Tag: speakers

Speaker Feature: Dennis Rand

www.ecrimelabs.com

@DennisRandImage result for dennis rand ecrime labs

Dennis Rand is a security researcher from Denmark. He specializes in vulnerability research, network analysis, penetration testing and incident response. Dennis has over seventeen years of experience in various security roles including researcher, consultanting, and simply loves breaking stuff. In his spare time (Of what is left), he loves to observe and capture the world through photography.

So you think IoT DDoS botnets are dangerous – Bypassing ISP and Enterprise Anti-DDoS with 90’s technology

Stressers/Booter services is providing “DDoS as A Service” and they are getting more and more powerfull, measured in amount of traffic, but the current resources they use could be improved, and optimized, and perform a much more
dangerous and advanced attack patterns that can bypass large Anti-DDoS solutions through pre-analysis and data-mining with big data analysis and OSINT informaiton as source.
The research will show a framework on how attackers can optimize attacks based on a combination of big-data analysis and pre-attack analysis, that will show that terabit attacks are not necessarily needed, and why 90’s technology is prefered over IoT Worms and other fancy gadgets.

Come see Dennis at RVAsec! Register Now.


Speaker Feature: Derek Banks and Beau Bullock

www.blackhillsinfosec.com

@0xderuke

Related image

@dafthack

Derek Banks: Derek is a Senior Security Analyst at Black Hills Information Security and has over 20 years of experience in the IT industry as a systems administrator for multiple operating system platforms, and monitoring and defending those systems from potential intruders. He has worked in the aerospace, defense, banking, manufacturing, and software development industries. Derek has experience with creating custom host and network based monitoring solutions.

 

Image result for Beau bullock blackhills

Beau Bullock: Beau is a Senior Security Analyst at Black Hills Information Security where he performs penetration tests and red team assessments. He is the author of various red team/pentest tools such as MailSniper, PowerMeta, HostRecon, and DomainPasswordSpray. Beau is a host of the web shows Tradecraft Security Weekly & Hack Naked TV, and is a frequent speaker at industry events including Black Hat, DerbyCon, Wild West Hackin’ Fest, SANS, and various BSides events.

 

Red Team Apocalypse

TABLETOP SCENARIO: Your organization regularly patches, uses application whitelisting, has NextGen-NG™ firewalls/IDS’s, and has the latest Cyber-APT-Trapping-Blinky-Box™. You were just made aware that your entire customer database was found being sold on the dark web. Go.

Come see Derek and Beau at RVAsec! Register Now.


Speaker Feature: Bob Siegel

www.privacyref.com

@PrivacyRef

Image result for bob siegel privacyrefBob Siegel is the president and founder of Privacy Ref. Starting Privacy Ref in 2012, Bob took his experience as the Senior Manager of Worldwide Privacy and Compliance at Staples, Inc. and applied that to assisting companies implement and maintain strong privacy programs. Bob has worked with many different organizations, dealing with programs of all sizes and regulatory needs. Seeking to always improve his own understanding of all things privacy, Bob has earned certifications from the International Association of Privacy Professionals. These include certifications in US private sector, European, and Canadian privacy laws. Bob has also earned certifications in Information Technology privacy and privacy program management. Bob Siegel has also been recognized as a Fellow of Information Privacy by the IAPP for his outstanding dedication to the privacy community. He has also served on the IAPP’s Certification Advisory Board for the CIPM program and the IAPP’s Publication Advisory Board. Bob Siegel currently maintains his blog at Privacy Ref, but is also a writer at CISO.com. You can find his blog, Operational Privacy on CISO.com

GDPR and you

The General Data Protection Regulation is the new law of the land for protecting personal information from the EU. The law has placed many US-based businesses in scope requiring compliance. In this talk we will review some of the challenges for compliance that you may encounter.

Come see Bob at RVAsec! Register Now.


Speaker Feature: Crane Hassold

@CraneHassold / PhishLabs

Crane Hassold is the Threat IImage result for crane hassold phishlabsntelligence Manager at PhishLabs based out of Charleston, SC, where he has overseen Threat Research team since 2015. Prior to joining PhishLabs, Crane served as an Analyst at the FBI for more than 11 years, providing strategic and tactical analytical support to cyber, financial crime, and violent crime cases.  For most of his career with the FBI, Crane worked in the Behavioral Analysis Units in Quantico, Virginia, where he provided analytical and behavioral support to intelligence community and law enforcement partners against national security adversaries and serial criminals.  In 2012, Crane helped create the FBI’s Cyber Behavioral Analysis Center, which takes an asymmetric approach to examining cyber threats by combining the traditional behavioral concepts used for decades in the violent crime world with technical expertise to gain a holistic understanding of adversary TTPs.

Doxing Phishers: Analyzing Phishing Attacks from Lure to Attribution

This presentation will cover the various pieces of intelligence that can be collected from each stage of a phishing attack (lure, phishing site, phish kit) and discuss how each piece allows us to progress an investigation. We will look at various analytical techniques that can be performed to track phishing campaigns and enhance detection. The second half of the presentation will cover an in-depth, real-world case study of the practical application of these techniques, starting with a single phishing lure and ending with the identification of a primary phishing threat actor.

Come see Crane at RVAsec! Register Now.


