ITIL® 4 Foundations training: 10 – 12 June 2019

Posted on May 29, 2019 in Upcoming Events | No Comments
ITIL® 4 Foundations training: 10 – 12 June 2019

The class is 10 – 12 June 2019 (Monday – Wednesday, 9:00 am – 4:30 pm daily). cybergamut is sponsoring a special offering of an ITIL® 4 Foundations Certification class at the incredible price of $975 per person. This is as much as a 50% discount from some of the most competitive list prices I’ve found. Registration is limited and will be allocated on a first-come, first-served basis.

Read More

Technical Tuesday – 14 May 2019 – Wireless Assessment Platform Design: Three Approaches by Jeff Kuhn of MarkPoint Technologies

Posted on May 14, 2019 in Events Archive | No Comments
Technical Tuesday – 14 May 2019 – Wireless Assessment Platform Design: Three Approaches by Jeff Kuhn of MarkPoint Technologies

Ongoing size, weight, and power improvements have made relatively small wireless traffic analysis tools both practical and comparatively inexpensive. The sort of wireless situational awareness that required a cart and at least $20K of equipment just a few years ago can now be developed for less than $5K and held in one hand.

Read More

Technical Tuesday – 5 September 2017 – The Scary Truth About Online Anonymity by Zuly Gonzalez of Light Point Security

Posted on Sep 5, 2017 in Events Archive | No Comments
Technical Tuesday – 5 September 2017 – The Scary Truth About Online Anonymity by Zuly Gonzalez of Light Point Security

The web is being used more and more by both good guys and bad guys to communicate, share information, perform research, and more. Criminals hide behind the anonymity of the web to carry out their criminal activities.

Read More

Technical Tuesday – 27 June 2017 – The Threat Landscape by John McLaughlin of IBM Security

Posted on Jun 27, 2017 in Events Archive | No Comments
Technical Tuesday – 27 June 2017 – The Threat Landscape by John McLaughlin of IBM Security

The cyber security universe remains an increasing and dynamic threat to the American national infrastructure. This presentation provides a quantitative analysis of the attacks seen by IBM and the thousands of IBM customers in the preceding year.

Read More

Technical Tuesday – 23 May 2017 – Future of System Exploitation by Jason Syversen of Siege Technologies

Posted on May 23, 2017 in Events Archive | No Comments
Technical Tuesday – 23 May 2017 – Future of System Exploitation by Jason Syversen of Siege Technologies

This talk describes recent trends in vulnerability research and system exploitation, provides case studies of systems that were compromised that were not believed to be vulnerable (or in novel ways), discusses implications and makes some predictions regarding future trends in the area.

Read More

Technical Tuesday – 2 May 2017 – Trends in Electric Power Control Systems Technology Developments, Grid Modernization, and Related Cyber Security Issues by Chuck Newton of Newton-Evans Research Company

Posted on May 2, 2017 in Events Archive | No Comments
Technical Tuesday – 2 May 2017 – Trends in Electric Power Control Systems Technology Developments, Grid Modernization, and Related Cyber Security Issues by Chuck Newton of Newton-Evans Research Company

The presentation and discussion are based on recent Newton-Evans Research studies of SCADA-related technology, substation modernization and grid protection and control methods. Cyber topics are based on international studies conducted for the International Council on Large Electric Systems (In French: Conseil International des Grands Reseaux Electriques (CIGRE)) related to the communications-centric nature of monitoring and controlling electric power utilities around the world.

Read More

Technical Tuesday – 28 March 2017 – Software Defined Networking (SDN) Forensics by Mr. Joseph Bull and Mr. Michael McAlister of Booz Allen Hamilton

Posted on Mar 28, 2017 in Events Archive | No Comments
Technical Tuesday – 28 March 2017 – Software Defined Networking (SDN) Forensics by Mr. Joseph Bull and Mr. Michael McAlister of Booz Allen Hamilton

Volatility and Tshark were critical components in Booz Allen Hamilton winning the 2016 Digital Forensics Research Work Shop (DFRWS) international Software Defined Networking (SDN) digital forensics challenge. This was achieved by creating a prototype solution for the extraction of forensics artifacts from SSL/TLS encrypted packets between a software defined networking (SDN) switch and controller as well as a memory dump from the SDN switch.

Read More

Technical Tuesday – 28 February 2017 – Dataflow Machines and GPUs in Signal Processing for Wireless Communications by Dr. Joseph Mitola of Virginia Tech’s Hume Center

Posted on Feb 28, 2017 in Events Archive | No Comments
Technical Tuesday – 28 February 2017 – Dataflow Machines and GPUs in Signal Processing for Wireless Communications by Dr. Joseph Mitola of Virginia Tech’s Hume Center

Conventional computing and communications expose myriad attack surfaces because of the Turing-equivalence of the instruction set architectures and the mathematical impossibility of forming a complete set of monitor functions to protect the contents of the registers from insightfully designed malware such as what NIST terms Advanced Persistent Threats.

