Register: https://www.antisyphontraining.com/active-defense-cyber-deception-w-john-strand/ Active Defenses have been capturing a large amount of attention in the media lately. There are those who thirst for vengeance and want to directly attack the attackers. There are those who believe that any sort of active response directed at an attacker is wrong. We believe the answer is somewhere in between. […]
For most security teams, high operational tempo (measured in dumpster fire lumens) incentivizes analysts to stick to well-tailored playbooks that prioritize remediation at the expense of proper incident scoping and root cause analysis. Though modern endpoint security products have significantly improved host visibility, most critical incidents will require the acquisition and analysis of additional endpoint […]
Register: https://www.antisyphontraining.com/enterprise-security-for-all-w-bob-hewitt-rich-fifarek/ This 16-hour Information Security training class is targeted for newly appointed or dual-roled (your primary job + security) security professionals within a Small or Medium Business (SMB) or similar sized organization. SMBs and organizations face unique challenges in Information Security yet are often presented with solutions that may be out of reach due […]
In this class, Kip shows InfoSec supervisors how to build the team of their dreams. Students will learn how to attract and retain top tier talent. The kind of talented people who could work anywhere, but choose to work with you. Team members who get stuff done and don’t think much about changing employers. What’s […]
Join the BHIS team as we talk about current infosec news. Streamed live every Monday @ 4:30 pm. https://www.youtube.com/BlackHillsInformationSecurity
Register: https://www.antisyphontraining.com/active-defense-cyber-deception-w-john-strand/ Active Defenses have been capturing a large amount of attention in the media lately. There are those who thirst for vengeance and want to directly attack the attackers. There are those who believe that any sort of active response directed at an attacker is wrong. We believe the answer is somewhere in between. […]
For most security teams, high operational tempo (measured in dumpster fire lumens) incentivizes analysts to stick to well-tailored playbooks that prioritize remediation at the expense of proper incident scoping and root cause analysis. Though modern endpoint security products have significantly improved host visibility, most critical incidents will require the acquisition and analysis of additional endpoint […]
Register: https://www.antisyphontraining.com/enterprise-security-for-all-w-bob-hewitt-rich-fifarek/ This 16-hour Information Security training class is targeted for newly appointed or dual-roled (your primary job + security) security professionals within a Small or Medium Business (SMB) or similar sized organization. SMBs and organizations face unique challenges in Information Security yet are often presented with solutions that may be out of reach due […]
In this class, Kip shows InfoSec supervisors how to build the team of their dreams. Students will learn how to attract and retain top tier talent. The kind of talented people who could work anywhere, but choose to work with you. Team members who get stuff done and don’t think much about changing employers. What’s […]
AASLR will have infosec professionals sharing their knowledge on tools, techniques, and procedures and then answering a lot of your questions on everything you can think to ask. Streamed live every Tuesday and Wednesday @ 4:30 pm. https://www.twitch.tv/antisyphon
Register: https://www.antisyphontraining.com/active-defense-cyber-deception-w-john-strand/ Active Defenses have been capturing a large amount of attention in the media lately. There are those who thirst for vengeance and want to directly attack the attackers. There are those who believe that any sort of active response directed at an attacker is wrong. We believe the answer is somewhere in between. […]