Jay Beale returns to Kubernetes hacking, with another in his “Bust A Kube” attack and defense series. In this demo-focused on-demand webinar, Jay will attack a vulnerable Internet-based application, only to discover that the application runs in a Docker container, as...
In this demo-heavy on-demand webinar, Jay Beale continues his history of demonstrating cyber defenses by showing how to attack and defend a real Linux system. Jay will first don his black hat, showing you how to compromise the Rick and Morty-themed “Rickdiculously...
How to Attack a Linux System + Ways to Detect and Respond Swiftly (Part of the BeyondTrust webinar series)
Bad actors will target our Linux systems. With a small amount of effort, we can detect their first access to the system and stop them before they move laterally throughout. But how did they get into our systems in the first place? And what are the procedures for a...
Tackling the Privilege Challenge of Next Generation Technologies (Part of the BeyondTrust webinar series)
Tune in for an in-depth look into the key issues at the top of mind for CISOs across industries. This is a Part 2 of 2 CISO panels during Black Hat exploring the ever-changing role of the CISO, and how security professionals are coping with the threats and stress of...
By Brian Laing and Jimmy Alderson https://inguardians.box.com/shared/static/3swck8ula5mx5qosjwne1w3ptd4fq50j.pdf
Exploring the ins and outs of Snort front ends by Mike Poor https://inguardians.box.com/shared/static/hcx7dfnn87kckatukunngao107scyiz1.pdf
Correlating System and Application Logs with Traffic Traces and IDS Alerts by Mike Poor https://inguardians.box.com/shared/static/papgh6vwh0a4ee4o3snp2dnaz2ey4szq.pdf
SANSFIRE Keynote on Early Warning Systems by Mike Poor https://inguardians.box.com/shared/static/hgy9lnemxgxtqjeeettwvq3uyo2cub6w.pdf
Press And Speaking