COVID-19 has pushed most of our workforce to work from home. This has sped up cloud initiative in many organizations. This speedy deployment of work from home infrastructure, particularly cloud, did not go through much planning. The untouched security considerations to support these rapid deployments has led to an increase in risk to organizations. This …
In this session, we will explain how to build a web application hacking comprehensive lab in less than 10 minutes. We will go over some of the initial basic settings and Docker containers with intentionally vulnerable applications; and we will end the session with several complex topics and scenarios. From a fellow veteran, this training/breakout …
William C. Klusovsky covers the basics of risk versus security, discusses numerous frameworks, assessments, and the processes around attaining and maintaining compliance.
In this second offering in the ’50 Shades of …’ series, we explore at the fundamental levels, shellcode and the necessities for encoding shellcode, as well as some techniques and examples.
Android is a popular operating system around the world. Yet, its vulnerability in the Android Debug Bridge (ADB) tool allows attackers to remotely gain root access on android devices, like phones, smart TVs, and multimedia devices in cars. Further damages can be done, such as leaking users’ information and interacting with the Android system. This …
Thanks for coming! Our Board Chair and various members of the Board will talk about the future plans for VetSec and how they will continue to accomplish the mission of helping veterans.
Take a break and catch more after lunch!
Let’s get Day 2 of VetSecCon started! The Board will highlight Learning Tracks and get the party started!
Quick talk by the Board to wrap up the day, and highlight events for the next day!
Lesley Carhart, a Principal Industrial Incident Responder at Dragos, will give a talk on the basics of building an ICS Security Monitoring and Incident Response program!