Gold Sponsor: Arctic Wolf

RVAsec is pleased to announce Arctic Wolf as a Gold level sponsor for RVAsec 10!

The Leader in Security Operations–get better security effectiveness for your organization with the Arctic Wolf® Platform and Concierge Security® Team.

https://arcticwolf.com/

Twitter @AWNetworks


Speaker Feature: Anthony Switzer

Anthony is just someone that has a passion for helping people and shares that passion through cybersecurity.

Why I Love Purple Teams, Even Though They Don’t Exist

The industry of Cybersecurity has grown over the years. As a group driven by innovation, we look to solve our own problems. We have mimicked the military by choosing to have blue and red teams but have also developed a new team, the Purple Team. If you asked a cybersecurity professional what a Purple Team is, they might respond with a simple “it’s red and blue combined.” This talk is questioning what a Purple Team is by breaking the problem down to a first principle. Once we have the first principle, we’ll open it up to see if this is really a unique situation to our industry or was it solved already.

Come see Anthony at RVAsec! Register now.


Gold Sponsor: Gigamon

RVAsec is pleased to announce Gigamon as a Gold level sponsor for RVAsec 10!

Gigamon

We deliver elastic visibility and analytics on all data-in-motion across the hybrid cloud network so your organization can run fast, stay secure and innovate.

https://www.gigamon.com

@gigamon


Gold Sponsor: Assura

RVAsec is pleased to announce Assura as a Gold level sponsor for RVAsec 10!

AssuraEverything we do at Assura is designed for you to win against hackers and make you look like a superhero — to your boss, your stakeholders, and your customers. Whether your a cyber security novice or have been in the fight as long as we have, Assura has a service that’s right for you.

  • Defense & Response
  • Managed Security Services
  • Project & Advisory Services

https://www.assurainc.com/

Twitter @Assura_Inc


Capture The Flag Is Happening!

The conference is right around the corner, and the MetaCTF (https://metactf.com/) team is hard at work preparing for this year’s Capture the Flag competition!

In keeping with the format of the past several years, we’ll be providing a practice environment on Day 1 of the conference to help participants prepare for the competition, find teams, and get familiar with the platform. If you’ve never participated in a CTF before, this is a perfect opportunity to get started!

The actual competition will take place on Day 2. There will be plenty of challenges for participants at all skill levels, so whether you’re a seasoned CTF player or a beginner, there will be something for you! Among others, challenge categories will include web exploitation, reverse engineering, OSINT, cryptography, forensics, and binary exploitation.

You’ll need a laptop to participate. Teams can have up to 4 people, or you may compete as an individual.

For those who like to come prepared, we suggest that you have a VM or two ready. You can download Kali Linux here (https://www.kali.org/downloads/) or get a free Windows VM here (https://developer.microsoft.com/en-us/windows/downloads/virtual-machines/). Some tools that might be helpful include CyberChef (https://gchq.github.io/CyberChef/), BurpSuite, Ghidra, Pwntools, and Wireshark.

The MetaCTF team has been involved with the RVAsec CTF since 2016. If you’re interested in helping out with the CTF or have any questions, please reach out to roman[at]metactf.com

We are still looking for a sponsor for the CTF.  Please consider supporting the conference and help us provide a great experience and amazing prizes!


Speaker Feature: Richard Thayer

Richard Thayer has been in IT for over 35 years. From his early beginnings of working on IBM’s 8086XT system(s), to designing robust security architectures for Fortune 50 companies; Mr. Thayer has consulted for vertical markets within Finance, Energy, Manufacturing, Retail, Insurance, and DoD & Civilian Government.

Three Worlds of Application / Cloud Security

Application / Cloud security goes hand in hand in our ever-changing IT environments.  With the cloud actually “being” an application, we need to look at three areas of Application Security that encompass what goes into the cloud, the cloud itself, and how to secure its communications and workloads.

This discussion will start to the extreme “far left” in the security lifecycle, all the way to the developer’s keyboards. Then we will explore the DevSecOps security process, based on the “Defense in Depth” theory of security. Then finally we will address the workloads in the cloud, with some of the public cloud’s native functionality to protect itself, and how we can use additional toolsets to enhance them.

Companies need to identify not only the tools, but when to use them, and how to automate them.

Come see Richard at RVAsec! Register now.


Wi-Fi Sponsor: AIS Network

RVAsec is pleased to announce AIS Network (AISN) as the official Wi-Fi sponsor of RVAsec 10!

AISN operationalizes your IT strategy. Solving complex IT challenges and managing digital risk to help clients thrive in an unpredictable world has been our core business for nearly 29 years. As the trusted and reliable partner of Forbes- and Fortune-ranked global corporations, government agencies, the Commonwealth of Virginia and other large enterprises, we drive exceptional value through our deep knowledge of data protection, compliance, governance and internal auditing procedures and controls.

Our unmatched customer experience is rooted in decades of expertise engaging with clients to deliver these solutions in addition to multi-cloud managed services for the world’s leading platforms, data visualization and analytics, high security hosting and consultative reviews.

https://aisn.net/

Twitter @AIS_Network


Speaker Feature: John Behen

John Behen is the Vulnerability Management Lead for Newport News Shipbuilding, in Newport News, VA. He has been an IT professional for 25 years at a diverse range of companies including Newport News Shipbuilding, The Martin Agency and Procter & Gamble. Outside of Information Security, John enjoys spending time with his family and competitive offshore yacht racing.

5.4 Million Vulnerabilities and Counting…

More and more, Vulnerability Management is becoming a central function in an organization’s defensive posture. Along with that realization, companies are discovering that there is no central framework for implementing a Vulnerability Management program. Facing millions of vulnerabilities, we implemented a prototype vulnerability management framework that can be applied to any organization, regardless of size. This presentation will take attendees through the six core Vulnerability Management domains, with tips on how this framework can be applied to other organizations.

Come see John at RVAsec! Register now.


Speaker Dinner Sponsor: Armis

RVAsec is pleased to announce Armis as the official Wi-Fi sponsor of RVAsec 10!

Armis

Know your devices better than ever before. Powered by the world’s largest device knowledgebase, you’ll get granular, industry-specific device details and behavioral insights in real-time to trigger faster, more effective detection and response.

https://www.armis.com/

Twitter @ArmisSecurity


RVAsec 10 After Party — Live Band: Monkey Fist — Register Now!

The RVAsec 10 after party, brought to you by Risk Based Security and GuidePoint Security, will be at in the main Omni Ballroom on Thursday, November 4th, right after the conference ends!

  • 5:30pm to 7pm: Food/Beverage
  • 7pm to 10pm: Monkey Fist  plays

Monkey Fist has been amazing audiences in the Central Virginia area since 2006 with a high-energy rock show that promises stellar musicianship and vocals, and a wide range of musical selections: from 80’s anthems to today’s new rock and everything in between.

This is an exclusive event, so you must be registered to attend or you will not be allowed entrance–no exceptions!

Important Notes:

  • You must use the same email you used to register to RVAsec.
  • Each attendee must have their own name listed (duplicates will be deleted).
  • If you are not registered for RVAsec,  your ticket will be deleted.

Even if you have a ticket for RVAsec and said that you wanted to attend during the signup process, you MUST now registered for the party!

Register For The After Party Now!

If you haven’t bought a ticket for the RVAsec conference yet, now is the time…. click this link, you know you want to!

Or if you know better, don’t click that link, copy and paste this (https://www.eventbrite.com/e/rvasec-2021-security-conference-tickets-86646133919) in and purchase that ticket!