe will be meeting at The Commissary at CVille Junction\, an outdoor location that has firepits\, heaters\, food trucks\, and more! (We will have a backup location if the weather does not cooperate.) \nIf you’d like to hang out with us\, hang out with each other\, and pick up some cool swag\, RSVP here so we’ll know how to plan! \nThe C&C team \nJason\, Deb\, Kassie\, Caitlin\, & Mike \nhttps://evite.me/WRhQShVbzc
URL:https://www.blackhillsinfosec.com/event/bhis-annual-baltimore-meet-up/
LOCATION:IL
CATEGORIES:Meet-up
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20221216T120000
DTEND;TZID=America/New_York:20221216T160000
DTSTAMP:20260404T062940
CREATED:20220920T183219Z
LAST-MODIFIED:20220920T183219Z
UID:10000599-1671192000-1671206400@www.blackhillsinfosec.com
SUMMARY:Applied Purple Teaming w/ Kent Ickler and Jordan Drysdale
DESCRIPTION:Register: https://www.antisyphontraining.com/applied-purple-teaming-w-kent-ickler-and-jordan-drysdale/ \nYou’ve heard this story before. Bad actor walks into a network and pillages the place in swift action. CIO asks: “Where did we go wrong?” SysAdmin replies “our password\, remote access\, workstation restriction\, and lack of application safelisting policies. Oh\, and our SIEM didn’t notify us. We just weren’t ready for that attack.” \nIn a significant change from the original course\, students will be introduced to Microsoft Azure and Sentinel. Each student will be responsible for deploying a cloud lab that includes an Active Directory domain\, a C2 server\, and integration with AZ Sentinel’s detection platform. All of this will be taught through a proven framework for purple team operations that results in better business outcomes. \nEach student will then pollute the AD domain with garbage using BadBlood and wreak havoc on the environment through an updated iteration of the following labs: \n\nOrganizational reconnaissance\nBloodhound\, Sharphound\, and Neo4j\nPlumhound\nGroup policy preferences\nCommand and control operations\nCanary accounts for detecting password sprays and Kerberoasting\nFile share poisoning via URL and LNK files\nPass the hash attacks\nDCSync operations\nPassword cracking with John the Ripper\nKerberoasting attacks\nAtomic Red Team\n….and more….\n\nStudents will have an opportunity to attack their own in-class Active Directory environment with Red Team tactics\, implement Blue Team defensery\, and manage an environment designed to prevent\, slow\, identify\, and highlight attacks. Additionally\, the course will guide students through configuring no-nonsense attack identification and alerting that is essential to an effective SOC operation. \nIn a live environment\, students will have the opportunity to demonstrate a secured enterprise by utilizing the MITRE ATT&CK Framework\, Red Team tactics\, and Blue Team defenses to identify\, slow\, and stop attacks. \nImplement better security and tell your CIO how everything went right!
URL:https://www.blackhillsinfosec.com/event/applied-purple-teaming-w-kent-ickler-and-jordan-drysdale/2022-12-16/
LOCATION:IL
CATEGORIES:Training
ATTACH;FMTTYPE=image/png:https://www.blackhillsinfosec.com/wp-content/uploads/2016/03/Applied-purple-teaming-graphic-1024x576-1.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20221215T130000
DTEND;TZID=America/New_York:20221215T140000
DTSTAMP:20260404T062940
CREATED:20221206T203146Z
LAST-MODIFIED:20221206T204444Z
UID:10000770-1671109200-1671112800@www.blackhillsinfosec.com
SUMMARY:BHIS Webcast: Basics of Burp(ing) w/ Chris Traynor | 1-Hour
DESCRIPTION:Thursday\, December 15th\, 2022 | 1-Hour \nRegister: https://zoom.us/webinar/register/WN_lWSUVVp1RmGNxSHlPPKKLQ \nIn this Black Hills Information Security (BHIS) webcast\, we will introduce you to Portswigger’s Burp – a powerful tool for web application security testing. We will cover the key capabilities of Burp and demonstrate how it can be used to identify vulnerabilities in web applications. \nWhether you are a beginner or an experienced security professional\, this webcast will provide valuable insights into this powerful Pentesting tool and how it can help you improve the security of your web applications. \nJoin Chris Traynor (@cstraynor ) as he discusses this essential tool for web application security testing. \nCome hang out with us\, it will be a gas!
URL:https://www.blackhillsinfosec.com/event/bhis-webcast-basics-of-burping-w-chris-traynor-1-hour/
LOCATION:IL
CATEGORIES:BHIS Webcast
ATTACH;FMTTYPE=image/jpeg:https://www.blackhillsinfosec.com/wp-content/uploads/2022/08/ChrisTraynor.jpg
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20221215T120000
DTEND;TZID=America/New_York:20221215T160000
DTSTAMP:20260404T062940
CREATED:20220920T183219Z
LAST-MODIFIED:20220920T183219Z
UID:10000598-1671105600-1671120000@www.blackhillsinfosec.com
SUMMARY:Applied Purple Teaming w/ Kent Ickler and Jordan Drysdale
DESCRIPTION:Register: https://www.antisyphontraining.com/applied-purple-teaming-w-kent-ickler-and-jordan-drysdale/ \nYou’ve heard this story before. Bad actor walks into a network and pillages the place in swift action. CIO asks: “Where did we go wrong?” SysAdmin replies “our password\, remote access\, workstation restriction\, and lack of application safelisting policies. Oh\, and our SIEM didn’t notify us. We just weren’t ready for that attack.” \nIn a significant change from the original course\, students will be introduced to Microsoft Azure and Sentinel. Each student will be responsible for deploying a cloud lab that includes an Active Directory domain\, a C2 server\, and integration with AZ Sentinel’s detection platform. All of this will be taught through a proven framework for purple team operations that results in better business outcomes. \nEach student will then pollute the AD domain with garbage using BadBlood and wreak havoc on the environment through an updated iteration of the following labs: \n\nOrganizational reconnaissance\nBloodhound\, Sharphound\, and Neo4j\nPlumhound\nGroup policy preferences\nCommand and control operations\nCanary accounts for detecting password sprays and Kerberoasting\nFile share poisoning via URL and LNK files\nPass the hash attacks\nDCSync operations\nPassword cracking with John the Ripper\nKerberoasting attacks\nAtomic Red Team\n….and more….\n\nStudents will have an opportunity to attack their own in-class Active Directory environment with Red Team tactics\, implement Blue Team defensery\, and manage an environment designed to prevent\, slow\, identify\, and highlight attacks. Additionally\, the course will guide students through configuring no-nonsense attack identification and alerting that is essential to an effective SOC operation. \nIn a live environment\, students will have the opportunity to demonstrate a secured enterprise by utilizing the MITRE ATT&CK Framework\, Red Team tactics\, and Blue Team defenses to identify\, slow\, and stop attacks. \nImplement better security and tell your CIO how everything went right!
