![](https://www.antisyphontraining.com/wp-content/uploads/2025/01/SMB_Response_header-300x169.webp)
Incident Case Study for SMB Response Teams
In this video, Amanda and Zach discuss the challenges and solutions for cybersecurity in small and medium-sized businesses (SMBs) and managed service providers (MSPs).
In this video, Amanda and Zach discuss the challenges and solutions for cybersecurity in small and medium-sized businesses (SMBs) and managed service providers (MSPs).
In this video, Jake Hildreth discusses finding and fixing ADCS issues using the tool Locksmith.
00:00 – Welcome! 00:06 – Zach H. – Are bug bounty programs effective? 01:09 – John S. – Bug bounty VS full product analysis – use issue tracker for 3rd party code, libraries 02:29 – Zach H. – Bug bounties VS full-time analyst. Community-based. 03:15 …
đź”— Register for webcasts, summits, and workshops – https://poweredbybhis.com Join us for a free one-hour training session with Antisyphon instructor Tim Medin, from Red Siege, on the offensive tools that defenders should running, to identify high-impact security issues on their network. Tim will teach you …
đź”— Register for webcasts, summits, and workshops -https://poweredbybhis.com The numbers are in, and the consensus is that “9 out of 10” breaches start with phishing! Business email compromise (BEC) is the “threat vector of choice,” and you are being targeted! Join us for a free …
00:00 – Welcome! 00:36 – Intro – Infosec is often completely separated from development 00:56 – Speaker Bio 03:34 – Agenda 04:32 – Current state – Infosec and developers don’t mix 05:36 – No bidirectional communication or synergy 06:10 – Pen test findings not addressed …
00:00 – Welcome! 00:19 – Zach Hill – What does Secure Code mean to you? 01:19 – Tim Fowler – Doing it right vs business objectives 03:28 – John Strand – Legacy code problem – continuous process 05:31 – John Strand – Coding language implications …
00:00 – Welcome! 00:12 – Mental model of a container 02:04 – Docker and networking 02:44 – DEMO: Networking 04:23 – Port mapping misconfiguration in Docker Compose files 05:35 – DEMO: Port mapping misconfiguration 06:13 – DEMO: Docker containers sharing same network 06:34 – Every …
00:00 – Welcome! 01:24 – What will the AI / Human work force look like? 03:13 – Software devs will be replaced with software devs that know how to leverage AI 03:38 – Afraid that AI will take your job? (poll) Use Chat GPT to …
00:00 – Welcome! 00:58 – Jordan’s Bio 01:30 – Why you should care about secure code 02:34 – Insecure code examples, detection methods 05:09 – Secure Code Definition 05:58 – Case studies (composite) 07:21 – Case Study 1: Poor user input sanitization 10:33 – Case …