REGISTER FOR OUR LIVE WEBINAR “THE BACKUP OPERATORS GUIDE TO THE GALAXY” OCT 24  12 PM PDT / 3 PM EDT

Events

Assessing And Exploiting Control Systems and IIoT

October 7 - 9

}

TBA

BruCON

Justin Searle, Director Of ICS Security, InGuardians

 

This is not your traditional SCADA/ICS/IIoT security course! How many courses send you home with a $300 kit including your own PLC and a set of RF hacking tools?!?

This is not your traditional SCADA/ICS/IIoT security course! How many courses send you home with a $300 kit including your own PLC and a set of RF hacking tools?!? This course teaches hands-on penetration testing techniques used to test individual components of a control system, including embedded electronic field devices, network protocols, RF communications, Human Machine Interfaces (HMIs), and various forms of master servers and their ICS applications.

 Attacking and Defending Kubernetes: A Purple Team Approach to Improving Detection Using Splunk Enterprise Security, Splunk Phantom and Peirates

October 23, 2019

}

11:15 AM - 12:00 PM

Jay Beale, CTO, InGuardians

Brian Genz, Senior Manager, Threat & Vulnerability Mgmt., Splunk

 

Would you be able to detect a sophisticated adversary targeting your Kubernetes clusters and workloads tonight?

How do busy teams with stacked backlogs find time to learn how to attack Kubernetes clusters, detect those attacks, and build defenses to reduce the attack surface? We will demonstrate an effective purple team methodology that “uses every part of the buffalo” by 1) executing attacks on Kubernetes using the open source tool Peirates, 2) tracking the attack artifacts from the adversary simulation in Splunk, 3) teaching the defenders how the attack was performed and where to look for forensic artifacts, and 4) working together in the purple-est way possible to improve detection and response capabilities using Splunk Enterprise Security, Splunk Phantom, and Peirates.system, including embedded electronic field devices, network protocols, RF communications, Human Machine Interfaces (HMIs), and various forms of master servers and their ICS applications.

Ghost In The Networks

October 24, 2019

}

10:00 - 10:50 AM

Bob Hillery, Chief Operations Officer, CRO, InGuardians

 

What happens when there are more accounts, and more devices, on a network than anyone knows?

Looking at when clients and consultants are not the only players.