WEBINARS / FREE CPE

youre doing it wrong – Luke (Pyr0) Mcomie

Sponsored By:

Available

Upcoming Webinar:

June 4th, 10PM EST

Register:
https://zoom.us/webinar/register/WN_tJZJ5xldTb6oE58j4M-N4A

About Luke

Luke is a senior security leader with 20+ years of experience guiding security professionals within Fortune 100 enterprises to start ups, federal agencies, and both private and public-sector organizations to better secure their organizations. Highly skilled in developing and executing enterprise security strategies, leading technical and tactical programs, with the goal of helping organizations understand their security challenges and mitigating the risks that threaten the modern business and operating environment.

Directed research groups, labs teams, risk and compliance programs, and red teams. Possess a demonstrated mastery of ethical hacking, penetration testing, social engineering, physical security, security assessments and incident response. Prolific industry thought leader; widely published in media, video, television, and public speaking forums.

 

 

Archives:

Covert Entry, Social Engineering, and Physical Security – Brent White & Tim Roberts

Sponsored By:

Red Lion. Compliance and Security. Connected.

Upcoming Webinar:

May 28th, 10PM EST

Register:
https://zoom.us/webinar/register/WN_tJZJ5xldTb6oE58j4M-N4A

About Brent & Tim

Tim Roberts

Tim is a Sr. Security Consultant within NTT Security’s Threat Services group. He has spoken at national, international and collegiate security conferences, including ISSA International, DEF CON, DerbyCon, Infosec World, various B-Sides, CircleCityCon, Techno Security Con, SaintCon, Appalachian Institute of Digital Evidence at Marshall University, and more.

He has been interviewed on the subject of “White hat hacking” for Microsoft’s “Roadtrip Nation” television series, was featured on IDG Enterprise’s CSO Online publication by Ryan Francis on social engineering and is a regular contributor to NTT Security’s #WarStoryWednesday blog series.

Tim has held management, IT and physical security roles across multiple industries, including healthcare and government. His professional experiences cover traditional/non-traditional hacking techniques that include network, wireless, social engineering, application, physical and scenario-based compromises. These techniques have led to highly successful Red Team assessments against corporate environments. By continuing to share these experiences, he hopes to further contribute to the InfoSec community.

Brent White

Brent is an Sr. Security Consultant at NTT Security as well as a Trusted Advisor for the Tennessee Department of Safety and Homeland Security on the topics of Physical and Cyber Security. He is also the founder of the Nashville DEF CON group (DC615), and is the Global Coordinator for the DEF CON conference “Groups” program. He has held the role of Web/Project Manager and IT Security Director for a global franchise company as well as Web Manager and information security positions for multiple television personalities and television shows on The Travel Channel.

Brent has been interviewed on the popular web series, “Hak5” with Darren Kitchen, BBC News, and on Microsoft’s “Roadtrip Nation” television series. He has also spoken at numerous security conferences, including DEF CON, DerbyCon, ISSA International, Techno Security & Forensics Con, Appalachian Institute of Digital Evidence (AIDE) at Marshall University, and more.

Social Engineering in Non-Linear Warfare – Bill “oncee” Gardner

Sponsored By:

Red Lion. Compliance and Security. Connected.

Archived Webinar:

May 21th, 10PM EST

Register:  
https://zoom.us/webinar/register/WN_tJZJ5xldTb6oE58j4M-N4A

About Bill

Bill Gardner is an Assistant Professor at Marshall University, where he teaches in the Digital Forensics and Information undergraduate program and in the Cyber Forensics and Security graduate program in the Department of Forensics. Bill is a past-president and information security chair at the Appalachian Institute of Digital Evidence. AIDE is a non-profit organization that provides research and training for digital evidence professionals including attorneys, judges, law enforcement officers and information security practitioners in the private sector. Prior to joining the faculty at Marshall, Bill co-founded the SecureWV/Hack3rCon convention. Bill is an active member of the information security community and has spoken at a number of information security conferences including AIDE, Derbycon, Shmoocon, BSides-Cincy, BSidesCleveland, and BSidesAsheville. Bill is also the co-author of “Building an Information Security Awareness Program: Defending Against Social Engineering and Technical Threats”, and “Google Hacking For Penetration Testers”.
This presentation explored the use of hacking, leaking, and trolling by Russia to influence the 2016 United States Presidential Elections. These tactics have been called “the weapons of the geek” by some researchers. By using proxy hackers and Russian malware to break into the email of the Democratic National Committee and then giving that email to Wikileaks to publish on the Internet, the Russian government attempted to swing the election in the favor of their preferred candidate. The source of the malware used in the DNC hack was determined to be of Russian origin and has been used on the battlefield in Ukraine, giving the Russians a strategic edge and resulting in heavy losses. Information Warfare and Cyber Warfare of this type is also known as Non-Linear Warfare. Such tactics will continue to be adopted by more adversaries in the future since they have been proven to be successful in both the manipulation of events and effective on the battlefield with very little investment in time or resources.

