Author: rvasadmin

Kymberlee Price To Keynote RVAsec 13!

We are pleased to announce that Kymberlee Price will be keynoting RVAsec!

Kymberlee is co-founder and CEO of Zatik Security, a fractional product security consulting company whose mission is to make world-class cybersecurity expertise available to companies of all sizes. A dynamic engineering leader and public speaker known for developing high-performing multidisciplinary teams, Kymberlee is a recognized expert in the information security industry with extensive experience in product security incident response operations and bug bounties, Secure Development Lifecycle (SDL), and Open Source Security strategy.

Ms. Price speaks regularly at conferences around the world and is on the content review board for Black Hat USA where she has served the security community since 2016.


RVAsec 13 CFP is now open!

The call for papers for RVAsec 13 is now open!

Click here to submit a talk to the CFP now!

Conference: June 4-5th, 2024

Location: Richmond, VA

CFP Submission Deadline:  March 24th, 2024 at 11:59 PM Eastern


RVAsec is a Richmond, VA based security convention that brings top industry speakers to the midatlantic region. In its twelfth year, RVAsec is expected to attract over 850 security professionals from across the country. For 2024, the conference is a two day and three track format, with a mixed focus on technical, management/business and 101 presentations.

Information:

  • Conference location: Richmond, VA
  • Dates: June 4-5, 2024
  • All talks must be 50 minutes in length
  • Presenters will need to select Technical, Business/Management, or 101 tracks.
  • While we welcome foreign speakers, we are unable provide sponsorship for entry to the U.S.

We try to treat our speakers well with a special VIP event, gifts, and travel assistance (if possible). Join us at RVAsec and enjoy the perks!

For more information and requirements, or to submit, please visit:

https://forms.gle/aaZESxtM6jnDqVCX8

 


RVAsec 13 Registration Open!

Tickets for RVAsec 2024 are now on sale!

Registration for the RVAsec 13 security conference, located in Richmond, Virginia, is only $275 (to start) for two full days of talks, meals, snacks, drinks, reception, after party, prizes, a capture the flag contest, t-shirt & swag!

Once we sell out there will be no more tickets available and we do not have tickets for purchase at the door onsite.

Conference ticket prices and deadlines:**

  • $275 special price for the first 100 tickets!
  • $375 regular price until 5/1
  • $475 late registration until 5/24
  • $575 super late registration until 6/2 or until tickets sell out

We also again have the RVAsec Marriott Hotel Package available until 5/10! The conference + Marriott hotel package is $650 and includes:

  • Two night’s stay at the Richmond Marriott Downtown (6/4 and 6/5), including taxes+fees (card needed at check-in for incidentals)
  • RVAsec conference admission
  • Custom Hack.RVA Electronic badge (the only way to guarantee one of the limited electronic badges)
  • T-Shirt
  • Bag
  • Meals & snacks
  • Events

** If you are unable to attend due to the price, please contact us to discuss as we have stipends available for students, and we have a volunteer opportunities that provide a great way to get in for free!

Once again there will be no tickets sold at the door–and RVAsec has sold out every year–don’t wait!  We are unable to provide refunds due to processing fees.  You can, however, easily transfer your ticket to another person.

Register now!


RVAsec 13 – June 4-5, 2024

We are pleased to announce the dates for RVAsec 2024, and that we are moving to the Downtown Richmond Marriott for the next three years.  While we are grateful to our previous venue for supporting us over the past several years, this move gives us even more space and better parking options!

The conference will be held June 4-5, 2024 at the Richmond Marriott Hotel.

Please stay on the look out for future announcements about the CFP and ticket sales.

We look forward to seeing you soon!

-Chris and Jake


RVAsec 2023 Videos: Andrew Hendela & Drew Schmitt

Andrew HendelaAndrew Hendela

Most software supply chain-related tools fall into a few categories: SBOM generation, vulnerability analysis, build policies, and source-code analysis. These do not address the problem exemplified by the SolarWinds supply-chain malware insertion attack. Software Bills of Behaviors provide an understanding of what the software is doing and how it has changed providing a defense against Solarwinds-style attacks.

About Andrew – Andrew has over a decade of cybersecurity experience leading teams tackling hard challenges. His technical expertise involves automating a wide range of problems, including cyber attribution, malware analysis, and vulnerability research.


Drew SchmittDrew Schmitt

Ransomware rebranding is becoming a common technique that ransomware groups are leveraging to obfuscate their operations and remain under the radar. From high-profile groups like Evil Corp to groups like AlphV and Blackbyte, the rebranding process has provided viable solution for extending operational capabilities after high profile attacks. This talk will examine rebranding trends since 2020 and provide a thorough review of the impacts ransomware rebranding has had on the operational capacity of multiple ransomware groups. Lastly, this talk will analyze methods that threat intelligence analysts can utilize to compare traits and behaviors between ransomware groups to determine if the group is a likely rebrand or a new group altogether.