Speaker Feature: Leigh-Anne Galloway and Timur Yunusov

www.ptsecurity.com

@L_AGallowayImage result for leigh anne galloway positive technologies

@a66at

Leigh-Anne Galloway is the Cyber Security Resilience Lead at Positive Technologies where she advises organizations on how best to secure their applications and infrastructure against modern threats. She is an expert in the Application Security Unit, specializing in ATM and POS Security and is the author of security research in account recovery processes on social media websites. She has spoken at many conferences including DevSecCon, BSides, InfoSec Europe, Hacktivity, 8dot8, Blackhat EU and Troopers.

 

 

Timur Yunusov – Senior Expert of Banking systems security and author of multiple researches in field of application security including “Apple Pay replay attacks” showed at the BlackHat USA 2017, “Bruteforce of PHPSESSID”, rated in Top Ten Web Hacking Techniques by WhiteHat Security and “XML Out-Of-Band” showed at the BlackHat EU. Professional application security researcher.
Timur has previously spoken at CanSecWest, BlackHat USA, BlackHat EU, HackInTheBox, Nullcon, NoSuchCon, Hack In Paris, ZeroNights and Positive Hack Days.

Demystifying Payments: Payment Technologies and Security Risks

Have you ever wanted to learn how payment technologies work? What happens when you pay for something on a website or using a cell phone? Payment technologies are a transparent part of our lives. They enable us pay for everything from a coffee to a car. In this talk we take a look at payment technologies past, present and future, and look at the security risks associated with them. Learn how payments have evolved and what transactions look like today.

Come see Leigh-Anne and Timur at RVAsec! Register Now.


Speaker Feature: Elissa Shevinsky

@ElissaBeth

iyiDU4eK_400x400.jpg (276×276)

Elissa Shevinsky is a serial entrepreneur. She helped launch Geekcorps (acquired), Everyday Health (IPO) and Brave ($35M ICO.) Shevinsky is currently consulting for crypto startups, and doing research on container security

 

Container Security: Vulnerabilities, Exploits and Defense

Whether it’s an unsecured Kubernetes configuration or the Meltdown/Spectre exploits, there is always a way into your company’s seemingly secure container infrastructure. We’ll take a tour of the most surprising container exploits – and how to use tools like SSL and VPNs to create a strong defense for your own environment.

Come see Elissa at RVAsec! Register Now.


RVAsec 2017 Videos: Robert Wood and Greg Pepper

Robert Wood
Maintainability + Security = <3 

 

 

Greg Pepper
Best Practices for Securing the Hybrid Cloud (Slides)


RVAsec 2017 Videos: Dan Holden and Troy Marshall

Dan Holden
Retailing Another Threat Landscape Story 

 

 

Troy Marshall
RoboCop- Bringing law and order to CICD 


Speaker Feature: Rick Lull and Shannon Yeaker

Rick Lullavatar for Rick Lull
rlull@verizon.net

Network bubba, health care IT survivor, now trying to play Horatio on the bridge via infosec for customers of my new company.

 

 

Shannon Yeakeravatar for Shannon Yeaker

Shannon Yeaker, PMP, CISA, CAHIMS is a Lead Consultant with Impact Makers in the Governance, Risk and Compliance (GRC) Practice. She is a dynamic IT professional with extensive experience in Information Security, control design, risk management, project and process management at a Fortune 200 company in the financial services industry. She is a certified Project Management Professional (PMP), a Certified Information Systems Auditor (CISA), Certified Associate in Healthcare and Information Management Systems (CAHIMS) and holds additional certifications in Business Process Management, Agile, Lean and Scrum. Shannon is a member of the Virginia Chapter of the Information Systems Audit and Control Association (ISACA).Currently serving as a Project Manager assisting a $3.5 billon healthcare system with multi-year and multi-million dollar information security transformation program. She manages the delivery of secure network segmentation to over 30,000 endpoints in 7 states.  Shannon was previously with Capital One, for more than 20 years. She has a Master’s Certificate in Project Management from George Washington University and a Bachelor of Science in Psychology from James Madison University.

Adventures in (Dynamic) Network Segmentation or And that’s how I got this scar

Network segmentation is a great way to build a foundation for a thorough approach to defense in depth as part of your security program. The benefits can be great, but the path is not without some risk of its own. This talk with review some of the challenges and successful strategies to create a solid and sustainable practice on getting your arms around what is out there and on your network. The presenters, fresh from a large scale project to do this at a health system, will cover tips, tricks, pitfalls and the like to let you approach this very useful tool with your eyes wide open.

Come see us at RVAsec!

 

 


Speaker Feature: Alon Arvatz

www.intsights.com

Alon Arvatz runs products at IntSights.  Prior to co-founding IntSights, Alon had was a cyber security professional in the military and private sector.  Alon started his career serving in an elite intelligence unit in the Israel Defense Forces.  Then, Alon joined Guy Nizan to establish Cyber School, a center providing teenagers with courses, seminars and summer camp workshops on cyber intelligence.  Hoping to help enterprises capitalize from his experience, he co-founded IntSights to make threat intelligence programs a reality for enterprises around the world. When not defending companies from hackers, Alon spends time with his very cute family.

OSINT: The Secret Weapon in Hunting Nation-State Campaigns

Discussing real use cases of state actors engaged in APT campaigns, explore what can be done with the available intelligence tools we have today, specifically from the Dark Web.

Come see me at RVAsec 2017. Register Now!