Technical Tuesday – 6 May 2014 – Malware Reverse Engineering – An Introduction to the Tools, Workflows, and Tricks of the Trade to Attack Sophisticated Malware by Dale Robson of CyberPoint

Posted by: on May 6, 2014 in Events Archive | No Comments
Technical Tuesday – 6 May 2014 – Malware Reverse Engineering – An Introduction to the Tools, Workflows, and Tricks of the Trade to Attack Sophisticated Malware by Dale Robson of CyberPoint

Topic: Malware Reverse Engineering – An Introduction to the Tools, Workflows, and Tricks of the Trade to Attack Sophisticated Malware

Industry standard cyber security products do a good job in blocking and defending against recognized or suspicious malware. Industry leading security solutions employ a mix of sandboxing, signatures, heuristics, and reputation analysis to identify binaries and their behaviors at scale and typically at network speed.

Read More

Technical Tuesday – 11 March 2014 – Virtualization Technologies in Cyberwarfare by Jason Syversen of Siege Technologies

Posted by: on Mar 11, 2014 in Events Archive | No Comments
Technical Tuesday – 11 March 2014 – Virtualization Technologies in Cyberwarfare by Jason Syversen of Siege Technologies

Virtualization is often talked about in the context of cloud computing, cost savings and enterprise environments. In this talk, Mr. Syversen introduces Intel, AMD and ARM virtualization architectures and describe novel approaches to implementing virtualization technology / hypervisors for offensive and defensive cyber security applications. Case studies are presented for malware detection, reverse engineering, code protection, security testing, stealthy code and other applications.

Read More

Technical Tuesday – 10 December 2013 – Dumping in the Dark: Gaining Insight into your Memory Acquisition Tools and Techniques by Alissa Torres of the SANS Institute

Posted by: on Dec 10, 2013 in Events Archive | No Comments
Technical Tuesday – 10 December 2013 – Dumping in the Dark: Gaining Insight into your Memory Acquisition Tools and Techniques by Alissa Torres of the SANS Institute

Digital forensic and incident response professionals unanimously agree on the vital importance of physical memory acquisition and analysis in investigations, whether they center around the reconstruction of user activity or the isolation of malicious code. Most computer incident response teams have preferred tools for such acquisition that are part of their standard operating procedures invoked during live response or evidence acquisition. 

Read More

Technical Tuesday – 12 November 2013 – Location Based, Context Aware Services for Mobile – Today and Tomorrow by Guy Levy-Yurista, Ph.D.

Posted by: on Nov 12, 2013 in Events Archive | No Comments
Technical Tuesday – 12 November 2013 – Location Based, Context Aware Services for Mobile – Today and Tomorrow by Guy Levy-Yurista, Ph.D.

As we continue to grow our dependence on mobile devices in our daily routine from taking pictures to delivering corporate documents, the contexts in which these devices are acting becomes increasingly important. Mobility today does not only take into account who the user is but where they are, when they are there, why they go there, what they’re interested in, and what they’re going to do.

Read More

Technical Tuesday – 22 October 2013 – Cyber Security Strategy — Why We’re Losing and What’s Needed to Win by Steve Chabinsky of CrowdStrike

Posted by: on Oct 22, 2013 in Events Archive | No Comments
Technical Tuesday – 22 October 2013 – Cyber Security Strategy — Why We’re Losing and What’s Needed to Win by Steve Chabinsky of CrowdStrike

Everybody seems to be spending more on cybersecurity, but with questionable return on investment.  In fact, the problem clearly is getting worse, and current strategies show no indication of reversing that trend. 

Read More

Technical Tuesday – 24 September 2013 – Malware Analysis for the Masses by Brian Baskin of Newberry Group, Inc.

Posted by: on Sep 24, 2013 in Events Archive | No Comments
Technical Tuesday – 24 September 2013 – Malware Analysis for the Masses by Brian Baskin of Newberry Group, Inc.

With malware becoming more prevalent, and the pool of capable reversers falling short of overall need, there is a greater need to provide quick and efficient malware analysis for network defense. With modern technology and tools, it’s now possible for junior security analysts to gather detailed malware indicators to craft defense and alert signatures. More enticing, all of this can be done with free tools and applications, some written by this presenter.

