January, 31 2019
12PM PST / 3PM PST
Software Defined Radio And Why It’s Awesome
This month, Larry Pesce, our Director of Research, will lead a discussion about Software Defined Radio platforms. In this webinar, you’ll examine a few interesting software packages (with demos) to begin your exploration of the RF spectrum. You’ll also discuss what the advent of SDR can do to change the landscape for C&C, data exfiltration and information gathering.
Jay Beale returns to Kubernetes hacking, with another in his “Bust A Kube” attack and defense series. In this demo-focused on-demand webinar, Jay will attack a vulnerable Internet-based application, only to discover that the application runs in a Docker container, as...
In this demo-heavy on-demand webinar, Jay Beale continues his history of demonstrating cyber defenses by showing how to attack and defend a real Linux system. Jay will first don his black hat, showing you how to compromise the Rick and Morty-themed “Rickdiculously...
How to Attack a Linux System + Ways to Detect and Respond Swiftly (Part of the BeyondTrust webinar series)
Bad actors will target our Linux systems. With a small amount of effort, we can detect their first access to the system and stop them before they move laterally throughout. But how did they get into our systems in the first place? And what are the procedures for a...
Tackling the Privilege Challenge of Next Generation Technologies (Part of the BeyondTrust webinar series)
Tune in for an in-depth look into the key issues at the top of mind for CISOs across industries. This is a Part 2 of 2 CISO panels during Black Hat exploring the ever-changing role of the CISO, and how security professionals are coping with the threats and stress of...
Container orchestration tools are all the buzz right now. It almost seems like every company in the DevOps modality is either using or moving to Kubernetes, Docker Swarm, or one of their competitors. In this on-demand webinar, InGuardians CTO, Jay Beale, will hack a...
Press And Speaking