Event Details:
When: February 6 & 7, 2015
Where: Dynetics, Inc
Address: 1004 Explorer Blvd, Huntsville, AL 35805
Volunteers:
Paul Coggin: @PaulCoggin
Charline Nixon: @CharlineNixon
Russ Ward:
Dan Nagle: @NagleCode - Web Master
Don Jarmon: @drjarmon
Kevin Miller: @kevinnetguy
Dawn Dunkerly:
Jeremy Conway: @cj3r3my
SCHEDULE:
FRIDAY, February 6TH – TRAINING – TBA
SATURDAY, February 7TH – TALKS – TBA
Training:
Title: Intro to Threat Intelligence
Instructor: Robert M. Lee (Twitter: @RobertMLee)
Description: Threat Intelligence has become a sort of buzz term - but what exactly is it? How do you take advantage of it? And what does it really mean to do Intelligence analysis in the digital domain? This class will answer these questions and more as students learn analysis skills and gain an understanding of Intelligence tradecraft that can be made applicable to any type of work - especially network security. The training is more analysis based than technical making it understandable by those with varying backgrounds. In the course students will be exposed to various case-studies to break apart intrusion analysis and threat intelligence reports and learn how such reports are made. Lastly, students will be given an opportunity to perform Open Source Intelligence (OSINT) to practice the skills hands-on.
Requirements: A laptop is required to participate in the hands-on lab but is not required to attend the course. The laptop should have at least 4Gb of RAM and have VMware Workstation, VMware Player, or VMware Fusion installed.
Title: CybatiWorks "Mission: Control Systems"
Instructor: Matt Luallen (Twitter: @CYBATTI)
Description: Control systems envelop our modern world (Industrial Control) and are rapidly expanding (Internet of Things/Everything/Lawnmowers/Plants). As we embark on this next generation of interconnectedness how do we make sure that attacks against spreadsheets, powerpoints and databases does not expand to cycling your home's or businesses' Internet-connected HVAC. This session will give participants a rapid-fire introduction in to control systems, where they are, how they communicate, the attack surface and mitigating control opportunities. The day will end with an active offense / defense exercise.
Requirements: Participants will operate in groups of 2 - all equipment will be provided (laptops and industrial devices).
Registration for training 2/6/15 and conference 2/7/15 : https://www.eventjoy.com/e/bsides-huntsville-550505
The 2/6/15 training course ticket cost is $25 and does not include lunch.
The 2/7/15 conference ticket cost is $10 and includes lunch.
CALL FOR PAPERS IS NOW OPEN UNTIL December 1, 2014!
PLEASE SEND ALL SUBMISSIONS TO bsideshuntsville<at>yahoo<dot>com
Topics of Interest:
Vulnerabilities
ICS\SCADA
Telecommunications
Threat Intelligence
Incident Handling \ Incident Response
Digital Forensics
Network Infrastructure
Critical Infrastructure
Exploits
Reverse Engineering
Tool Development
Secure Coding
Application Security
Database Security
Wireless
New Technologies
Cryptography
Python, Ruby etc....
Mobile Security
Malware
Monitoring and Analysis
Key Note Speaker: Robert M. Lee @RobertMLee
Sponsors
Sponsors make BSidesHuntsville possible, and we appreciate all levels of sponsorship.
Please contact us at bsideshuntsville<at>yahoo<dot>com if you are interested in sponsoring.
Questions? Email us at bsideshuntsville<at>yahoo<dot>com
Follow us on Twitter: @BSidesHSV
Comments (0)
You don't have permission to comment on this page.