Tag: speaker

Speaker feature: Chandos Carrow

@ChandosJCarrow

Chandos Carrow is a Co-Information Security Officer for the Virginia Department of Health. He has worked for the Commonwealth of Virginia for more than 10 years and has been with the VDH for almost 2 years. Chandos has worked in several state agencies in his career including healthcare and higher education. He obtained his Master of Science in Information Systems from VCU and his CISSP from (ISC) 2. He is a member of several information security user groups including the (ISC) 2 Richmond Metro Chapter, Virginia Cyber Security Partnership, and Commonwealth of Virginia Information Security Council’s Conference and Knowledge Sharing Committees. Chandos enjoys giving back the knowledge he has obtained over his career and is currently an adjunct IT professor at Bryant & Stratton College in Richmond.

Security Mind Expansion

Information security is always changing and to keep up with these changes we need to somehow upgrade the professionals to keep up. In order to do this we need to expand the brain of the information security professionals. In this presentation we will cover several modern day philosophy concepts and how to incorporate these concepts into your everyday practice. These concepts include: ontological design, looking-glass self, feedback loops, flow state, cognitive play. Applying these concepts will hopefully expand your mind and improve how information security is conducted.

Come see Chandos at RVAsec! Register now.


Speaker Feature: Michael Marriott

www.digitalshadows.com/blog-and-research

@digitalshadows

Michael Marriott is a Senior Strategy and Research Analyst at Digital Shadows, which he joined in late 2014. Michael has a passion for security analysis and the trends they indicate, in order to better protect clients. He has written several articles and papers, and his research is regularly features in the press. He holds a BA in History and a Masters in Applied Security and Strategy, both from the University of Exeter.

Seize and Desist? Criminal Evolution One Year After AlphaBay’s Demise

As we’re approaching the one year anniversary of AlphaBay’s seizure, the talk will demonstrate the impact this has had on the criminal ecosystem. This includes new, alternative mechanisms and technologies for discussing and trading criminal goods and services. The talk will also outline the drivers that will determine the future of the criminal ecosystem and outline what this means for all organizations.

Come and see Michael at RVAsec! Register Now.


RVAsec 2017 Videos: Alon Arvatz and Jason Ross

Alon Arvatz
OSINT: The Secret Weapon in Hunting Nation-State Campaigns (Slides)

 

 

Jason Ross
DevOpSec – Killing the Buzz (Slides)


RVAsec 2017 Videos: Barry Kouns and Seth Hanford

Barry Kouns
Can Game Theory Save Us from Cyber Armageddon? (Slides)

 

 

Seth Hanford
Defend the Defenders: Managing and Participating in Excellent Teams (Slides)


RVAsec 2017 Videos: Jay Wonn and Robert Mitchell

Jay Wonn
TIP of the Spear: A Threat Intelligence Platform Acquisition (Slides)

 

Robert Mitchell
Recent Developments in Linkography Based Cyber Security (Slides)


RVAsec 2017 Videos: Daniel Bohannon and Ken Johnson

Daniel Bohannon
Invoke-CradleCrafter: Moar PowerShell obFUsk8tion & Detection (@(‘Tech’,’niques’) -Join ”) (Slides)

 

 

Ken Johnson
AWS Survival Guide 2.0 (Slides)


RVAsec 2017 Videos: Roman Bohuk/Jake Smith and Jeremy Dorrough

Roman Bohuk & Jake Smith
Think of the Children: Preparing the Next Generation of Security Specialists (Slides)

 

 

Jeremy Dorrough
Zero Trust “Lite” Architecture to Securely Future-Proof Your Network (Slides)


RVAsec 2017 Videos: Rick Lull/Shannon Yeaker and Mike Shema

Rick Lull & Shannon Yeaker
Adventures in (Dynamic) Network Segmentation or And That’s How I Got This Scar (Slides)

 

 

Mike Shema
Managing Crowdsourced Security Testing (Slides)


RVAsec 2017 Videos: Grayson Walters and Derek Banks/Troy Wojewoda

Grayson Walters
Building A Pentest Program On A Shoestring Budget (Slides)

 

 

Derek Banks and Troy Wojewoda
Poor Man’s Spy vs. Spy – Analysis of Red Team Attack Techniques by Blue Team Forensicators (Slides)