BSides Huntsville 2020

Paths

BSides Huntsville 2020

Author: BSides Huntsville

BSides Huntsville is the conference for those that work (or would like to work) in the trenches of cybersecurity. This is the opportunity for you to engage in fierce discussions... Read more

What You Will Learn

  • Managerial Skills
  • Security Principles
  • Application Security
  • Career Management
  • Digital Forensics

Pre-requisites

None.

BSides Huntsville 2020

BSides Huntsville is the conference for those that work (or would like to work) in the trenches of cybersecurity. This is the opportunity for you to engage in fierce discussions about the next big ideas or the worst product you've ever seen in a friendly and informal setting.

Security 2030: The Next Decade

by BSides Huntsville

Feb 29, 2020 / 39m

39m

Start Course
Description

Infosec has seen a lot of change from the 90s, 2000s, and 2010s, so much has happened. Yet, some things remain the same (and why all of us have jobs). Now that we've crossed into 2020, what are the lessons learned and how can you apply them? Take a look forward to Security in 2030: The Next Decade with Chris Sistrunk.

Table of contents
  1. Security 2030: The Next Decade

Training the IT Security Staff on a Shoestring Budget

by BSides Huntsville

Feb 28, 2020 / 37m

37m

Start Course
Description

In this presentation, Steve Kirby will discuss various options for training IT security staff at a low cost. It will enumerate various means of establishing professional credentials and provide an overview of inexpensive training that will support those credentials.

Table of contents
  1. Training the IT Security Staff on a Shoestring Budget

How to Secure America

by BSides Huntsville

Feb 29, 2020 / 1h 11m

1h 11m

Start Course
Description

In this talk, SecurityStudio’s CEO and co-founder Evan Francen takes an honest look at fundamental cybersecurity challenges facing us at home, within our organizations, between business leaders, and throughout our country. The problems start from an overlooked lack of understanding or agreement on what “information security” is, and things get worse from there.

Table of contents
  1. How to Secure America

Reversing the Gophe Spambot: Confronting COM Code and Surmounting STL Snags

by BSides Huntsville

Feb 29, 2020 / 40m

40m

Start Course
Description

Unobfuscated malware can still be overwhelming to analyze. Even accomplished reverse engineers may feel hand-wavey about STL and COM code. Take for example Gophe, a spambot associated with Dyre campaigns and Trickbot C2, which weighs in around 2.6 MB with a 10 KB WinMain, three embedded binaries, copious STL template-generated code, and multiple flavors of atypical COM usage. COM is 27 years old, and plugins are starting to materialize to automate its analysis, but Gophe presents a strong case for understanding COM directly and applying that knowledge to decompilation instead of assembly listings. Meanwhile, C++ reversing is well-covered, but the literature is largely orthogonal to STL code. In this talk, Michael Bailey of FireEye's FLARE Team will share how to tame STL code with knowledge of a few key structures and how to investigate COM usage that doesn't conform to the norm. This will include a guided tour of a Gophe sample to focus on tactics for effective STL and COM reversing by enriching decompilation in Hex-Rays. We'll examine what Gophe is doing with Outlook.Application, Microsoft's Messaging API (MAPI), and one other COM interface that it uses to hide from view. This reverse engineering case study is all ham and no spam, so bring your appetite!

Table of contents
  1. Reversing the Gophe Spambot: Confronting COM Code and Surmounting STL Snags

Closing the Cybersecurity Talent Gap

by BSides Huntsville

Feb 29, 2020 / 1h 3m

1h 3m

Start Course
Description

Ever wonder how much your skills are worth to an employer? Are you ready to make the big bucks in the cyber security industry? The cyber threats of tomorrow demand that highly skilled workers be ready and able to solve complex problems and mitigate complex issues. The huge demand for cyber security professionals outweighs the current supply, thus it continues to favor technical professionals who are eager to learn and are enthusiastic about working in the cyber security field. Do you already have a cyber security skillset and want to know if your skillset is in demand? Are you looking to dive into the field of cyber security and need to know what skills and training are necessary to enter into this career field? What are the salary expectations for professionals in the cyber security field? Once you join the field, what skills and additional training do you need to stay on top of the pay scale? Join cyber security expert Ben McGee of CyberProtex for a discussion of these issues as he lays out the details for best preparing yourself for a career in cyber security and how to move up the career chain once there.

Table of contents
  1. Closing the Cybersecurity Talent Gap

Cyber-Ninja Space Pirates

by BSides Huntsville

Feb 29, 2020 / 38m

38m

Start Course
Description

Jacob Oakley's talk is not about the fantasy of being stranded on another planet but about the reality of cybersecurity for space systems. It won’t be an astronaut on Mars that will be commandeering your space system, it will be maliciously motivated, state sponsored hackers here on Earth. The focus of this presentation is to demonstrate how the rapid evolution of space technologies has created a potentially precarious position with regard to cybersecurity and the exploitability of small satellites and other space systems.

Table of contents
  1. Cyber-Ninja Space Pirates

Incident Response & Threat Hunting Using Bro/Zeek Data

by BSides Huntsville

Feb 29, 2020 / 34m

34m

Start Course
Description

The open source Zeek network security monitor provides valuable data for incident responders and threat hunters alike. This talk will discuss how to use that data to lower the time necessary to find attackers on your network, as well as ways that advanced users can take Zeek's scripting language to create powerful, flexible detection logic that goes beyond traditional point-in-time IDS signatures.

Table of contents
  1. Incident Response & Threat Hunting Using Bro/Zeek Data

Hacking the Human

by BSides Huntsville

Feb 29, 2020 / 50m

50m

Start Course
Description

Voluntary disclosure - Why there is no such thing as PII. People provide everything you need by just asking. Have a conversation, you just have to listen and look. Join Tracy Williams in this session to learn more.

Table of contents
  1. Hacking the Human