Back on my Browser BBS Basic Browser Hacking- Charles “BSDBandit” Shirer

Sponsored By:

Red Lion. Compliance and Security. Connected.

Archived Webinar:

May 14th, 10PM EST

Register:  
https://zoom.us/webinar/register/WN_tJZJ5xldTb6oE58j4M-N4A

About Charles

Charles is a RedTeamer/ThreatHunter for the SpiderLabs. In his spare time Charles works on the SECBSD open source project which is a penetration testing distro based on the OpenBsd Operating System.

He currently works as Staff at several Security Conferences, Podcast(GrumpyHackers)(IronGeek Cast) and is a part of NovaHackers.(OSCP,OWSP)

 

Covid-19 Infrastructure – Jon “Wally” Prather

Sponsored By:

Red Lion. Compliance and Security. Connected.

Archived Webinar:

May 7th, 10PM EST

Register:
https://zoom.us/webinar/register/WN_tJZJ5xldTb6oE58j4M-N4A

About Jon

Jon “Wally” Prather is a seasoned intelligence professional with a wide range of subject matter expertise and is the Senior Intelligence Analyst for McAfees Advanced Programs Group (APG). Wally is proficient in multiple intelligence disciplines including HUMINT Targeting, HVI Targeteer, and Network Analyst with 15 years’ experience, primarily in maritime counterterrorism/ counterinsurgency operations with the US Marine Corps, Special Operations and Irregular Warfare. Wally has operational experience providing in-­‐depth intelligence analysis and direct support to combat and interagency operations in the Middle East, Southeast Asia, and Africa with over four years deployed to combat, hostile and sensitive environments to include East Africa, Afghanistan, and Iraq.

 

Data analytics and metrics for the win – Amélie Koran

Sponsored By:

Red Lion. Compliance and Security. Connected.

Archived Webinar:

April 23rd, 10PM EST

About Amélie

Amélie is an adept senior technology leader with broad experience in both public and private sectors across a range of business sectors. Over 20+ years of progressive hands-on experience in advanced technologies and cybersecurity practices, developing tactical and strategic execution goals. Led teams of over 100 staff to deliver solutions across multiple product and service delivery lines utilizing Agile frameworks in a DevSecOps environment.

At the U.S. Department of Health and Human Services, Office of the Inspector General (HHS OIG), executed over $40m budget to 99.97% efficiency. Developed comprehensive proposals across organizational divisions to continue investment in new technologies and modernization, resulting in year-over-year increased portfolio growth, delivery, and comprehensive resource management activities.

Bootstrapped numerous major initiatives across government and industry; including the US Digital Service (USDS), the President’s Management Agenda for the Open Data Initiative, U.S. Department of the Interior’s first mobile technology strategy, and led the 2014 revision to the Federal Information Security Management Act (FISMA) through agency clearance and approval at Office of Management and Budget (OMB) in the Executive Office of the President (EOP).

 

Passive recon – Tyrone Wilson

Sponsored By:

Red Lion. Compliance and Security. Connected.

Archived Webinar:

April 16TH, 10PM EST

About Tyrone

Tyrone Wilson is an Information Security professional with 22 years of experience in information technology and systems configuration, including information systems and network security. Wilson also has extensive knowledge in computer network defense, vulnerability assessments, cyber threat analysis, and incident response. As a former cybersecurity analyst for the United States Army, Wilson developed security structures to ensure American intelligence systems were protected from foreign threats. Wilson is the Founder and President of Cover6 Solutions, LLC; which teaches companies and professionals aspects of information security, penetration testing, and IPv6.

Project Peep Show. A preview. – Gillis Jones

Sponsored By:

Red Lion. Compliance and Security. Connected.

Archived Webinar:

April 9th, 10PM EST

About Gillis

A giant of a man, Gillis Jones is currently employed as a Application Security Engineer at Hewlett-Packard. He has been engaged in web application security for the last four years, and has worked with companies to increase their security posture all the way from a Stealth Startup to a multi-million dollar business with hundreds of employees. He is the founder of the Badmin Project, and has worked with dozens of entry level security people to assist them in becoming “1337”.

Security AMA With Jayson Street

 

Sponsored By:

Red Lion. Compliance and Security. Connected.

Archived Webinar:

April 2nd, 10PM EST

About Jayson

Jayson E. Street is an author of the “Dissecting the hack: Series”. Also the DEF CON Groups Global Ambassador. Plus the VP of InfoSec for SphereNY. He has also spoken at DEF CON, DerbyCon, GRRCon and at several other ‘CONs and colleges on a variety of Information Security subjects.

*He was a highly carbonated speaker who has partaken of Pizza from Beijing to Brazil. He does not expect anybody to still be reading this far but if they are please note he was chosen as one of Time’s persons of the year for 2006.