Changes

From Security Weekly Wiki
Jump to navigationJump to search
91 bytes added ,  16:54, 11 December 2018
no edit summary
''Recorded September 6, 2018 at G-Unit Studios in Rhode Island!''
<!-- ==Episode Audio==<div align="center">
{{#widget:SoundCloud
|id=366788456496965687
|width=75%
|height=100
|visual=false
}}
</div> -->
=== Hosts ===
= Interview: Wim Remes, Wire Security bvba - 6:00-6:45PM =
[[File:Wim Remes.png|right|250px|thumb|<center>'''[https://www.twitter.com/wimremes Wim Remes]'''<br> is the CEO and Founder of [https://www.linkedin.com/in/wimremes/ Wire Security bvba].</center>]] Wim is the founder of and principal consultant at Wire Security, based in Belgium. He leverages 15+ years of security leadership experience to advise clients on reducing their risk posture by solving complex security problems and by building resiliency into their organizations.<br><br>Topic: Pentesting?SDLC?The state of security?Life of a (virtual) CISO? certifications? … you throw the ball and I’ll hit it.<center>{{#ev:youtube|Gq-PMmBTfxw}}</center>
<br>
= Beacon Analysis Tech Segment: Chris Brenton, Active Countermeasures - 6:50PM-7:25PM=
* '''Powerpoint Slides from Tech Segment - [[File:psw.pdf|Powerpoint Slides from Tech Segment]] (To Open: Click File and then click the Adobe logo]]'''
<br><br>
[[File:ChrisBrenton.png|right|220px|thumb|<center>'''[https://twitter.com/chris_brenton Chris Brenton]'''<br> is the Chief Operating Officer [https://www.activecountermeasures.com/ Active Countermeasures].</center>]] Hello, my name is Chris Brenton. I have been a leader in IT and security for over 20 years. I’ve written multiple books on networking and security including “Mastering Cisco Routers” and “Mastering Network Security”. I’ve been involved with a number of key security projects such as a founding member of the Honeynet Project (https://www.honeynet.org/), and an active contributor to the PCI special interest group responsible for the standards for credit card processing in public cloud environments (https://www.pcisecuritystandards.org/pdfs/pr_130205_Cloud_SIG.pdf). I’ve also developed security training, including complete courses for SANS where I served as a Fellow Instructor (https://www.sans.edu/bios/chris-brenton), and for the Cloud Security Alliance where I authored and presented all of their online training material (https://cloudsecurityalliance.org/education/white-papers-and-educational-material/courseware/). I currently run the day to day operations at Active Countermeasures (https://www.activecountermeasures.com/), where we provide inexpensive tools that that simplify the process of threat hunting your network.<br><br>Topic:<br><br>Beacon analysis is an integral part of threat hunting. If you are not looking for beacons you take the chance of missing compromised IoT devices or anything that does not have a threat mitigation agent installed. I'll talk about what makes beacon hunting so hard, and how the open source tool RITA can simplify the process.<br><br>The blog post I mentioned that talks about clearly defining what's part of a threat hunt: https://www.activecountermeasures.com/tightly-defining-cyber-threat-hunting/<br>Info on RITA, the tool I discussed, as well as a link to download it: https://www.activecountermeasures.com/rita/ <center>{{#ev:youtube|hWm7-FUraWg}}</center>
<br>
= Security News - 7:30-8:00PM =
<!-- <center>{{#ev:youtube|iPHM80z9D9k2F_-HPWRkVo}}</center> -->
==Paul's Stories==

Navigation menu