About Drew – Drew Schmitt is the GuidePoint Research and Intelligence Team Lead Analyst and is responsible for coordinating threat research, malware analysis, and operationalized intelligence teams. Drew is especially fond of malware research and reverse engineering. When not neck deep in malware, he loves to create new and open-source tools and improve his techniques and capabilities. Drew is also an avid teacher and mentor, and really enjoys helping other people realize their love of malware, threat intelligence, and–above all–making threat actors’ lives harder. In past lives, Drew spent time as an incident responder, threat hunter, and IT administrator.



RVAsec 2023 Videos: Brendan O’Leary & Aliscia Andrews

Brendan O'LearyBrendan O’Leary

The peculiar story of the history of cryptography – featuring a code-breaking Quaker poet

About Brendan – Brendan O’Leary is Head of Community at ProjectDiscovery. He spends his time connecting with developers, security engineers, contributing to open source projects, and sharing his thoughts on cutting-edge technologies on conference panels, meetups, in contributed articles and on blogs.


Aliscia AndrewsAliscia Andrews

Discussion on the importance of a whole of government approach to cyber.

About Aliscia – Aliscia Andrews started her Homeland Security career more than 15 years ago while serving as an Intelligence Analyst and Weapons and Tactics Instructor for the United States Marine Corps. After the Marine Corps, Mrs. Andrews completed her MBA and Cybersecurity Management Certificate from Georgetown University.

After her time in the Marine Corps, Mrs. Andrews, continued honing in her analytical tradecraft in both the public and private sector. Her work portfolio has focused primarily on finding complex solutions to challenging Government problems as a strategic management, analytic, and cyber policy advisor in support of multiple government agencies both in and out of the Intelligence Community.

Today Mrs. Andrews is proud to be the Deputy Secretary of Homeland Security for the Commonwealth of Virginia. She continues to serve her community as a member and volunteer on multiple PTOs, disadvantaged children’s groups, church ministry groups, youth sports leagues, and mentors transitioning Veterans. Deputy Secretary Andrews resides in Aldie, Virginia with her Husband and three children.


RVAsec 2023 Videos: Fletcher Davis & David Girvin

Fletcher DavisFletcher Davis

With the advancements in defensive capabilities, from endpoint protection to user behavior analytics, operating within mature environments has become more difficult than ever. However, with each of these capabilities comes constraints that Red Teamers can abuse to shift the operational asymmetries and increase their strategic advantage. This talk will discuss how Red Teamers can shift their current operational mental models to abuse these constraints to blend-in more naturally within environments as they seek to complete target objectives.

About Fletcher – Fletcher is currently a Senior Red Team Consultant at CrowdStrike, specializing in Adversary Simulation operations and Offensive Security research.


David GirvinDavid Girvin

AI, it’s all the buzz. We have seen marketing fraudsters at Black Hat called out. Heard sales people use every buzzword they can to try and close. So is it all smoke and mirrors? Or maybe there is pragmatic use for this upcoming technology. I have taken ChatGPT and treated it like an offensive security lab. I trialed many different approaches to using it. In this talk I will show where it can add value in a technical, business and sales role. I will also show how it can fail miserably, it’s security concerns and how its influenced. Will this take your job or add to it? Find out in my talk.

About David – Hacker, BJJ enthusiast, world traveler and surfer. I am a giant weirdo who somehow found my niche in offensive security. I have been blessed getting to build AppSec programs for companies like 1Password and Red Canary. I have an extremely diverse background and hope I can relate and or add value to everyones experience,



RVAsec 2023 Videos: Josh Cigna & Denis Mandich

Josh CignaJosh Cigna

Passwords have long been the bane of user, IT support staff & security professional. Compromised passwords are the leading source of account takeover and system breach, attackers are simply logging in and no longer breaking in! Solutions in the past have always come with caveats, but with the inclusion of Passkeys into most major operating systems and platforms a true light may be at the end of the tunnel. Join this panel to learn about the sorted history of passwords, current and developing trends with passwordless authentication, and what the best practice for Passkeys looks like!

About Josh – Josh Cigna is a solutions architect at Yubico focused on supporting enterprises on the impacts of regulations, requirements, and the latest authentication technologies. He is passionate about evangelizing user focused security solutions—advising organizations that user experience should be a key consideration alongside risk mitigation and meeting compliance mandates. Joshua’s experience includes the definition, design and implementation of IAM processes and programs. Prior to Yubico, he held technical positions at Thomson Reuters and Capital One and holds a CISSP certification.


Denis MandichDenis Mandich

The advent of quantum computers promises to have profound economic impact because they solve lucrative industry problems that are otherwise impossible. The dark side is the consequences to global cybersecurity and the encryption systems fundamental to almost every aspect of our digital lives, including the cyber tools needed to protect them. Although 1970s-era PKI infrastructure has served us well for decades, it provides no assurance against the threat of “harvest now, decrypt later”. The transition to post quantum cryptography standards must be accompanied by more advanced techniques to ensure durable privacy, which is now a national economic security imperative. Fortunately, new redundant hardware and software solutions eliminate the single point of attack and failure in our business critical systems.