Read More

Technical Tuesday – 13 August 2013 – A Cloud Computing Introduction for Managers by Dr. Patrick Allen of JHU/APL

Posted by: on Aug 13, 2013 in Events Archive | No Comments
Technical Tuesday – 13 August 2013 – A Cloud Computing Introduction for Managers by Dr. Patrick Allen of JHU/APL

Cloud computing is becoming popular. More and more Technical Managers and Project Managers will be interacting with cloud computing, either developing clouds, using clouds, or selecting among cloud and non-cloud alternatives to accomplish their projects. This talk provides a brief and basic introduction to cloud computing, what managers need to know about cloud computing, what are some of the myths, and what they need to ask about cloud computing from service providers.

Read More

Technical Tuesday – 18 June 2013 – Buzzword Forensics: Mobile is the Future…and the Future is Now by Al Holt, Adjunct Professor at Towson University

Posted by: on Jun 18, 2013 in Events Archive | No Comments
Technical Tuesday – 18 June 2013 – Buzzword Forensics: Mobile is the Future…and the Future is Now by Al Holt, Adjunct Professor at Towson University

Digital forensics is evolving, as all forensic sciences must evolve. With the explosive growth of the Internet as context, the discipline of digital forensics has evolved significantly since the last millennium. In this talk we briefly explore this evolution from the Paleolithic last millennium to our present, and increasingly mobile ecosphere.

Read More

CISSP Preparation Program for $899 beginning 15 June 2013

Posted by: on Jun 15, 2013 in Events Archive | No Comments
CISSP Preparation Program for $899 beginning 15 June 2013

Due to the success of previous offerings of this program, the Capitol College Critical Infrastructure and Cyber Protection Center is offering to cybergamut members a rate of $899 for their CISSP Preparation Program beginning 15 June 2013.

Read More

Technical Tuesday – 14 May 2013 – Identifying TLS/SSL Encrypted Network Exploitation Activity Using Traffic Externals by Jeff Kuhn of CACI

Posted by: on May 14, 2013 in Events Archive | No Comments
Technical Tuesday – 14 May 2013 – Identifying TLS/SSL Encrypted Network Exploitation Activity Using Traffic Externals by Jeff Kuhn of CACI

A significant and growing percentage of legitimate Internet traffic is now encrypted – a problem for signature-based and other content-based network exploitation detection systems. Encrypted packet content is not available for analysis and the large amount of legitimate activity provides cover for exploitation activity. Enterprise level TLS/SSL proxy is one solution, using a network gateway appliance to intercept TLS traffic and decrypt it for analysis.

Read More

Security+ Boot Camp for only $995: 29 April – 2 May 2013

Posted by: on Apr 29, 2013 in Events Archive | No Comments
Security+ Boot Camp for only $995: 29 April – 2 May 2013

The week of 29 April – 2 May 2013 (Monday – Thursday, 9 am – 5 pm daily), cybergamut sponsored a special offering of a Security+ Boot Camp at the incredible price of $995 per person.

When we offered this class late last year all the students passed the test on their first attempt.

Read More

Technical Tuesday – 23 April 2013 – Secure VoIP & Messaging for Mobile Platforms by Phil Zimmermann of Silent Circle

Posted by: on Apr 23, 2013 in Events Archive | No Comments
Technical Tuesday – 23 April 2013 – Secure VoIP & Messaging for Mobile Platforms by Phil Zimmermann of Silent Circle

Phil’s interest in secure telephony predated secure email, but he had to wait for technology infrastructure to mature.  This presentation will show you how to communicate securely without relying on PKI.

Read More

Technical Tuesday – 12 February 2013 – Are We There Yet? . . . Security and the Cloud by Dr. Susan Cole of Exceptional Software Strategies, Inc.

Posted by: on Feb 12, 2013 in Events Archive | No Comments
Technical Tuesday – 12 February 2013 – Are We There Yet? . . . Security and the Cloud by Dr. Susan Cole of Exceptional Software Strategies, Inc.

Many organizations are moving to the Cloud. The reason is obvious: it can create a huge cost savings. Depending on how moving to the cloud is implemented, companies can save on system administrator resources because software no longer needs to be installed locally, and servers no longer need to be managed locally. System administrators are also freed from deployment and maintenance activities and can now focus on more strategic objectives of the company.

Read More

Technical Tuesday – 22 January 2013 – Finding Splunk Before Splunk Finds You by Rob Frazier of Whiteboard Federal Technologies

Posted by: on Jan 22, 2013 in Events Archive | No Comments
Technical Tuesday – 22 January 2013 – Finding Splunk Before Splunk Finds You by Rob Frazier of Whiteboard Federal Technologies

Splunk is a software product that has been around for almost a decade. Most people think of Splunk as a log aggregator with some security monitoring functions thrown in. The truth is, Splunk is all that and a whole lot more. Right out of the box Splunk is a product that can provide useful information that justifies its deployment. It is easy to use and set up, and can collect machine data right away.