Read More

Technical Tuesday – 6 December 2016 – Weaponizing Data Science for Social Engineering: Automated E2E Spear Phishing on Twitter by John Seymour of ZeroFOX

Posted on Dec 6, 2016 in Events Archive | No Comments
Technical Tuesday – 6 December 2016 – Weaponizing Data Science for Social Engineering: Automated E2E Spear Phishing on Twitter by John Seymour of ZeroFOX

Historically, machine learning for information security has prioritized defense: think intrusion detection systems, malware classification and botnet traffic identification. Offense can benefit from data just as well. Social networks, especially Twitter with its access to extensive personal data, bot-friendly API, colloquial syntax and prevalence of shortened links, are the perfect venues for spreading machine-generated malicious content.

Read More

Technical Tuesday – 29 November 2016 – Internet of Things (IoT) by Dr. Susan Cole

Posted on Nov 29, 2016 in Events Archive | No Comments
Technical Tuesday – 29 November 2016 – Internet of Things (IoT) by Dr. Susan Cole

The Internet of Things (IoT) is becoming more embedded in everyday life, often without people being aware. This talk centers on defining what IoT really is, discussing why it has exploded exponentially, and identifying challenges to future implementation of IoT, including security challenges.

Read More

Technical Tuesday – 20 September 2016 – Goodbye CLI, hello API: Leveraging network programmability in security incident response by Joel King of WWT

Posted on Sep 20, 2016 in Events Archive | No Comments
Technical Tuesday – 20 September 2016 – Goodbye CLI, hello API: Leveraging network programmability in security incident response by Joel King of WWT

Automation and Orchestration has been the purview of cloud computing and system administration, but now is increasingly important to security operations and network administration. By automating the data collection and corrective action component of incident response, significant time savings can be realized.

Read More

Technical Tuesday – 6 September 2016 – Quantifying Cyber Attacks: To Optimize and Assess your Defense by Jason Syversen of Siege Technologies

Posted on Sep 6, 2016 in Events Archive | No Comments
Technical Tuesday – 6 September 2016 – Quantifying Cyber Attacks: To Optimize and Assess your Defense by Jason Syversen of Siege Technologies

This talk describes the challenges of quantifying offensive and defensive capabilities and posture. This is not an IT-oriented metrics-talk about measuring the firewall rules or number of incidents last year. Instead, you’ll hear about new military-backed research on how to quantify the effectiveness of attacks, predict outcomes and measure defensive strength, as well as the future of data-driven security technologies.

Read More

Technical Tuesday – 21 June 2016 – SS7, SWIFT, and Checking: Closed Network Evolution and Exploitation by Jeff Kuhn of Amches, Inc.

Posted on Jun 21, 2016 in Events Archive | No Comments
Technical Tuesday – 21 June 2016 – SS7, SWIFT, and Checking: Closed Network Evolution and Exploitation by Jeff Kuhn of Amches, Inc.

A recent 60 Minutes article on extracting mobile phone information from the SS7 telephone carrier signaling network crystalized some thoughts I’ve had for a while on the evolution of closed networks over time and the security implications of opening closed networks.

Read More

Technical Tuesday – 22 March 2016 – Providing Consistent Security Across Virtual and Physical Workloads by Gregory Stemberger and Rob Chee of Force 3

Posted on Mar 22, 2016 in Events Archive | No Comments
Technical Tuesday – 22 March 2016 – Providing Consistent Security Across Virtual and Physical Workloads by Gregory Stemberger and Rob Chee of Force 3

Data centers today are being tasked with many more requirements. This has been increasing as companies leverage server virtualization in new ways. This has made the data center a rich source of information for attackers. It is commonly accepted that protection of data center workloads is important, but in many cases security takes a back seat to data center performance. 

Read More

Technical Tuesday – 23 February 2016 – Neuro Cyber Analytics: Understanding the Patterns of Human Cognition in the Cyber Domain by Jason Christman and Dr. Alenka Brown of InLitics

Posted on Feb 23, 2016 in Events Archive | No Comments
Technical Tuesday – 23 February 2016 – Neuro Cyber Analytics: Understanding the Patterns of Human Cognition in the Cyber Domain by Jason Christman and Dr. Alenka Brown of InLitics

Humans use context-specific neurocognitive patterns for receiving and processing internal and external sensory information. Stated differently, people interact with the world around them primarily by seeing, hearing, and feeling, and make decisions about what to do next depending upon the context of what is happening in their environment.