URL:https://www.blackhillsinfosec.com/event/applied-purple-teaming-w-kent-ickler-and-jordan-drysdale/2022-12-15/
LOCATION:IL
CATEGORIES:Training
ATTACH;FMTTYPE=image/png:https://www.blackhillsinfosec.com/wp-content/uploads/2016/03/Applied-purple-teaming-graphic-1024x576-1.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20221214T163000
DTEND;TZID=America/New_York:20221214T173000
DTSTAMP:20260404T062940
CREATED:20220624T204221Z
LAST-MODIFIED:20220920T184909Z
UID:10000501-1671035400-1671039000@www.blackhillsinfosec.com
SUMMARY:AASLR: Antisyphon Address Space Layout Randomization
DESCRIPTION:AASLR will have infosec professionals sharing their knowledge on tools\, techniques\, and procedures and then answering a lot of your questions on everything you can think to ask. \nStreamed live every Tuesday and Wednesday @ 4:30 pm. \nhttps://www.twitch.tv/antisyphon
URL:https://www.blackhillsinfosec.com/event/aaslr-antisyphon-address-space-layout-randomization/2022-12-14/
LOCATION:IL
CATEGORIES:Livestream
ATTACH;FMTTYPE=image/png:https://www.blackhillsinfosec.com/wp-content/uploads/2022/06/antisyphon_livestream_v1.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20221214T120000
DTEND;TZID=America/New_York:20221214T160000
DTSTAMP:20260404T062940
CREATED:20220920T183219Z
LAST-MODIFIED:20220920T183219Z
UID:10000597-1671019200-1671033600@www.blackhillsinfosec.com
SUMMARY:Applied Purple Teaming w/ Kent Ickler and Jordan Drysdale
DESCRIPTION:Register: https://www.antisyphontraining.com/applied-purple-teaming-w-kent-ickler-and-jordan-drysdale/ \nYou’ve heard this story before. Bad actor walks into a network and pillages the place in swift action. CIO asks: “Where did we go wrong?” SysAdmin replies “our password\, remote access\, workstation restriction\, and lack of application safelisting policies. Oh\, and our SIEM didn’t notify us. We just weren’t ready for that attack.” \nIn a significant change from the original course\, students will be introduced to Microsoft Azure and Sentinel. Each student will be responsible for deploying a cloud lab that includes an Active Directory domain\, a C2 server\, and integration with AZ Sentinel’s detection platform. All of this will be taught through a proven framework for purple team operations that results in better business outcomes. \nEach student will then pollute the AD domain with garbage using BadBlood and wreak havoc on the environment through an updated iteration of the following labs: \n\nOrganizational reconnaissance\nBloodhound\, Sharphound\, and Neo4j\nPlumhound\nGroup policy preferences\nCommand and control operations\nCanary accounts for detecting password sprays and Kerberoasting\nFile share poisoning via URL and LNK files\nPass the hash attacks\nDCSync operations\nPassword cracking with John the Ripper\nKerberoasting attacks\nAtomic Red Team\n….and more….\n\nStudents will have an opportunity to attack their own in-class Active Directory environment with Red Team tactics\, implement Blue Team defensery\, and manage an environment designed to prevent\, slow\, identify\, and highlight attacks. Additionally\, the course will guide students through configuring no-nonsense attack identification and alerting that is essential to an effective SOC operation. \nIn a live environment\, students will have the opportunity to demonstrate a secured enterprise by utilizing the MITRE ATT&CK Framework\, Red Team tactics\, and Blue Team defenses to identify\, slow\, and stop attacks. \nImplement better security and tell your CIO how everything went right!