Read More

SANS SEC 504 training: 10 – 14 December 2012

Posted by: on Dec 10, 2012 in Events Archive | No Comments
SANS SEC 504 training: 10 – 14 December 2012

The week of 10 – 14 December 2012, cybergamut sponsored a special offering of the SANS SEC 504: Hacker Techniques, Exploits & Incident Handling training class along with a GCIH certification exam attempt at a tremendous savings for cybergamut members.

Read More

Technical Tuesday – 4 December 2012 – Sandboxing finally becomes mainstream – the new security paradigm for host based security by Alan Bollinger of OnSystem Logic

Posted by: on Dec 4, 2012 in Events Archive | No Comments
Technical Tuesday – 4 December 2012 – Sandboxing finally becomes mainstream – the new security paradigm for host based security by Alan Bollinger of OnSystem Logic

Least privilege application control (often referred to as sandboxing and more formally called mandatory access control) is emerging as this decade’s leading approach to securing host systems and applications. This technology, based on trusted operating system principles developed in the mid-90’s, is finally making its way into commercial IT environments and applications and significantly improving host security using non-signature based techniques.

Read More

Security+ Boot Camp only $995: 3 – 6 December 2012

Posted by: on Dec 3, 2012 in Events Archive | No Comments
Security+ Boot Camp only $995: 3 – 6 December 2012

This was an incredible opportunity to save money on an industry recognized class and certification that satisfies some of the DoD 8570.01-M requirements.

The week of 3 – 6 December 2012 (Monday – Thursday, 9 am – 6 pm daily), cybergamut sponsored an offering of a Security+ Boot Camp.

Read More

Teen Tech – Embedded Software Development Workshop for Teens – 3 November 2012

Posted by: on Nov 3, 2012 in Events Archive | No Comments
Teen Tech – Embedded Software Development Workshop for Teens – 3 November 2012

cybergamut is a group of industry, academic, and government professionals that works on cyber challenges. We address all phases of the cyber lifecycle and we’re continuously seeking talented individuals with creative, inquisitive minds to engage in this critical security imperative. As a follow up to our August Technical Tuesday event, we hosted a special Teen Tech on Saturday, 3 November 2012.

Read More

cybergamut Featured at CyberMaryland Conference, 16 – 17 October 2012

Posted by: on Oct 17, 2012 in Events Archive | No Comments
cybergamut Featured at CyberMaryland Conference, 16 – 17 October 2012

cybergamut was featured at the CyberMaryland conference held 16 – 17 October 2012, in Baltimore, Maryland.

The Chief Suit participated in a panel discussion where he revealed part of the solution to our Virtual Easter Egg Trail. If you had always wondered how the trail works, but have never found time to solve the steps, this was a chance to get a head start.

Read More

Technical Tuesday – 16 October 2012 – Infosec Rock Star: How to be a More Effective Security Professional by Ted Demopoulos

Posted by: on Oct 16, 2012 in Events Archive | No Comments
Technical Tuesday – 16 October 2012 – Infosec Rock Star: How to be a More Effective Security Professional by Ted Demopoulos

Why are some of us much more effective than others? A very few of us are so effective, and well known, that we might even be called the rock stars of our industry. Now we personally may never be swamped by groupies, but we can learn the skills to be more effective, well respected, and well paid.

Read More

Technical Tuesday – 18 September 2012 – Effective Decision Support to Achieve Cyber Situational Awareness by Bill Elm

Posted by: on Sep 18, 2012 in Events Archive | No Comments
Technical Tuesday – 18 September 2012 – Effective Decision Support to Achieve Cyber Situational Awareness by Bill Elm

Managing the challenges of Cyber involves almost every dimension of problem difficulty:  immense scale, internet pace, thinking adversaries, complex functional dependencies, a geographically distributed problem space, contradictory mission objectives, collaborative & multiorganizational decision making, etc.  The primary foci of most Cyber solutions tend to concentrate on data availability, automation, and analytics.

Read More

CISSP training at Capitol College – 15 September 2012

Posted by: on Sep 15, 2012 in Events Archive | No Comments
CISSP training at Capitol College – 15 September 2012

Due to the success of previous programs, the Capitol College Critical Infrastructure and Cyber Protection Center offers to cybergamut members their Capitol College Community rate of $990 for the CISSP Preparation Program beginning 15 September 2012.

