Cyber Warriors Unification Workshop
Cyber warriors, unite! This workshop brings the industry’s foremost cyber security experts together (all have spoken and trained at BlackHat) for a deep dive into mission-critical topics—from data analytic techniques and abusing trust between systems to uncovering a burglar’s tactics and how to attack complex Java objects for unauthenticated remote code execution. Our presenters will share lessons learned and best practices from decades of hands-on experience defending (and infiltrating) some of the world’s most secure networks and facilities. This interactive workshop is meant to challenge your thinking and encourage candid discussions.
Mark your calendars and register now! This workshop is limited to 80 attendees maximum and registrations will be taken on a first come, first served basis. Questions? Please contact Josh Tyner at jtyner@ccsecuritytraining.com or 443-454-4585.
Space is limited. Get registered!
Agenda
Session 1: “From Data to Value in One Easy Lesson”
Presenter: Charles Givre, GTK Cyber
One of the biggest challenges security analysts face is extracting value from the ever-growing volumes of data. As data volume, velocity and variety increase--not to mention attacker sophistication, security professionals need to understand how to use the latest data analytic techniques. Charles will demonstrate how to use a collection of open source tools to rapidly explore security data and extract value from it. He will also demonstrate how to apply machine learning to security problems.
Bio: Charles Givre is a solutions-focused Senior Technical Executive and Data Scientist with more than 20 years of success across the technology, data science, Fintech, education, and cybersecurity industries. His broad areas of expertise include data visualization, analytics, network security, information assurance, strategic planning, big data, business intelligence, software development and program management. Charles has held leadership positions at organizations including Deutsche Bank, Booz Allen Hamilton and the Central Intelligence Agency (CIA). As VP and Lead Data Scientist with Deutsche Bank since November 2017, he is leading an international team of engineers and cyber threat analysts to build the company’s next generation of security analytics tools. He is a published author, regular conference speaker and Project Management Committee (PMC) member for the Apache Drill project.
Session 2: “Trust Abusing in Unix and Windows”
Presenter: Alex Testa, Attack Research
This session discusses the trust relationships shared across networks and hosts regardless of the underlying operating systems. Topics include:
Bio: Alex has been a Security Researcher, Pen Tester, and Developer for Attack Research, LLC for over 5 years. He has over 20 years of experience in private sector development and security research. Attack Research is a boutique computer security consulting firm which is devoted to a deep understanding of the mechanics of computer attacks. Industry specialties range from embedded systems, avionics, and automotive to government, financial and Fortune 500 enterprise environments.
Session 3: āThe Burglar's Guide to Your Facilityā
Presenter: Robert Pingor, Core Group
Robert has planned and participated in dozens of successful red team operations on government targets and Fortune 100 entities. Join him for an intimate and candid talk on what makes his entries possible. During this session, youāll get an unprecedented opportunity to rummage through his tool bag to see the gear he often utilizes on jobs as well as hear about the pretexts he uses on unwitting security personnel and employees. This session will expand your horizons and help you shore up your defenses against would-be adversaries.
Bio: Robert Pingor founded Nomad Tactical Solutions. His policing and operations background was honed during his years at the National Security Agency where he served with distinction in four different specialty units as a Corporal. Robert has extensive training in both the government and private sectors. He has instructed for the Department of Defense, the State Department, the National Security Agency, the United States Air Force, the United States Military Academy at West Point, the United States Naval Academy at Annapolis, the National Defense University, the Sig Sauer Academy and countless local law enforcement agencies. Additionally, he regularly conducts trainings for Black Hat, the SANS Institute, Google, and other technical conferences. Outside of work, Robert volunteers for a variety of charities and non-profits. He runs the Future Blue Program, an organization dedicated to developing young people into competent law enforcement professionals and he trains volunteers to fight childhood sex trafficking. His work has been featured in Recoil Magazine, Counterterrorist Magazine, Tribecca Film Festival, and the TV series The Sentinel.
Session 4: āAttacking Complex Java Objects for Unauthenticated Remote Code Executionā
Presenter: Steven Seeley, Source Incite
Drawing from his own experience, Steven will detail how he found three different vulnerabilities in a high-end Cisco appliance and how he chained them together to achieve unauthenticated remote code execution as root. The attack chains presented will demonstrate the complexity of server-side Java attacks due to several layers of abstraction and how this can be broken down by a security analyst or sophisticated attacker
Bio: Steven is a full-time bounty hunter and has been a Zeroday Initiative (ZDI) platinum researcher for the last four years running. Previously, Steven was the lead developer of the AWAE course held by Offensive Security and has trained students at both BlackHat Asia and BlackHat USA. When he's not (ab)using code, he's often out riding his Harley Davidson or lifting heavy weights.
All skill levels
Group Training
0900-1600
FREE
None
None
Why choose the Center for Cyber Security Training
Interactive, classroom-based learning
Subject matter experts
Trusted by US government agencies
Seats are limited.
Register Now.
The knowledge I gained through this course was substantial. From learning new script writing techniques to understanding big data tools, the instructor covered everything I was hoping for and more!- Sarah H., Washington, DC
Are you fully prepared to deal with today's increasing cyber security risks? We can
help you get the training you need.
Upcoming Workshop Sessions
Look for more
- - - | - - - | - - - | - - - | - - - | - - - | - - - |
DN_T | DN_T | DN_T | DN_T | DN_T | DN_T | DN_T |
DN_T | DN_T | DN_T | DN_T | DN_T | DN_T | DN_T |
DN_T | DN_T | DN_T | DN_T | DN_T | DN_T | DN_T |
DN_T | DN_T | DN_T | DN_T | DN_T | DN_T | DN_T |
DN_T | DN_T | DN_T | DN_T | DN_T | DN_T | DN_T |
DN_T | DN_T | DN_T | DN_T | DN_T | DN_T | DN_T |
- - - | - - - | - - - | - - - | - - - | - - - | - - - |
DN_T | DN_T | DN_T | DN_T | DN_T | DN_T | DN_T |
You have no events for this day
Look for more
You have no events for this month
Look for more
You have no events for this month
You have no events
stec_replace_summary
stec_replace_location
stec_replace_timespan
Event Info
Location
Schedule
Guests
Attendance
Shop
Forecast
Comments
stec_replace_summary
- stec_replace_titleOrganizer of stec_replace_eventstec_replace_about
0
days
0
hours
0
minutes
0
seconds
Event expired
Event is in progress
Location
stec_replace_location
Get Directions
Could not find route!
Details
No schedule
- stec_replace_social
stec_replace_name
stec_replace_about
You are invited to this event!
- stec_replace_status
stec_replace_name
stec_replace_product_title
stec_replace_product_short_desc
QTY:stec_replace_product_quantity
PRICE:stec_replace_product_price
Product
Name
Quantity
Price
Action
Weather data is currently not available for this location
Weather Report
Today stec_replace_today_date
stec_replace_current_summary_text
stec_replace_current_temp °stec_replace_current_temp_units
Wind stec_replace_current_wind stec_replace_current_wind_units stec_replace_current_wind_direction
Humidity stec_replace_current_humidity %
Feels like stec_replace_current_feels_like °stec_replace_current_temp_units
Forecast
Date
Weather
Temp
stec_replace_date
stec_replace_icon_divstec_replace_min / stec_replace_max °stec_replace_temp_units
Next 24 Hours
Powered by Forecast.io