/// π Register for webcasts, summits, and workshops – https://poweredbybhis.com π Webcast Slides – https://www.antisyphontraining.com/wp-content/uploads/2024/05/2024_05_01_anticast_Security-Split-Divorcing-Your-Stack_Alissa-Torres.pdf So your security team is convinced it needs to graduate to the newest “best” enterprise security tool, I get it. But for most, this type of architecture shift requires careful …
/// π Register for webcasts, summits, and workshops – https://blackhillsinfosec.zoom.us/ze/hub/stadium π Webcast Slides – https://www.antisyphontraining.com/wp-content/uploads/2024/04/2024_04_24_anticast_Learning-from-Macedonia_How-InfoSec-Fails-Spawn-from-Sales-Marketing.pdf Learning from Macedonia: How InfoSec Fails Spawn from Sales & Marketing Join us for a free one-hour Antisyphon Anti-cast, with Kevin Johnson. Learn how exaggeration undermines trust and efficiency. Using …
/// π Register for webcasts, summits, and workshops – https://poweredbybhis.com π Webcast Slides – https://www.antisyphontraining.com/wp-content/uploads/2024/04/2024_04_24_anticast_Operationalizing-Threat-Intelligence_Derek-Troy.pdf Got a threat intel feed and scared to use it? No context on atomic indicators from your threat intel feed in your SIEM got you down? Not sure what threat …
/// π Register for webcasts, summits, and workshops – https://blackhillsinfosec.zoom.us/ze/hub/stadium π Webcast Slides β https://www.antisyphontraining.com/wp-content/uploads/2024/04/2024_04_17_anticast_Hands-on-with-the-NIST-Cybersecurity-Framework-2-0_Nathan-Sweaney.pdf How do you measure cybersecurity maturity? Are you improving or falling behind? What should you prioritize next? In this free one-hour Antisyphon Anti-cast with instructor, Nathan Sweaney, he’ll explore the …
/// π Register for future webcasts, summits, and workshops – https://blackhillsinfosec.zoom.us/ze/hub/stadium π π Webcast Slides βΒ https://www.antisyphontraining.com/wp-content/uploads/2024/04/2024_04_10_anticast_Secure-Ideas-Foundational-Application-Security-Training_Bill-McCauley.pdf Join us for a free one-hour Antisyphon Anti-cast with Bill McCauley, as he dives into the realm of application security from Secure Ideas’ foundational training class. He’ll also …
/// π Register for future webcasts, summits, and workshops here – https://blackhillsinfosec.zoom.us/ze/hub/stadium π Webcast Slides – https://www.antisyphontraining.com/wp-content/uploads/2024/04/2024_04_03_anticast_AWS-Cloud_DevSecOps-Essentials_Andrew-Krug.pdf AWS Cloud: DevSecOps Essentials w/ Andrew Krug We hear more and more about how to incorporate security into every phase of the software development lifecycle, but: Where do …
/// π Register for future webcasts, summits, and workshops here – https://blackhillsinfosec.zoom.us/ze/hub/stadium Greetings from the Red Team! ππ – Slides for this webcast β https://www.antisyphontraining.com/wp-content/uploads/2024/03/2024_03_13_Offensive-Con-2024_Michael-Allen.pdf “”Attack where your opponent is weakest. Be in the place your opponent cannot see. Do what your opponent does not …
/// π Register for future webcasts, summits, and workshops here – https://blackhillsinfosec.zoom.us/ze/hub/stadium In Cloud We Trust: Common M365 Attack Techniques to Bypass Defenses Ready to learn common attacks to bypass defenses in Microsoft 365? This session will explore techniques used by red teamers to achieve …
/// π Register for future webcasts, summits, and workshops here – https://blackhillsinfosec.zoom.us/ze/hub/stadium π Webcast Slides βΒ https://www.antisyphontraining.com/wp-content/uploads/2024/03/2024_03_27_anticast_Re-encoding-Python-Shellcode-Execution_Joff-Thyer.pdf Imagine, if you will, youβre a pen tester, and youβve gained access to a Windows application server. Your discovery includes a deployed application allow listing, and a strong …
/// π Register for future webcasts, summits, and workshops here – https://blackhillsinfosec.zoom.us/ze/hub/stadium Wireless for Red Teams ππ – Slides for this webcast β https://www.antisyphontraining.com/wp-content/uploads/2024/03/2024_03_13_Offensive-Con-2024_Alex-Sanders-.pdf Explore key tactics for red teams across various wireless protocols, including Wi-Fi, Bluetooth, RFID, and more, in this focused talk. Delve …