URL:https://www.blackhillsinfosec.com/event/applied-purple-teaming-w-kent-ickler-and-jordan-drysdale/2022-12-14/
LOCATION:IL
CATEGORIES:Training
ATTACH;FMTTYPE=image/png:https://www.blackhillsinfosec.com/wp-content/uploads/2016/03/Applied-purple-teaming-graphic-1024x576-1.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20221213T163000
DTEND;TZID=America/New_York:20221213T173000
DTSTAMP:20260404T062940
CREATED:20220624T204221Z
LAST-MODIFIED:20220920T184909Z
UID:10000500-1670949000-1670952600@www.blackhillsinfosec.com
SUMMARY:AASLR: Antisyphon Address Space Layout Randomization
DESCRIPTION:AASLR will have infosec professionals sharing their knowledge on tools\, techniques\, and procedures and then answering a lot of your questions on everything you can think to ask. \nStreamed live every Tuesday and Wednesday @ 4:30 pm. \nhttps://www.twitch.tv/antisyphon
URL:https://www.blackhillsinfosec.com/event/aaslr-antisyphon-address-space-layout-randomization/2022-12-13/
LOCATION:IL
CATEGORIES:Livestream
ATTACH;FMTTYPE=image/png:https://www.blackhillsinfosec.com/wp-content/uploads/2022/06/antisyphon_livestream_v1.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20221213T120000
DTEND;TZID=America/New_York:20221213T160000
DTSTAMP:20260404T062940
CREATED:20220920T183219Z
LAST-MODIFIED:20220920T183219Z
UID:10000596-1670932800-1670947200@www.blackhillsinfosec.com
SUMMARY:Applied Purple Teaming w/ Kent Ickler and Jordan Drysdale
DESCRIPTION:Register: https://www.antisyphontraining.com/applied-purple-teaming-w-kent-ickler-and-jordan-drysdale/ \nYou’ve heard this story before. Bad actor walks into a network and pillages the place in swift action. CIO asks: “Where did we go wrong?” SysAdmin replies “our password\, remote access\, workstation restriction\, and lack of application safelisting policies. Oh\, and our SIEM didn’t notify us. We just weren’t ready for that attack.” \nIn a significant change from the original course\, students will be introduced to Microsoft Azure and Sentinel. Each student will be responsible for deploying a cloud lab that includes an Active Directory domain\, a C2 server\, and integration with AZ Sentinel’s detection platform. All of this will be taught through a proven framework for purple team operations that results in better business outcomes. \nEach student will then pollute the AD domain with garbage using BadBlood and wreak havoc on the environment through an updated iteration of the following labs: \n\nOrganizational reconnaissance\nBloodhound\, Sharphound\, and Neo4j\nPlumhound\nGroup policy preferences\nCommand and control operations\nCanary accounts for detecting password sprays and Kerberoasting\nFile share poisoning via URL and LNK files\nPass the hash attacks\nDCSync operations\nPassword cracking with John the Ripper\nKerberoasting attacks\nAtomic Red Team\n….and more….\n\nStudents will have an opportunity to attack their own in-class Active Directory environment with Red Team tactics\, implement Blue Team defensery\, and manage an environment designed to prevent\, slow\, identify\, and highlight attacks. Additionally\, the course will guide students through configuring no-nonsense attack identification and alerting that is essential to an effective SOC operation. \nIn a live environment\, students will have the opportunity to demonstrate a secured enterprise by utilizing the MITRE ATT&CK Framework\, Red Team tactics\, and Blue Team defenses to identify\, slow\, and stop attacks. \nImplement better security and tell your CIO how everything went right!
URL:https://www.blackhillsinfosec.com/event/applied-purple-teaming-w-kent-ickler-and-jordan-drysdale/2022-12-13/
LOCATION:IL
CATEGORIES:Training
ATTACH;FMTTYPE=image/png:https://www.blackhillsinfosec.com/wp-content/uploads/2016/03/Applied-purple-teaming-graphic-1024x576-1.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20221212T163000
DTEND;TZID=America/New_York:20221212T173000
DTSTAMP:20260404T062940
CREATED:20220624T174740Z
LAST-MODIFIED:20220627T143602Z
UID:10000416-1670862600-1670866200@www.blackhillsinfosec.com
SUMMARY:BHIS | Talkin' Bout Infosec News
DESCRIPTION:Join the BHIS team as we talk about current infosec news. \nStreamed live every Monday @ 4:30 pm. \nhttps://www.youtube.com/BlackHillsInformationSecurity
URL:https://www.blackhillsinfosec.com/event/bhis-talkin-bout-infosec-news/2022-12-12/
LOCATION:IL
CATEGORIES:Newscast
ATTACH;FMTTYPE=image/jpeg:https://www.blackhillsinfosec.com/wp-content/uploads/2022/06/MicrosoftTeams-image-10.jpg
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20221209T120000
DTEND;TZID=America/New_York:20221209T160000
DTSTAMP:20260404T062940
CREATED:20220628T202847Z
LAST-MODIFIED:20220920T181037Z
UID:10000595-1670587200-1670601600@www.blackhillsinfosec.com
SUMMARY:Breaching the Cloud w/ Beau Bullock
DESCRIPTION:Register: https://www.antisyphontraining.com/breaching-the-cloud-w-beau-bullock/ \nDo you want to level up your cloud penetration testing skills? The attack surface of many organizations has changed to include third-party hosted services such as Amazon Web Services\, Microsoft Azure\, and Google Cloud Platform. In this training course\, hacking concepts will be introduced for each of those services. \nThis training walks through a complete penetration testing methodology of cloud-based infrastructure. Starting with no information other than the company name you will learn to discover what cloud-specific assets your target is using. Following the enumeration of cloud services\, you will learn how to discover misconfigurations that commonly expose sensitive data as well as a thorough understanding of how to get an initial foothold into a cloud-based organization. \nPost-compromise techniques of cloud infrastructure differ from the techniques used in typical on-premise environments. You will learn situational awareness techniques that ultimately will impact how you will escalate privileges in the cloud. With most cloud-based authentication being publicly exposed this presents new and interesting persistence techniques that are non-existent to on-premise environments. With productivity tools like G-Suite and Microsoft 365 many organizations are making their email and other data that is normally protected by a firewall available to remote employees. You will learn how to discover\, pillage\, and exfiltrate data from these services. \nMany organizations are fully leveraging cloud services for their production infrastructure. This can include web servers\, SQL databases\, storage\, virtual machines\, and more. In this training\, you will learn how to assess and compromise these resources. Some cloud deployments are directly connected to on-premise environments via VPN. This presents an opportunity to pivot access from cloud to on-prem or vice-versa. \nFinally\, in this training\, we will not only be attacking cloud infrastructure but also leveraging it for red team operations. You will learn techniques that leverage cloud services for techniques such as phishing\, domain fronting\, and command & control. \nTools and techniques used on real-world penetration tests against cloud assets will be shared including hands-on demonstrations. At the end of this training\, you will have new skills for assessing cloud-based infrastructure! \n\n\n\n 
