TI17 760x200 v2


Tuesday, November 28 9:00 AM – 5:00 PM 8 CPEs

W1 Data Breaches Will Happen... How You Recover Defines Your Company
Antonio A. Rucci, Director, Information Security & Threat Intelligence, Information International Associates, Inc.

You've heard it many times before and you'll continue to hear, “it’s not a matter of if, but when” …Whether directly or indirectly, you will at some point experience a data breach. Your measure for success will be built around your ability and speed to respond, recover, and restore operations, minimizing impact to your customers, employees, intellectual property, industry reputation, and ultimately your ROI.

During this full-day workshop, the instructor will share some insight, proactive administrative, technical, and security operations to consider as you build out your disaster recover planning strategies. Wait, What? You’re NOT building a D/R Strategy? I know, it’s usually an afterthought, but it’s much easier than you might think.

We’ll also walk through some straight-forward issues to consider to help better prepare your organization for that late Friday afternoon when things begin going sideways. Ransomware, for instance, can take a toll on organizations when they are ill-prepared. Pro-Active Threat Intelligence and Predictive Analytics can be a tremendous asset when you can tailor and tune your traffic. Likewise, you need to invest a little time and effort to ensure you are able to recover from and reconstitute your data in the unfortunate event there is catastrophic failure.

Attend this workshop and walk away with a wealth of resources and building blocks to give you and your company a leg up!

W2 The Art and Science of Human Hacking
Ron Woerner, Director of Cybersecurity Studies, Bellevue University

Humans are the underlying cause of many security breaches. Everyone in security needs to understand human weaknesses and the best ways to protect and defend against human threats and vulnerabilities. This workshop teaches the techniques used by both white and black hat hackers to access information and systems through the human element. The objective isn’t to make attendees paranoid, but aware of their surroundings, how to test their organization for human vulnerabilities, and how to detect and defend against malicious human hacking attempts.

Additionally, participants will learn the importance of human factors, psychology, and leadership for security professionals. This day-long event will educate attendees on human motivation and interaction, how security controls may be bypassed by a person’s intentional or unintentional acts, and methods for reducing the cyber risks associated with people. We will also cover social engineering tools and techniques and how the laws of influence can be used to breach security controls. The influence techniques discussed here are taken from books such as, “Influence, The Art of Persuasion,” “How to Win Friends and Influence People,” and “Social Engineering, The Art of Human Hacking.”
This isn’t a passive event; attend to participate in interactive, hands-on exercises and become intimately familiar with social engineering techniques.

This hands-on workshop will cover:

• How everyone is the problem and the solution to human hacking
• Methods for preying on qualities of human nature
• Reconnaissance, elicitation, and observation techniques for information gathering
• Psychological principles of social engineering
• Neuro-linguistic programing, microexpressions, and non-verbal communications
• Six power of persuasion techniques
• Using human hacking with security leadership
• Conquering bias in risk decisions
• Social engineering tools
• Human hacking prevention and mitigation

Key Learning Objectives:

Participants should come to this class with a high level of curiosity. An understanding of IT infrastructure and information security experience will be helpful for some of the more advanced technical concepts. After the class, participants will feel well-grounded in the ways attacks against the human element of cybersecurity occur and ways to reduce those risks.


Friday, December 1 9:00 AM – 5:00 PM 8 CPEs

W3 Blended Threat Assessments: Strategies for Maximizing Value from Red Team Security Testing
Michael Podszywalow, Security + Founder and Security Consultant, SpyByte, LLC

This workshop will examine cyber techniques, low-tech gadgets, social engineering, and various other measures used to penetrate organizations across multiple attack vectors by applying a blended threat approach (Red Team) to security testing. Red Teaming tests people, internal processes, applications, information security, and physical defenses against an attack targeting tangible and intangible assets.

We will explore devastatingly successful methods of information-gathering, and best practices and countermeasures. Gain insight into the use of both technical and non-technical tools used to penetrate security defenses. Revisit the dangers of lax operational, technical, and physical security, and discuss how to protect your intellectual property and other sensitive information. Learn best practices for conducting holistic threat assessments to protect your workplace. We will review the most common findings from Red Team engagements and discuss recommendations to improve security posture. We will examine the tendencies of professional attackers to better understand our corporate vulnerabilities as we strive to protect sensitive information.

Attendees will earn how information thieves capitalize on weak security practices to penetrate organizations. The workshop will emphasize a holistic approach to security that protects regulated information (PHI, PII, etc.) as well as organizational intellectual property.

Topics Covered:

  • Blended Threat Assessments (Red Team Security Testing)
    • Overview of Blended Threat Assessments.
    • How blended threat assessments differ from standard pen tests and other threat assessments.
    • Review of techniques and internet resources used for information gathering / reconnaissance.
    • Live demonstration of various tools utilized to glean information.
    • Review of methodologies used in Red Team engagements.
    • Guidelines for how to structure RFP’s for assessments: NDA’s, contractual provisions, designing test teams, covert vs. overt, rules of engagement, going beyond the “network pen test.”
  • Attacker Profiles and Targets
    • Who targets IP and why?
    • Understand an attacker’s mindset, and how professionals target, investigate, and approach a company for IP.
    • Motivations and advantages for an attacker to pursue IP over other types of information.
  • Common Engagement Findings & Recommendations
    • Review of common findings and outcomes from Spybyte’s Red Team engagements.
    • Security program considerations that go beyond compliance to protect intellectual assets.
  • Insights into technical, operational, and physical security recommendations
    • Personnel Intellectual Security
    • Cultural implications and consequences of information security, and ways they are exploited to target people to obtain sensitive information.
    • How to creatively tap people assets to leverage an information security program and help employees recognize a potential threat. Recommendations for security training and awareness programs to build up resiliency.



InfoArmor 200x110



DomainTools 200x110

Logo ThreatConnect Partner Reversing Labs 300x200



ISC2 Austin 200x110