Read More

Technical Tuesday Workshop – 14 August 2012 – Launching Into Embedded Hobbies

Posted by: on Aug 14, 2012 in Events Archive | No Comments
Technical Tuesday Workshop – 14 August 2012 – Launching Into Embedded Hobbies

Our world is increasingly embedded — from smart phones to smart appliances to toys with features more amazing every year.

The good news is that our world is also increasingly hobby friendly!

Read More

Technical Tuesday – 17 July 2012 – Accumulo Project Panel Discussion – co-sponsored with Open Source Software Institute (OSSI)

Posted by: on Jul 17, 2012 in Events Archive | No Comments
Technical Tuesday – 17 July 2012 – Accumulo Project Panel Discussion – co-sponsored with Open Source Software Institute (OSSI)

This was an in depth technical panel discussion on the Accumulo Project led by Adam Fuchs from the National Security Agency. The moderator was Adam Suri, Sr VP Cyber Technologies, Secure Technologies Group and board member of the Chesapeake Regional Tech Council.

Read More

CISSP training at Capitol College – 16 June 2012

Posted by: on Jun 16, 2012 in Events Archive | No Comments
CISSP training at Capitol College – 16 June 2012

Due to the success of this program last year, the Capitol College Critical Infrastructure and Cyber Protection Center offered to cybergamut members their Capitol College Community rate of $990 for the CISSP Preparation Program beginning 16 June 2012.

Read More

Technical Tuesday – 5 June 2012 – Anatomy of Malware Ecosystem by Dr. Srinivas Mukkamala

Posted by: on Jun 5, 2012 in Events Archive | No Comments
Technical Tuesday – 5 June 2012 – Anatomy of Malware Ecosystem by Dr. Srinivas Mukkamala

One of the major problems concerning information security is malicious code. To evade detection, malware (an unwanted malicious piece of code) is packed, encrypted, and obfuscated to produce variants that continue to plague properly defended and patched systems and networks with zero-day exploits.

Read More

Technical Tuesday – 22 May 2012 – Predicting Malicious Behavior: Tools and Techniques for Ensuring Global Security by Dr. Gary Jackson

Posted by: on May 22, 2012 in Events Archive | No Comments
Technical Tuesday – 22 May 2012 – Predicting Malicious Behavior: Tools and Techniques for Ensuring Global Security by Dr. Gary Jackson

Network attacks are in the process of crippling organizations. Over the years, such attacks have grown in sophistication and ever increasing damage or extensive theft of sensitive or classified data/information has been the result. Although adversarial threat has increased in effectiveness including higher numbers of first-time attacks, network protection methodologies have remained essentially the same for decades.

Read More

Technical Tuesday – 3 April 2012 – Does Locard’s Exchange Principle Apply in Digital Forensics? by Ken Zatyko

Posted by: on Apr 3, 2012 in Events Archive | No Comments
Technical Tuesday – 3 April 2012 – Does Locard’s Exchange Principle Apply in Digital Forensics? by Ken Zatyko

In this presentation, we present a challenge question for today’s cyber experts, cyber scientists, and cyber analysts.  Does Locard’s Exchange Principle apply in digital forensics? The dramatic increase in cybercrime and the repeated cyber intrusions into critical infrastructure demonstrate the need for improved security.

Read More

Technical Tuesday – 21 February 2012 – An Introduction to the (Ninja) Art of Data Carving and Steganography by Keith Bertolino

Posted by: on Feb 21, 2012 in Events Archive | No Comments
Technical Tuesday – 21 February 2012 – An Introduction to the (Ninja) Art of Data Carving and Steganography by Keith Bertolino

Since 2001 we’ve all heard the media buzz about “nameless U.S. officials” claiming that terrorists and foreign intelligence services have been using “steganography” applications to facilitate covert communication between their operatives. Steganography applications attempt to conceal digital data within other benign-appearing digital files.

Read More

Technical Tuesday – 6 December 2011 – Malware Analytics at Stream Rate – An Evolving Concept by Dr. Harold Jones

Posted by: on Dec 6, 2011 in Events Archive | No Comments
Technical Tuesday – 6 December 2011 – Malware Analytics at Stream Rate – An Evolving Concept by Dr. Harold Jones

Windows Portable Executables (PEs) are a workhorse for network operations – BAE Systems’ North American network sees roughly 5K unique PEs per day, the vast majority of which are associated with approved activities (e.g., patch downloads).

Read More