URL:https://www.blackhillsinfosec.com/event/breaching-the-cloud-w-beau-bullock/2022-12-09/
LOCATION:IL
CATEGORIES:Training
ATTACH;FMTTYPE=image/jpeg:https://www.blackhillsinfosec.com/wp-content/uploads/2022/06/BreachingCloud_1920x1080-1-1536x864-1.jpeg
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20221209T120000
DTEND;TZID=America/New_York:20221209T160000
DTSTAMP:20260404T062940
CREATED:20220627T202859Z
LAST-MODIFIED:20220920T181251Z
UID:10000575-1670587200-1670601600@www.blackhillsinfosec.com
SUMMARY:Security Defense and Detection TTX w/ Amanda Berlin and Jeremy Mio
DESCRIPTION:Security Defense and Detection TTX is a comprehensive four-day tabletop exercise that involves the introduction to completion of security TTXs (tabletop exercises)\, IR playbooks\, and after-action reports. The exercises are paired with video and lab demonstrations that reinforce their purpose. The training as a whole is compatible with the world’s most popular RPG rules. \nThe preparation phase will walk students through the creation of specific IR playbooks that can be utilized in any environment as well as during later parts of the class. The next phase introduces the gamification of the TTXs. The students split up into separate “corporations” with assigned verticals\, hit points\, armor class\, budgets\, strengths\, and weaknesses. Selection of departments and skills allow the players to further their modifiers. Throughout the exercise\, each company will take turns rolling their way through decisions such as large purchases\, attack severity\, defense capability\, and incident response decisions. \nhttps://www.antisyphontraining.com/security-defense-and-detection-ttx-w-amanda-berlin-and-jeremy-mio/
URL:https://www.blackhillsinfosec.com/event/security-defense-and-detection-ttx-w-amanda-berlin-and-jeremy-mio/2022-12-09/
LOCATION:IL
CATEGORIES:Training
ATTACH;FMTTYPE=image/png:https://www.blackhillsinfosec.com/wp-content/uploads/2022/06/Security-Defense-and-Detection-TTX.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20221208T130000
DTEND;TZID=America/New_York:20221208T140000
DTSTAMP:20260404T062940
CREATED:20221206T202920Z
LAST-MODIFIED:20221206T202920Z
UID:10000769-1670504400-1670508000@www.blackhillsinfosec.com
SUMMARY:BHIS Webcast: The Top $_num Reasons You Got Hacked in 2022 with Kent & Jordan | 1-Hour
DESCRIPTION:Thursday\, December 8th\, 2022 | 1 pm ET \nRegister: \nhttps://zoom.us/webinar/register/WN_c9B0VjuNTESxDkKUvJcd5w \nYes\, the webcast title is clickbait. We know. \nBut…organizations keep getting hacked. Almost every day another organization gets criticized across our news feeds for losing more data\, PII\, and secrets. And we have an interesting perspective on the causes of and some possible solutions for organizations willing to listen. \nAfter taking a look through our 2022 contracts and findings\, we would like to offer you a perspective through the looking glass. In this Black Hills Information Security (BHIS) & Antisyphon webcast\, we have our top findings (why you got popped) and our recommendations (years of our expertise) to share. Let our experiences guide your security programs in 2023. \nTogether\, let’s keep pushing the detection needle down from the industry approximation of 200 days to breach detection and 75 more to containment… \nWe are looking forward to spending some time with you!
URL:https://www.blackhillsinfosec.com/event/bhis-webcast-the-top-_num-reasons-you-got-hacked-in-2022-with-kent-jordan-1-hour/
LOCATION:IL
CATEGORIES:BHIS Webcast
ATTACH;FMTTYPE=image/jpeg:https://www.blackhillsinfosec.com/wp-content/uploads/2022/12/kent_and_jordan_photo-768x511-1.jpg
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20221208T120000
DTEND;TZID=America/New_York:20221208T160000
DTSTAMP:20260404T062940
CREATED:20220628T202847Z
LAST-MODIFIED:20220920T181037Z
UID:10000594-1670500800-1670515200@www.blackhillsinfosec.com
SUMMARY:Breaching the Cloud w/ Beau Bullock
DESCRIPTION:Register: https://www.antisyphontraining.com/breaching-the-cloud-w-beau-bullock/ \nDo you want to level up your cloud penetration testing skills? The attack surface of many organizations has changed to include third-party hosted services such as Amazon Web Services\, Microsoft Azure\, and Google Cloud Platform. In this training course\, hacking concepts will be introduced for each of those services. \nThis training walks through a complete penetration testing methodology of cloud-based infrastructure. Starting with no information other than the company name you will learn to discover what cloud-specific assets your target is using. Following the enumeration of cloud services\, you will learn how to discover misconfigurations that commonly expose sensitive data as well as a thorough understanding of how to get an initial foothold into a cloud-based organization. \nPost-compromise techniques of cloud infrastructure differ from the techniques used in typical on-premise environments. You will learn situational awareness techniques that ultimately will impact how you will escalate privileges in the cloud. With most cloud-based authentication being publicly exposed this presents new and interesting persistence techniques that are non-existent to on-premise environments. With productivity tools like G-Suite and Microsoft 365 many organizations are making their email and other data that is normally protected by a firewall available to remote employees. You will learn how to discover\, pillage\, and exfiltrate data from these services. \nMany organizations are fully leveraging cloud services for their production infrastructure. This can include web servers\, SQL databases\, storage\, virtual machines\, and more. In this training\, you will learn how to assess and compromise these resources. Some cloud deployments are directly connected to on-premise environments via VPN. This presents an opportunity to pivot access from cloud to on-prem or vice-versa. \nFinally\, in this training\, we will not only be attacking cloud infrastructure but also leveraging it for red team operations. You will learn techniques that leverage cloud services for techniques such as phishing\, domain fronting\, and command & control. \nTools and techniques used on real-world penetration tests against cloud assets will be shared including hands-on demonstrations. At the end of this training\, you will have new skills for assessing cloud-based infrastructure! \n\n\n\n 
