22 Categories
[APT] [Attacks] [Blockchain] [Breaches] [Business Continuity] [Certifications] [Critical Infrastructure] [CyberAttacks] [EDR] [Elasticsearch] [FBI Cyber Task Force] [Firewalls] [Incident Response] [Logging] [Meeting Recap] [Meetings] [NAC] [News] [Risk Management] [SIEM] [Uncategorized] [Website]
APT
- APT Who/What/How + Data Sciences and Cybersecurity -
- Crowdstrike presents on the current e-crime landscape and procedures used by APT actors -
- FBI Cyber update & Advanced Persistent Threats (APT) -
- Detecting APT with NAC, Sandboxing & SIEM-Part I + Zeek/Bro Log Collection -
Attacks
- Crowdstrike presents on the current e-crime landscape and procedures used by APT actors -
- Detecting APT with NAC, Sandboxing & SIEM-Part I + Zeek/Bro Log Collection -
- July 2018 Attack Statistics -
Blockchain
Breaches
- Crowdstrike presents on the current e-crime landscape and procedures used by APT actors -
- July 2018 Attack Statistics -
Business Continuity
Certifications
Critical Infrastructure
- In-House Risk-Based Security Controls Assessment (SCA) Process and Blockchain Security -
- Cyber and Physical Security Working Together by SRP -
CyberAttacks
- Crowdstrike presents on the current e-crime landscape and procedures used by APT actors -
- July 2018 Attack Statistics -
EDR
Elasticsearch
- Building Elegant Security Dashboards for your NOC or SOC & CISSP Domain 1 Security & Risk Management -
FBI Cyber Task Force
- FBI Cyber Task Force Update + Implementing Security Compliance Through DevOps Automation / Splunk My Logs Please! -
- FBI Cyber update & Advanced Persistent Threats (APT) -
- FBI Cyber Task Force Update and Lethal Software Bugs -
Firewalls
- Detecting APT with NAC, Sandboxing & SIEM-Part I + Zeek/Bro Log Collection -
- Building Elegant Security Dashboards for your NOC or SOC & CISSP Domain 1 Security & Risk Management -
- Presentations on Intel AMT and NGFW Next Generation Firewalls -
- Review of Modern Firewalls and the Security implications of Intel's Active Management Technology (AMT) -
Incident Response
- Complexities of Incident Response + Real Time Defender Velocity -
- Deep Dive into the CISM Certification + Anatomy of an Incident Response -
Logging
- Building Elegant Security Dashboards for your NOC or SOC & CISSP Domain 1 Security & Risk Management -
Meeting Recap
- Meeting Recap: January 23rd, 2023 -
- Meeting Recap: November 7th, 2022 -
- Meeting Recap: October 3rd, 2022 -
- Meeting Recap: July 11th, 2022 -
- Meeting Recap: June 6th, 2022 -
Meetings
- Pegasus and Privacy -
- You Can Be Correct Sir -
- Sabotaging Ourselves -
- Clippy the Maximizer -
- Elegy for Blockchain -
- SWCSF Changes, Updates and Industry Predictions -
- Disaster Recovery for Individuals and Year End Discussion -
- Can you hack it? and Channelling Privacy -
- The Right Stuff, DALL-E, Pardon? and Unknown Knowns in Cybersecurity -
- Shodan and Incident Response -
- AI Caramba: The Rise of A.I. -
- People vs. Tech, and Surveillance in the Metaverse -
- In-House Risk-Based Security Controls Assessment (SCA) Process and Blockchain Security -
- Cyber and Physical Security Working Together by SRP -
- FBI Cyber Task Force Update and Lethal Software Bugs -
- Building Elegant Security Dashboards for your NOC or SOC & CISSP Domain 1 Security & Risk Management -
- Presentations on Intel AMT and NGFW Next Generation Firewalls -
- Review of Modern Firewalls and the Security implications of Intel's Active Management Technology (AMT) -
- Southwest CyberSec Forum Sponsored by Phreedom Technologies -
- Meeting 2019-Feb -
- Meeting Recap 2019-Jan -
- Meeting 2019-Jan -
- Meeting 2018-Nov -
- Meeting 2018-Oct -
- Meeting 2018-Aug -
- Meeting 2018-Jun -
- Meeting 2018-May -
NAC
- FBI Cyber update & Advanced Persistent Threats (APT) -
- Detecting APT with NAC, Sandboxing & SIEM-Part I + Zeek/Bro Log Collection -
News
Risk Management
- In-House Risk-Based Security Controls Assessment (SCA) Process and Blockchain Security -
- Cyber and Physical Security Working Together by SRP -
- Building Elegant Security Dashboards for your NOC or SOC & CISSP Domain 1 Security & Risk Management -
SIEM
- FBI Cyber update & Advanced Persistent Threats (APT) -
- Detecting APT with NAC, Sandboxing & SIEM-Part I + Zeek/Bro Log Collection -
Uncategorized
- Threat Hunting and Vendor Cyber Contracts -
- FBI Cyber Task Force Update + Implementing Security Compliance Through DevOps Automation / Splunk My Logs Please! -
- Cyberwarfare vs Conventional and how AI is empowering our adversaries -
- ISO 27001 Information Security Management and Hacking Hired -
- Meeting 2019-Jan -