About Denis- CTO and Co-founder of Qrypt
Founding member of the Quantum Economic Development Consortium (QED-C)
Founding member of the Mid-Atlantic Quantum Alliance (MQA)
ANSI Accredited Standards Committee X9
ITU Telecommunications Standardization Sector (ITU-T)
Forbes Technology Council
Quside board member
20-year USIC veteran
Physicist


RVAsec 2023 Videos: Qasim Ijaz & Andrew Skatoff

Qasim Ijaz

This talk is a summation of stories from my recent penetration tests inside Active Directory networks. I will use this time to discuss common methods I have used to obtain initial access inside Active Directory environments, the features that paved the way to lateral movement, and vulnerabilities that escalated me to Domain Admin. This talk is laid out in a way that benefits both entry-level and experienced penetration testers. The content is for both blue and red teamers looking to better understand common Active Directory configurations that can lead to compromise. It has everything from memes to kerberoasting, with a pinch of humor (no dad jokes, I promise).

About Qasim – Qasim “”Q”” Ijaz is a Director of Offensive Security at Blue Bastion Security and specializes in healthcare security and penetration testing. He has conducted hundreds of penetration tests in small to large environments with a focus on networks and web applications testing. His areas of interest include healthcare security, Active Directory, cybersecurity policy, and the “”dry”” business side of hacking. Qasim is a penetration test lead during the day and a teacher in the after-hours. Qasim has presented and taught at cybersecurity conferences including BSides and Blackhat on offensive security topics. He currently teaches a bootcamp on Offensive Security Certified Professional (OSCP) certification.


Andrew SkatoffAndrew Skatoff

This talk will present a roadmap for designing a mature threat hunting service. A maturity model will be shared, along with prerequisites and incremental steps along the way.

Having built the Threat Hunting service at the Federal Reserve, I will share our journey, recommend approaches and resources, and provide a path for listeners to follow to do the same.

About Andrew – Andrew has been securing and protecting critical infrastructure networks since 2002.

Raised by a Topgun Marine fighter pilot and a middle school special education teacher, Andrew was always driven to find meaningful work, solve interesting problems and help others do the same in an effort to make the world a better and safer place.

His love for computers started in college and after spending several years providing tech support in the energy and financial sectors, he achieved his MCSE certification. This led to his first information security job supporting a migration to active directory. Andrew then went on to champion, design and implement an automated compliance and vulnerability management program.

Andrew has been developing and leading incident response, malware analysis, threat hunting and digital forensics services for the past 18 years in critical infrastructure financial organizations.

He currently holds GREM, GCFA, GDAT, GNFA and CISSP certifications and serves as an Cybersecurity Senior Manager at a large financial organization.



RVAsec 2023 Videos: Dwayne McDaniel & Andrea Matwyshyn

Dwayne McDanielDwayne McDaniel

Ever wish you could set traps for intruders in your environment? While you can’t rig explosions or rolling boulders when someone attacks your servers, you can set up false credentials that trigger alarms you can act against. That is the whole idea behind honeytokens!

Come to this session to learn how honeytokens work

About Dwayne – Dwayne has been working as a Developer Relations professional since 2015 and has been involved in tech communities since 2005. He loves sharing his knowledge, and he has done so by giving talks at over a hundred events worldwide. Dwayne currently lives in Chicago. Outside of tech, he loves karaoke, live music, and performing improv.


Andrea MatwyshynAndrea Matwyshyn

When the 2023 National Cybersecurity Strategy called for “shifting liability to promote secure development practices,” the response from the security (and legal) community often overstated the novelty of the proposal. We have already been living with (various forms of) software liability for confidentiality, integrity, and availability failures for over two decades. This talk clarifies the legal landscape of both what already exists and the likely paths for the future. Cautioning against various security dystopias including Hannah Arendt’s “cybernation,” this talk offers suggestions on buildouts to existing threat modeling frameworks to explicitly consider factors used by courts and regulators to determine liability. These buildouts can better align the security team and in-house counsel in a joint defensive enterprise. But, two scaling issues will remain: the need for a technology regulator of last resort (a “TRoLR”) and a security community-driven model of professionalism.

About Andrea – Dr. Andrea Matwyshyn is a full professor in the law school and engineering school at Penn State, the Associate Dean of Innovation at Penn State Law, and the founding faculty director of both the Penn State PILOT Lab (Policy Innovation Lab of Tomorrow), an interdisciplinary technology policy lab, and the Manglona Lab for Gender and Economic Equity, a technology equity lab and clinic.

She has also worked in both the private and public sector, most recently in 2023 as a Senior Special Advisor on Information Security and Data Privacy to the U.S. Consumer Financial Protection Bureau’s Office of Enforcement and a Senior Special Advisor on Law, Technology, and the Digital Economy to the U.S. Federal Trade Commission’s Bureau of Consumer Protection. Her first hackercon talk was at BlackHat USA in 2003, and she has previously served as a specialty reviewer on the DEF CON CFP Review team.