URL:https://www.blackhillsinfosec.com/event/breaching-the-cloud-w-beau-bullock/2022-12-08/
LOCATION:IL
CATEGORIES:Training
ATTACH;FMTTYPE=image/jpeg:https://www.blackhillsinfosec.com/wp-content/uploads/2022/06/BreachingCloud_1920x1080-1-1536x864-1.jpeg
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20221208T120000
DTEND;TZID=America/New_York:20221208T160000
DTSTAMP:20260404T062940
CREATED:20220627T202859Z
LAST-MODIFIED:20220920T181251Z
UID:10000574-1670500800-1670515200@www.blackhillsinfosec.com
SUMMARY:Security Defense and Detection TTX w/ Amanda Berlin and Jeremy Mio
DESCRIPTION:Security Defense and Detection TTX is a comprehensive four-day tabletop exercise that involves the introduction to completion of security TTXs (tabletop exercises)\, IR playbooks\, and after-action reports. The exercises are paired with video and lab demonstrations that reinforce their purpose. The training as a whole is compatible with the world’s most popular RPG rules. \nThe preparation phase will walk students through the creation of specific IR playbooks that can be utilized in any environment as well as during later parts of the class. The next phase introduces the gamification of the TTXs. The students split up into separate “corporations” with assigned verticals\, hit points\, armor class\, budgets\, strengths\, and weaknesses. Selection of departments and skills allow the players to further their modifiers. Throughout the exercise\, each company will take turns rolling their way through decisions such as large purchases\, attack severity\, defense capability\, and incident response decisions. \nhttps://www.antisyphontraining.com/security-defense-and-detection-ttx-w-amanda-berlin-and-jeremy-mio/
URL:https://www.blackhillsinfosec.com/event/security-defense-and-detection-ttx-w-amanda-berlin-and-jeremy-mio/2022-12-08/
LOCATION:IL
CATEGORIES:Training
ATTACH;FMTTYPE=image/png:https://www.blackhillsinfosec.com/wp-content/uploads/2022/06/Security-Defense-and-Detection-TTX.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20221208T110000
DTEND;TZID=America/New_York:20221208T160000
DTSTAMP:20260404T062940
CREATED:20221206T211109Z
LAST-MODIFIED:20230209T190439Z
UID:10000895-1670497200-1670515200@www.blackhillsinfosec.com
SUMMARY:Introduction to Pentesting w/ John Strand
DESCRIPTION:Register: https://www.antisyphontraining.com/introduction-to-pentesting/ \nAre you looking to make a transition into pentesting but are overwhelmed or just don’t know how to get started? With numerous different types of engagements\, operational phases\, and a constant flood of new vulnerabilities hitting the industry\, the journey into penetration testing can quickly become confusing. \nIn this training course\, we will examine the different types of penetration testing engagements and take a deep dive into establishing a repeatable testing methodology for executing quality tests. We will look at some tools of the trade to understand what they are doing under the hood\, identify what separates a great finding from a good finding in reports\, and really zero in on establishing your own methodology! \nBy the end of the training\, you can expect to leave with a firm understanding of how pentests are executed and a newfound comfortability performing penetration tests. We will also provide numerous resources and tools that will help you pave your way into a pentesting career!
URL:https://www.blackhillsinfosec.com/event/introduction-to-pentesting-w-john-strand-2/2022-12-08/
LOCATION:IL
CATEGORIES:Training
ATTACH;FMTTYPE=image/png:https://www.blackhillsinfosec.com/wp-content/uploads/2022/12/Introduction-to-Pentesting-1536x860-1.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20221207T163000
DTEND;TZID=America/New_York:20221207T173000
DTSTAMP:20260404T062941
CREATED:20220624T204221Z
LAST-MODIFIED:20220920T184909Z
UID:10000499-1670430600-1670434200@www.blackhillsinfosec.com
SUMMARY:AASLR: Antisyphon Address Space Layout Randomization
DESCRIPTION:AASLR will have infosec professionals sharing their knowledge on tools\, techniques\, and procedures and then answering a lot of your questions on everything you can think to ask. \nStreamed live every Tuesday and Wednesday @ 4:30 pm. \nhttps://www.twitch.tv/antisyphon
URL:https://www.blackhillsinfosec.com/event/aaslr-antisyphon-address-space-layout-randomization/2022-12-07/
LOCATION:IL
CATEGORIES:Livestream
ATTACH;FMTTYPE=image/png:https://www.blackhillsinfosec.com/wp-content/uploads/2022/06/antisyphon_livestream_v1.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20221207T120000
DTEND;TZID=America/New_York:20221207T160000
DTSTAMP:20260404T062941
CREATED:20220628T202847Z
LAST-MODIFIED:20220920T181037Z
UID:10000593-1670414400-1670428800@www.blackhillsinfosec.com
SUMMARY:Breaching the Cloud w/ Beau Bullock
DESCRIPTION:Register: https://www.antisyphontraining.com/breaching-the-cloud-w-beau-bullock/ \nDo you want to level up your cloud penetration testing skills? The attack surface of many organizations has changed to include third-party hosted services such as Amazon Web Services\, Microsoft Azure\, and Google Cloud Platform. In this training course\, hacking concepts will be introduced for each of those services. \nThis training walks through a complete penetration testing methodology of cloud-based infrastructure. Starting with no information other than the company name you will learn to discover what cloud-specific assets your target is using. Following the enumeration of cloud services\, you will learn how to discover misconfigurations that commonly expose sensitive data as well as a thorough understanding of how to get an initial foothold into a cloud-based organization. \nPost-compromise techniques of cloud infrastructure differ from the techniques used in typical on-premise environments. You will learn situational awareness techniques that ultimately will impact how you will escalate privileges in the cloud. With most cloud-based authentication being publicly exposed this presents new and interesting persistence techniques that are non-existent to on-premise environments. With productivity tools like G-Suite and Microsoft 365 many organizations are making their email and other data that is normally protected by a firewall available to remote employees. You will learn how to discover\, pillage\, and exfiltrate data from these services. \nMany organizations are fully leveraging cloud services for their production infrastructure. This can include web servers\, SQL databases\, storage\, virtual machines\, and more. In this training\, you will learn how to assess and compromise these resources. Some cloud deployments are directly connected to on-premise environments via VPN. This presents an opportunity to pivot access from cloud to on-prem or vice-versa. \nFinally\, in this training\, we will not only be attacking cloud infrastructure but also leveraging it for red team operations. You will learn techniques that leverage cloud services for techniques such as phishing\, domain fronting\, and command & control. \nTools and techniques used on real-world penetration tests against cloud assets will be shared including hands-on demonstrations. At the end of this training\, you will have new skills for assessing cloud-based infrastructure! \n\n\n\n 
