Webinars

Live Webinar "Hacking and Hardening Kubernetes"

Day(s)

:

Hour(s)

:

Minute(s)

:

Second(s)

Upcoming Webinars

March 28 12PM PDT / 3PM EDT

Hacking and Hardening kubernetes

Jay Beale, CTO at InGuardians

With microservices’ rise, Kubernetes gain adopters every day. It’s time for information security specialists to learn how to attack and defend container orchestration systems. This webinar will demonstrate attacks on Kubernetes clusters, then defenses that break those attacks. 

Learning Objectives:
1: Understand how to attack Kubernetes and other container orchestration platforms.
2: Understand how to defend Kubernetes, at a deep, hands-on level.
3: Understand the Kubernetes attack surface and security features and those of Linux/Docker containers.

April 18 12PM PDT / 3PM EDT

scanners, tunnels, and sims, oh my!

Justin Searle, Director of ICS Security, InGuardians

When it comes to testing and analyzing ICS communications in your lab, what’s even better than getting your hands on tools from your engineers? Easy. Having your own set of tools – available for free, customized for your current needs, and extendable for your future needs. Welcome to the Control Things Tools project! Born out of the Control Things Platform, a Kali-esque distribution for ICS professionals, Control Things Tools attempts to bring these customizable tools directly to you. This project consists of a separate but similar tool for each protocol and/or technology layer, complete with a simple-to-use python library for you to make (or contribute) your own such tools. Join us to explore the public release of the first series of these Control Things Tools: cti2c, ctspi, ctserial, ctip, ctmodbus, ctvelocio, and the python library that provides the command-line and graphical interfaces for these tools.

past webinars

February 21 12PM PST / 3PM EST

All Your copy/paste are belong to us

Adam Crompton, Senior Security Consultant, InGuardians

The clipboard functionality of modern operating systems has been around for decades, implemented to provide the ability to take a bunch of 1’s and 0’s and store them somewhere temporarily with ease.  In more common parlance, we know this as the functionality of Copy/Paste, or CTRL-C/CTRL-V.  In this relationship, the clipboard is the temporary storage for the items picked up by the copy operation, later to be retrieved by the paste operation.  

The intent of this webinar is not to go on about clipboard functionality, but to make viewers aware of the evil that comes with the functionality.

Our Senior Security Consultant Adam Crompton will share some interesting finds, along with demos in this LIVE webinar!

January 31 12PM PST / 3PM EST

software defined radio: with even more awesome

Larry Pesce, Director of Research, InGuardians

This month, Larry Pesce, our Director of Research, will lead a discussion about Software Defined Radio platforms. In this webinar, you’ll examine a few interesting software packages (with demos) to begin your exploration of the RF spectrum.  You’ll also discuss what the advent of SDR can do to change the landscape for C&C, data exfiltration and information gathering.