Loading…
or to bookmark your favorites and sync them to your phone or calendar.
Venue: Matchless clear filter
Tuesday, February 4
 

8:30am MST

Introduction to Cybersecurity in Space Systems (ICSS): Hardware Edition - Day 1
Tuesday February 4, 2025 8:30am - 5:00pm MST
Speakers
avatar for Tim Fowler

Tim Fowler

Tim Fowler is an Offensive Security Analyst and Penetration Tester that joined the team at Black Hills Information Security in 2021. Tim has obtained and maintains multiple industry certifications (OSCE, OSCP, OSWE, CRTO, CRTL, CISSP) and has leveraged his skills and knowledge both... Read More →
Tuesday February 4, 2025 8:30am - 5:00pm MST
Matchless
 
Wednesday, February 5
 

8:30am MST

Introduction to Cybersecurity in Space Systems (ICSS): Hardware Edition - Day 2
Wednesday February 5, 2025 8:30am - 5:00pm MST
Speakers
avatar for Tim Fowler

Tim Fowler

Tim Fowler is an Offensive Security Analyst and Penetration Tester that joined the team at Black Hills Information Security in 2021. Tim has obtained and maintains multiple industry certifications (OSCE, OSCP, OSWE, CRTO, CRTL, CISSP) and has leveraged his skills and knowledge both... Read More →
Wednesday February 5, 2025 8:30am - 5:00pm MST
Matchless
 
Thursday, February 6
 

10:00am MST

Just Enough Scripting
Thursday February 6, 2025 10:00am - 12:00pm MST
The focus in this workshop is on scripting in support of a webapp pentest. A good webapp pentest starts with a manual exploration of the target to get your bearings, of course. But once you have that, it's time to make the computer do some of the work for you.
 
We'll look at four areas:
 
1. Using the console in your browser's Developer Tools to leverage same-origin access to the application's resources to find out what's there. It's not all JavaScript: you can start in the console and end up in whatever language you want to do the heavy lifting.
 
2. Using jwt_tool to automate the common attacks against JSON Web Tokens.
 
3. Diving into cURL to find how it can save you time and help produce clear and reliable direct evidence of how an application behaves.
 
4. Getting familiar with jq, a command line utility for working with JSON data. Just as JavaScript has been taking over every aspect of web applications, JSON is displacing structured text in config files and just about everywhere else.
Speakers
avatar for BB King

BB King

BB started pentesting professionally in 2008 at the largest financial services company you’ve never heard of. As the second hire on the application security team, he helped define standards and grow the team to a group of more than 30 testers. Through teaching in that environment... Read More →
Thursday February 6, 2025 10:00am - 12:00pm MST
Matchless

1:00pm MST

I’m a Techie, and I might be promoted soon. I need a GRC Cram Session.
Thursday February 6, 2025 1:00pm - 3:00pm MST
"I'm a Techie, and I might be promoted soon. I need a GRC Cram Session" is a fast-paced, intensive 2-hour workshop designed for tech professionals on the cusp of career advancement. This crash course will equip you with essential knowledge of Governance, Risk Management, and Compliance (GRC) in cybersecurity, providing a comprehensive overview of how these elements integrate to form a robust security program. You'll gain insights into defining governance strategies, managing risks effectively, and ensuring regulatory compliance - skills that are crucial for leadership roles in today's cyber-centric business environment. By the end of this cram session, you'll be armed with the foundational GRC concepts necessary to confidently step into your potential new role and contribute to your organization's cybersecurity strategy.
Speakers
avatar for Josh Williams

Josh Williams

A cyber security executive with more than 35 years of strong technical and leadership experience in both the public and private sectors. Currently SME for large regional healthcare network with the first FOC implementation of the MITRE ATT&CK framework for threat hunting, and, CISO... Read More →
avatar for Kelli Tarala

Kelli Tarala

BHIS
Kelli Tarala joined the team at Black Hills Information Security (BHIS) in Fall of 2023 as Principal Consultant. In this role, she (in her words) “makes governance, risk, and compliance sexy again.” Kelli’s career has spanned from the mid-90s in a research laboratory exchanging... Read More →
Thursday February 6, 2025 1:00pm - 3:00pm MST
Matchless

3:15pm MST

A Crash Course in Malware Investigations
Thursday February 6, 2025 3:15pm - 5:15pm MST
In this session, we’ll review common characteristics of current malware, discuss tactical endpoint investigation strategies for Windows and Linux endpoints, review some free and open-source tools and scripts to facilitate rapid endpoint investigations, and talk about deriving “actionable intelligence,” leading to effective incident-response containment and eradication procedures.
Speakers
avatar for Patterson Cake

Patterson Cake

Patterson Cake joined the Black Hills Information Security (BHIS) pirate ship in June of 2023 as a Security Analyst focusing primarily on detection engineering and digital forensics and incident response. He chose BHIS because, to paraphrase, “doing cool stuff with cool people... Read More →
Thursday February 6, 2025 3:15pm - 5:15pm MST
Matchless
 
Friday, February 7
 

10:00am MST

Felon in Five Minutes
Friday February 7, 2025 10:00am - 12:00pm MST
Peel back the mystique behind the most basic and effective ways that threat actors, criminals, and pentesters breach physical locations. All of these techniques can be done in less than five minutes.  Learn how to properly manage expectations and scoping for your next Physical Security adventures.
Speakers
avatar for Joseph Kingstone

Joseph Kingstone

Joseph Kingstone joined Black Hills Information Security (BHIS) in Fall 2021 as a Security Analyst. In this role, Joseph performs external and internal penetration tests, C2 pivots, and red teams. He’s had a desire to work at BHIS since transitioning into IT—and eventually penetration... Read More →
Friday February 7, 2025 10:00am - 12:00pm MST
Matchless

1:00pm MST

A Crash Course in Malware Investigations
Friday February 7, 2025 1:00pm - 3:00pm MST
In this session, we’ll review common characteristics of current malware, discuss tactical endpoint investigation strategies for Windows and Linux endpoints, review some free and open-source tools and scripts to facilitate rapid endpoint investigations, and talk about deriving “actionable intelligence,” leading to effective incident-response containment and eradication procedures.
Speakers
avatar for Patterson Cake

Patterson Cake

Patterson Cake joined the Black Hills Information Security (BHIS) pirate ship in June of 2023 as a Security Analyst focusing primarily on detection engineering and digital forensics and incident response. He chose BHIS because, to paraphrase, “doing cool stuff with cool people... Read More →
Friday February 7, 2025 1:00pm - 3:00pm MST
Matchless
 
Share Modal

Share this link via

Or copy link

Filter sessions
Apply filters to sessions.