URL:https://www.blackhillsinfosec.com/event/breaching-the-cloud-w-beau-bullock/2022-12-07/
LOCATION:IL
CATEGORIES:Training
ATTACH;FMTTYPE=image/jpeg:https://www.blackhillsinfosec.com/wp-content/uploads/2022/06/BreachingCloud_1920x1080-1-1536x864-1.jpeg
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20221207T120000
DTEND;TZID=America/New_York:20221207T160000
DTSTAMP:20260404T062941
CREATED:20220627T202859Z
LAST-MODIFIED:20220920T181251Z
UID:10000573-1670414400-1670428800@www.blackhillsinfosec.com
SUMMARY:Security Defense and Detection TTX w/ Amanda Berlin and Jeremy Mio
DESCRIPTION:Security Defense and Detection TTX is a comprehensive four-day tabletop exercise that involves the introduction to completion of security TTXs (tabletop exercises)\, IR playbooks\, and after-action reports. The exercises are paired with video and lab demonstrations that reinforce their purpose. The training as a whole is compatible with the world’s most popular RPG rules. \nThe preparation phase will walk students through the creation of specific IR playbooks that can be utilized in any environment as well as during later parts of the class. The next phase introduces the gamification of the TTXs. The students split up into separate “corporations” with assigned verticals\, hit points\, armor class\, budgets\, strengths\, and weaknesses. Selection of departments and skills allow the players to further their modifiers. Throughout the exercise\, each company will take turns rolling their way through decisions such as large purchases\, attack severity\, defense capability\, and incident response decisions. \nhttps://www.antisyphontraining.com/security-defense-and-detection-ttx-w-amanda-berlin-and-jeremy-mio/
URL:https://www.blackhillsinfosec.com/event/security-defense-and-detection-ttx-w-amanda-berlin-and-jeremy-mio/2022-12-07/
LOCATION:IL
CATEGORIES:Training
ATTACH;FMTTYPE=image/png:https://www.blackhillsinfosec.com/wp-content/uploads/2022/06/Security-Defense-and-Detection-TTX.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20221207T110000
DTEND;TZID=America/New_York:20221207T160000
DTSTAMP:20260404T062941
CREATED:20221206T211109Z
LAST-MODIFIED:20230209T190439Z
UID:10000894-1670410800-1670428800@www.blackhillsinfosec.com
SUMMARY:Introduction to Pentesting w/ John Strand
DESCRIPTION:Register: https://www.antisyphontraining.com/introduction-to-pentesting/ \nAre you looking to make a transition into pentesting but are overwhelmed or just don’t know how to get started? With numerous different types of engagements\, operational phases\, and a constant flood of new vulnerabilities hitting the industry\, the journey into penetration testing can quickly become confusing. \nIn this training course\, we will examine the different types of penetration testing engagements and take a deep dive into establishing a repeatable testing methodology for executing quality tests. We will look at some tools of the trade to understand what they are doing under the hood\, identify what separates a great finding from a good finding in reports\, and really zero in on establishing your own methodology! \nBy the end of the training\, you can expect to leave with a firm understanding of how pentests are executed and a newfound comfortability performing penetration tests. We will also provide numerous resources and tools that will help you pave your way into a pentesting career!
URL:https://www.blackhillsinfosec.com/event/introduction-to-pentesting-w-john-strand-2/2022-12-07/
LOCATION:IL
CATEGORIES:Training
ATTACH;FMTTYPE=image/png:https://www.blackhillsinfosec.com/wp-content/uploads/2022/12/Introduction-to-Pentesting-1536x860-1.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20221206T163000
DTEND;TZID=America/New_York:20221206T173000
DTSTAMP:20260404T062941
CREATED:20220624T204221Z
LAST-MODIFIED:20220920T184909Z
UID:10000498-1670344200-1670347800@www.blackhillsinfosec.com
SUMMARY:AASLR: Antisyphon Address Space Layout Randomization
DESCRIPTION:AASLR will have infosec professionals sharing their knowledge on tools\, techniques\, and procedures and then answering a lot of your questions on everything you can think to ask. \nStreamed live every Tuesday and Wednesday @ 4:30 pm. \nhttps://www.twitch.tv/antisyphon
URL:https://www.blackhillsinfosec.com/event/aaslr-antisyphon-address-space-layout-randomization/2022-12-06/
LOCATION:IL
CATEGORIES:Livestream
ATTACH;FMTTYPE=image/png:https://www.blackhillsinfosec.com/wp-content/uploads/2022/06/antisyphon_livestream_v1.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20221206T110000
DTEND;TZID=America/New_York:20221206T160000
DTSTAMP:20260404T062941
CREATED:20221206T211109Z
LAST-MODIFIED:20230209T190439Z
UID:10000893-1670324400-1670342400@www.blackhillsinfosec.com
SUMMARY:Introduction to Pentesting w/ John Strand
DESCRIPTION:Register: https://www.antisyphontraining.com/introduction-to-pentesting/ \nAre you looking to make a transition into pentesting but are overwhelmed or just don’t know how to get started? With numerous different types of engagements\, operational phases\, and a constant flood of new vulnerabilities hitting the industry\, the journey into penetration testing can quickly become confusing. \nIn this training course\, we will examine the different types of penetration testing engagements and take a deep dive into establishing a repeatable testing methodology for executing quality tests. We will look at some tools of the trade to understand what they are doing under the hood\, identify what separates a great finding from a good finding in reports\, and really zero in on establishing your own methodology! \nBy the end of the training\, you can expect to leave with a firm understanding of how pentests are executed and a newfound comfortability performing penetration tests. We will also provide numerous resources and tools that will help you pave your way into a pentesting career!