Read More

Technical Tuesday – 5 January 2016 – The Threat Landscape and the Path Forward: Fundamentals of a Risk-Aware Orgnaization by John McLaughlin of IBM Security

Posted on Jan 5, 2016 in Events Archive | No Comments
Technical Tuesday – 5 January 2016 – The Threat Landscape and the Path Forward: Fundamentals of a Risk-Aware Orgnaization by John McLaughlin of IBM Security

The cyber security universe remains an increasing and dynamic threat to the American national infrastructure. This presentation provides a quantitative analysis of the attacks seen by IBM and the thousands of IBM customers in the preceding year. Specific attention will be paid to the protocols engaged, attack patterns, and trends seen in these attacks. In addition, these attacks are characterized by targets, time, and degree of success.

Read More

Technical Tuesday – 1 December 2015 – It’s a Target Rich Environment: Understanding the IIoT Attack Surface by Mike Anderson of The PTR Group, Inc.

Posted on Dec 1, 2015 in Events Archive | No Comments
Technical Tuesday – 1 December 2015 – It’s a Target Rich Environment: Understanding the IIoT Attack Surface by Mike Anderson of The PTR Group, Inc.

The Internet of Things (IoT) has received an incredible amount of press as of late. But, most of that has been associated with consumer electronics in the form of wearables and home monitoring devices like the Nest Thermostat. While those are worthwhile markets, the majority of the money will be involved with machine-to-machine communications in the Industrial Internet of Things (IIoT).

Read More

Technical Tuesday – 17 November 2015 – Hackproof Signal Processing for Wireless Communications by Dr. Joseph Mitola III

Posted on Nov 17, 2015 in Events Archive | No Comments
Technical Tuesday – 17 November 2015 – Hackproof Signal Processing for Wireless Communications by Dr. Joseph Mitola III

Conventional computing and communications expose myriad attack surfaces because of the Turing-equivalence of the instruction set architectures and the mathematical impossibility of forming a complete set of monitor functions to protect the contents of the registers from insightfully designed malware such as what NIST terms Advanced Persistent Threats. This talk describes how to throw out the general purpose computers via dataflow computing on FPGAs. 

Read More

Technical Tuesday – 30 June 2015 – The Truth about Securing your System by Dr. Susan Cole

Posted on Jun 30, 2015 in Events Archive | No Comments
Technical Tuesday – 30 June 2015 – The Truth about Securing your System by Dr. Susan Cole

What does it take to secure a system? What is the logical approach to successfully achieve this endeavor? First, an understanding of who wants access and why is a necessary baseline to form a strategic approach.  Next, an understanding of the critical assets in the organization is a must.  Finally, an understanding of how to implement a risk-based approach sums up the discussion.

Read More

Technical Tuesday – 9 June 2015 – Using EMET to Defend Against Targeted Attacks; presented by Robert Hensing of Microsoft

Posted on Jun 9, 2015 in Events Archive | No Comments
Technical Tuesday – 9 June 2015 – Using EMET to Defend Against Targeted Attacks; presented by Robert Hensing of Microsoft

0-day vulnerabilities that are able to bypass platform level exploit mitigation technologies such as DEP and ASLR are becoming increasingly common. Knowledge workers are being increasingly targeted by adversaries seeking to gain a foothold in your enterprise via spear-phishing and watering hole style attacks leveraging 0-day vulnerabilities in commonly used applications such as Internet Explorer, Adobe Reader and Oracle’s Java.

Read More

Technical Tuesday workshop – 12 May 2015 – An Hour in the Life of a Cyber Analyst by Ryan Harvell of OPS Consulting and Marcelle Lee of AACC CyberCenter

Posted on May 12, 2015 in Events Archive | No Comments
Technical Tuesday workshop – 12 May 2015 – An Hour in the Life of a Cyber Analyst by Ryan Harvell of OPS Consulting and Marcelle Lee of AACC CyberCenter

Challenge: Organizations of all shapes and sizes are engaged in an ongoing balancing act to protect their data and intellectual property while at the same time making sure that employees, partners and customers have access to necessary network resources and information. There are a variety of tools and technologies that aid in this endeavor, but as we have seen with some of the recent high profile breaches, the human element is an essential component of cyber security.

Read More

Technical Tuesday – 14 April 2015 – Tor and the Deep Dark Web by Scott FitzPatrick

Posted on Apr 14, 2015 in Events Archive | No Comments
Technical Tuesday – 14 April 2015 – Tor and the Deep Dark Web by Scott FitzPatrick

When faced with the challenge of identifying, understanding and mitigating network security risks, Tor and the Deep Dark Web present obstacles that are increasingly difficult to overcome.

Read More

ITIL® v3 Foundations Training: 2 – 4 February 2015

Posted on Feb 4, 2015 in Events Archive | No Comments
ITIL® v3 Foundations Training: 2 – 4 February 2015

The week of 2 – 4 February 2015 (Monday – Wednesday, 9 am – 5 pm daily), cybergamut sponsored a special offering of an ITIL® v3 Foundations class at the incredible price of $1400 per person.

