Security Weekly Webcasts

Cybercast
This webcast will help you understand blockchain technologies and how to pivot into the world of Crypto security. Tyler and Beau will dive into the world of Crypto briefly covering the high-level topics, technologies, and security implications that already become mainstream issues. If you are new to the world of Crypto you should join to learn why more security professionals need to understand the concepts, security, and risks as well as ways to begin pivoting into the security arena of these ever-increasing financial and technological platforms.
Watch
Cybercast
Do you struggle to choose between cloud services, containers, and/or Kubernetes? If so, tune in to Rich Mogull and Paul Asadoorian’s discussion on how to choose the right architecture for your application. Of course, this is step 1. Step 2 is to design and implement security around your application. This is no easy task and there are many choices. We’ll cover some of the better options for getting your application deployed to the cloud securely. Watch Now!
Watch
Cybercast
Visibility is critical in protecting an organization from cyber-attacks, and without it a defender cannot be successful. System Monitor (Sysmon) for Windows provides the visibility necessary to protect your organization. Sysmon provides detailed information about process creations, network connections, drivers loaded, and more. By aggregating these events to a centralized location you have provided the visibility for a defender to be successful.
Watch
Cybercast
Many organizations lack visibility into 802.11 traffic and attacks. You can choose to ignore it, however, this does not mean you are not experiencing attacks, it just means you won’t see them! Nzyme is a free and open-source wireless (802.11) intrusion detection system. With the right, inexpensive, hardware you can be monitoring your Wifi networks for attacks. Join us to learn more about this open-source project, including supported hardware, setup, features, and customizations.
Watch
Cybercast
Kusto Query Language (KQL) is Microsoft’s proprietary query language and has many use cases in enterprise Azure environments including threat hunting, threat detection and discovering misconfigured assets. In this webcast, I’ll be going over these use cases and teaching the attendee how to structure KQL queries to get insights about activity in their Azure environments. Think of this as an intro to KQL where attendees can come in with 0 KQL knowledge and will leave with the ability to write their own KQL queries.
Watch
Cybercast
You’ve installed Security Onion to monitor your network traffic and collect logs from endpoints. Great! But now what? In this session, we’ll discuss five things you can do to catch more bad guys!
Watch
Cybercast
With the growing need for application security and testing from security researchers, bug bounty programs, and penetration testers, organizations and their staff must understand how to take in vulnerability reports and quickly validate the finding. This validation includes not only determining the validity of the flaw but the risk it exposes to the organization. In this demonstration, Kevin Johnson of Secure Ideas will walk attendees through these validation techniques.
Watch
Cybercast
A good lab can be one of the most essential tools for security professionals. They can help us learn new skills, simulate attacks, and test defenses. Lots of webcasts have covered the basics of building a generic lab, but we’re taking a different approach here. We’re going to cover several different types of labs, for different use cases: – Labs for learning – Labs for testing defenses – Offensive testing labs – Application and Mobile testing labs (which can help with security research and bug bounties) We’ll help you choose the right lab for your needs. This webcast will also include a handout with links to some of the most important resources (and even suggested PC builds!) to put together your dream lab.
Watch