URL:https://www.blackhillsinfosec.com/event/introduction-to-pentesting-w-john-strand-2/2022-12-06/
LOCATION:IL
CATEGORIES:Training
ATTACH;FMTTYPE=image/png:https://www.blackhillsinfosec.com/wp-content/uploads/2022/12/Introduction-to-Pentesting-1536x860-1.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20221206T110000
DTEND;TZID=America/New_York:20221206T160000
DTSTAMP:20260404T062941
CREATED:20220628T202847Z
LAST-MODIFIED:20220920T181037Z
UID:10000592-1670324400-1670342400@www.blackhillsinfosec.com
SUMMARY:Breaching the Cloud w/ Beau Bullock
DESCRIPTION:Register: https://www.antisyphontraining.com/breaching-the-cloud-w-beau-bullock/ \nDo you want to level up your cloud penetration testing skills? The attack surface of many organizations has changed to include third-party hosted services such as Amazon Web Services\, Microsoft Azure\, and Google Cloud Platform. In this training course\, hacking concepts will be introduced for each of those services. \nThis training walks through a complete penetration testing methodology of cloud-based infrastructure. Starting with no information other than the company name you will learn to discover what cloud-specific assets your target is using. Following the enumeration of cloud services\, you will learn how to discover misconfigurations that commonly expose sensitive data as well as a thorough understanding of how to get an initial foothold into a cloud-based organization. \nPost-compromise techniques of cloud infrastructure differ from the techniques used in typical on-premise environments. You will learn situational awareness techniques that ultimately will impact how you will escalate privileges in the cloud. With most cloud-based authentication being publicly exposed this presents new and interesting persistence techniques that are non-existent to on-premise environments. With productivity tools like G-Suite and Microsoft 365 many organizations are making their email and other data that is normally protected by a firewall available to remote employees. You will learn how to discover\, pillage\, and exfiltrate data from these services. \nMany organizations are fully leveraging cloud services for their production infrastructure. This can include web servers\, SQL databases\, storage\, virtual machines\, and more. In this training\, you will learn how to assess and compromise these resources. Some cloud deployments are directly connected to on-premise environments via VPN. This presents an opportunity to pivot access from cloud to on-prem or vice-versa. \nFinally\, in this training\, we will not only be attacking cloud infrastructure but also leveraging it for red team operations. You will learn techniques that leverage cloud services for techniques such as phishing\, domain fronting\, and command & control. \nTools and techniques used on real-world penetration tests against cloud assets will be shared including hands-on demonstrations. At the end of this training\, you will have new skills for assessing cloud-based infrastructure! \n\n\n\n 
URL:https://www.blackhillsinfosec.com/event/breaching-the-cloud-w-beau-bullock/2022-12-06/
LOCATION:IL
CATEGORIES:Training
ATTACH;FMTTYPE=image/jpeg:https://www.blackhillsinfosec.com/wp-content/uploads/2022/06/BreachingCloud_1920x1080-1-1536x864-1.jpeg
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20221206T110000
DTEND;TZID=America/New_York:20221206T160000
DTSTAMP:20260404T062941
CREATED:20220627T202859Z
LAST-MODIFIED:20220920T181251Z
UID:10000572-1670324400-1670342400@www.blackhillsinfosec.com
SUMMARY:Security Defense and Detection TTX w/ Amanda Berlin and Jeremy Mio
DESCRIPTION:Security Defense and Detection TTX is a comprehensive four-day tabletop exercise that involves the introduction to completion of security TTXs (tabletop exercises)\, IR playbooks\, and after-action reports. The exercises are paired with video and lab demonstrations that reinforce their purpose. The training as a whole is compatible with the world’s most popular RPG rules. \nThe preparation phase will walk students through the creation of specific IR playbooks that can be utilized in any environment as well as during later parts of the class. The next phase introduces the gamification of the TTXs. The students split up into separate “corporations” with assigned verticals\, hit points\, armor class\, budgets\, strengths\, and weaknesses. Selection of departments and skills allow the players to further their modifiers. Throughout the exercise\, each company will take turns rolling their way through decisions such as large purchases\, attack severity\, defense capability\, and incident response decisions. \nhttps://www.antisyphontraining.com/security-defense-and-detection-ttx-w-amanda-berlin-and-jeremy-mio/
URL:https://www.blackhillsinfosec.com/event/security-defense-and-detection-ttx-w-amanda-berlin-and-jeremy-mio/2022-12-06/
LOCATION:IL
CATEGORIES:Training
ATTACH;FMTTYPE=image/png:https://www.blackhillsinfosec.com/wp-content/uploads/2022/06/Security-Defense-and-Detection-TTX.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20221205T163000
DTEND;TZID=America/New_York:20221205T173000
DTSTAMP:20260404T062941
CREATED:20220624T174740Z
LAST-MODIFIED:20220627T143602Z
UID:10000415-1670257800-1670261400@www.blackhillsinfosec.com
SUMMARY:BHIS | Talkin' Bout Infosec News
DESCRIPTION:Join the BHIS team as we talk about current infosec news. \nStreamed live every Monday @ 4:30 pm. \nhttps://www.youtube.com/BlackHillsInformationSecurity
URL:https://www.blackhillsinfosec.com/event/bhis-talkin-bout-infosec-news/2022-12-05/
LOCATION:IL
CATEGORIES:Newscast
ATTACH;FMTTYPE=image/jpeg:https://www.blackhillsinfosec.com/wp-content/uploads/2022/06/MicrosoftTeams-image-10.jpg
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20221205T110000
DTEND;TZID=America/New_York:20221205T160000
DTSTAMP:20260404T062941
CREATED:20221206T211109Z
LAST-MODIFIED:20230209T190439Z
UID:10000892-1670238000-1670256000@www.blackhillsinfosec.com
SUMMARY:Introduction to Pentesting w/ John Strand
DESCRIPTION:Register: https://www.antisyphontraining.com/introduction-to-pentesting/ \nAre you looking to make a transition into pentesting but are overwhelmed or just don’t know how to get started? With numerous different types of engagements\, operational phases\, and a constant flood of new vulnerabilities hitting the industry\, the journey into penetration testing can quickly become confusing. \nIn this training course\, we will examine the different types of penetration testing engagements and take a deep dive into establishing a repeatable testing methodology for executing quality tests. We will look at some tools of the trade to understand what they are doing under the hood\, identify what separates a great finding from a good finding in reports\, and really zero in on establishing your own methodology! \nBy the end of the training\, you can expect to leave with a firm understanding of how pentests are executed and a newfound comfortability performing penetration tests. We will also provide numerous resources and tools that will help you pave your way into a pentesting career!