Read More

Technical Tuesday – 2 December 2014 – Receiver Operating Characteristic (ROC) statistics and their successful use in medical studies, Nigerian scams, and APT detection by Jeff Kuhn of Amches, Inc.

Posted on Dec 2, 2014 in Events Archive | No Comments
Technical Tuesday – 2 December 2014 – Receiver Operating Characteristic (ROC) statistics and their successful use in medical studies, Nigerian scams, and APT detection by Jeff Kuhn of Amches, Inc.

Receiver Operating Characteristic (ROC) statistics have been a practical tool in the field of clinical medicine for more than 50 years, an area where stakes can be very high and test results are understood to be inherently uncertain. ROC statistics and that half-century body of knowledge also usefully inform networked system security across a range of activities including system design, analytics tuning, and operational tactics.

Read More

Technical Tuesday – 28 October 2014 – Software Defined Networking Security by Joel King of World Wide Technology

Posted on Oct 28, 2014 in Events Archive | No Comments
Technical Tuesday – 28 October 2014 – Software Defined Networking Security by Joel King of World Wide Technology

Security-Defined Routing combines cyber analytics and SDN to protect the network: SDR technology assists organizations in scaling the delivery of network traffic to analytic security applications. When incidents are detected, changing the network forwarding tables through SDR techniques can provide an immediate remediation to network attacks, while automating the delivery of suspect traffic for transaction monitoring and archiving data for regulatory compliance and advance troubleshooting.

Read More

Technical Tuesday – 6 May 2014 – Malware Reverse Engineering – An Introduction to the Tools, Workflows, and Tricks of the Trade to Attack Sophisticated Malware by Dale Robson of CyberPoint

Posted on May 6, 2014 in Events Archive | No Comments
Technical Tuesday – 6 May 2014 – Malware Reverse Engineering – An Introduction to the Tools, Workflows, and Tricks of the Trade to Attack Sophisticated Malware by Dale Robson of CyberPoint

Industry standard cyber security products do a good job in blocking and defending against recognized or suspicious malware. Industry leading security solutions employ a mix of sandboxing, signatures, heuristics, and reputation analysis to identify binaries and their behaviors at scale and typically at network speed.

Read More

Technical Tuesday – 11 March 2014 – Virtualization Technologies in Cyberwarfare by Jason Syversen of Siege Technologies

Posted on Mar 11, 2014 in Events Archive | No Comments
Technical Tuesday – 11 March 2014 – Virtualization Technologies in Cyberwarfare by Jason Syversen of Siege Technologies

Virtualization is often talked about in the context of cloud computing, cost savings and enterprise environments. In this talk, Mr. Syversen introduces Intel, AMD and ARM virtualization architectures and describe novel approaches to implementing virtualization technology / hypervisors for offensive and defensive cyber security applications. Case studies are presented for malware detection, reverse engineering, code protection, security testing, stealthy code and other applications.

Read More

Technical Tuesday – 10 December 2013 – Dumping in the Dark: Gaining Insight into your Memory Acquisition Tools and Techniques by Alissa Torres of the SANS Institute

Posted on Dec 10, 2013 in Events Archive | No Comments
Technical Tuesday – 10 December 2013 – Dumping in the Dark: Gaining Insight into your Memory Acquisition Tools and Techniques by Alissa Torres of the SANS Institute

Digital forensic and incident response professionals unanimously agree on the vital importance of physical memory acquisition and analysis in investigations, whether they center around the reconstruction of user activity or the isolation of malicious code. Most computer incident response teams have preferred tools for such acquisition that are part of their standard operating procedures invoked during live response or evidence acquisition. 

Read More

Technical Tuesday – 12 November 2013 – Location Based, Context Aware Services for Mobile – Today and Tomorrow by Guy Levy-Yurista, Ph.D.

Posted on Nov 12, 2013 in Events Archive | No Comments
Technical Tuesday – 12 November 2013 – Location Based, Context Aware Services for Mobile – Today and Tomorrow by Guy Levy-Yurista, Ph.D.

As we continue to grow our dependence on mobile devices in our daily routine from taking pictures to delivering corporate documents, the contexts in which these devices are acting becomes increasingly important. Mobility today does not only take into account who the user is but where they are, when they are there, why they go there, what they’re interested in, and what they’re going to do.

Read More

Security+ Boot Camp for only $1195: Beginning 19 November 2013

Posted on Nov 3, 2013 in Uncategorized | No Comments
Security+ Boot Camp for only $1195: Beginning 19 November 2013

cybergamut provides ongoing professional development opportunities including training and certification classes as well as Technical Tuesday presentations. This is an incredible offer to save money on an industry recognized class and certification that satisfies some of the DoD 8570.01-M requirements and is offered at times that shouldn’t affect direct billable hours for contract personnel.

Read More