URL:https://www.blackhillsinfosec.com/event/introduction-to-pentesting-w-john-strand-2/2022-12-05/
LOCATION:IL
CATEGORIES:Training
ATTACH;FMTTYPE=image/png:https://www.blackhillsinfosec.com/wp-content/uploads/2022/12/Introduction-to-Pentesting-1536x860-1.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20221130T163000
DTEND;TZID=America/New_York:20221130T173000
DTSTAMP:20260404T062941
CREATED:20220624T204221Z
LAST-MODIFIED:20220920T184909Z
UID:10000497-1669825800-1669829400@www.blackhillsinfosec.com
SUMMARY:AASLR: Antisyphon Address Space Layout Randomization
DESCRIPTION:AASLR will have infosec professionals sharing their knowledge on tools\, techniques\, and procedures and then answering a lot of your questions on everything you can think to ask. \nStreamed live every Tuesday and Wednesday @ 4:30 pm. \nhttps://www.twitch.tv/antisyphon
URL:https://www.blackhillsinfosec.com/event/aaslr-antisyphon-address-space-layout-randomization/2022-11-30/
LOCATION:IL
CATEGORIES:Livestream
ATTACH;FMTTYPE=image/png:https://www.blackhillsinfosec.com/wp-content/uploads/2022/06/antisyphon_livestream_v1.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20221129T163000
DTEND;TZID=America/New_York:20221129T173000
DTSTAMP:20260404T062941
CREATED:20220624T204221Z
LAST-MODIFIED:20220920T184909Z
UID:10000496-1669739400-1669743000@www.blackhillsinfosec.com
SUMMARY:AASLR: Antisyphon Address Space Layout Randomization
DESCRIPTION:AASLR will have infosec professionals sharing their knowledge on tools\, techniques\, and procedures and then answering a lot of your questions on everything you can think to ask. \nStreamed live every Tuesday and Wednesday @ 4:30 pm. \nhttps://www.twitch.tv/antisyphon
URL:https://www.blackhillsinfosec.com/event/aaslr-antisyphon-address-space-layout-randomization/2022-11-29/
LOCATION:IL
CATEGORIES:Livestream
ATTACH;FMTTYPE=image/png:https://www.blackhillsinfosec.com/wp-content/uploads/2022/06/antisyphon_livestream_v1.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20221128T163000
DTEND;TZID=America/New_York:20221128T173000
DTSTAMP:20260404T062941
CREATED:20220624T174740Z
LAST-MODIFIED:20220627T143602Z
UID:10000414-1669653000-1669656600@www.blackhillsinfosec.com
SUMMARY:BHIS | Talkin' Bout Infosec News
DESCRIPTION:Join the BHIS team as we talk about current infosec news. \nStreamed live every Monday @ 4:30 pm. \nhttps://www.youtube.com/BlackHillsInformationSecurity
URL:https://www.blackhillsinfosec.com/event/bhis-talkin-bout-infosec-news/2022-11-28/
LOCATION:IL
CATEGORIES:Newscast
ATTACH;FMTTYPE=image/jpeg:https://www.blackhillsinfosec.com/wp-content/uploads/2022/06/MicrosoftTeams-image-10.jpg
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20221123T163000
DTEND;TZID=America/New_York:20221123T173000
DTSTAMP:20260404T062941
CREATED:20220624T204221Z
LAST-MODIFIED:20220920T184909Z
UID:10000495-1669221000-1669224600@www.blackhillsinfosec.com
SUMMARY:AASLR: Antisyphon Address Space Layout Randomization
DESCRIPTION:AASLR will have infosec professionals sharing their knowledge on tools\, techniques\, and procedures and then answering a lot of your questions on everything you can think to ask. \nStreamed live every Tuesday and Wednesday @ 4:30 pm. \nhttps://www.twitch.tv/antisyphon
URL:https://www.blackhillsinfosec.com/event/aaslr-antisyphon-address-space-layout-randomization/2022-11-23/
LOCATION:IL
CATEGORIES:Livestream
ATTACH;FMTTYPE=image/png:https://www.blackhillsinfosec.com/wp-content/uploads/2022/06/antisyphon_livestream_v1.png
END:VEVENT
END:VCALENDAR