Def Con 919 Presents – (ICS) Industrial Control Systems
ICS – Securing IT/OT Convergence with DefiantOS
Sunday, May 17, 2020, 4:00 PM14 Ethical Hackers Attending
Sunday, May 17, 4-6 PM EST
IT/OT Convergence is the practice of an organization standing up analytics and optimization capabilities fueled by real industrial process data.
Currently most of this convergence is performed is sub-par, and presents large security holes to the organization.
– What Industrial Control Systems are why they matter
– What goes into IT/OT Convergence
– What is result of insecure convergence
– What are the ways convergence is being secured
– How to leverage Free & Open Source DefiantOS as transport layer defense solution for convergence
Where: Zoom meeting will be posted in the Slack the day of the event in the #dc919 channel.
Def Con 919 Presents – March Meeting – Digital Forensics Incident Response Against the Dark Arts
790 Ethical Hackers
ALL levels of experience, skill, and interest are welcome and encouraged to join us. You do not have to be a “hacker” to attend.
Ever wondered what it is like being a security analyst? Here is your chance. DC919 will be hosting an exciting 4-hour class taught by @Mr_Forensics and @S3curityN. This class will arm students with the knowledge needed to identify malicious threats and characterize their behavior.
This class is open to anyone that would like to participate or observe. If planning to participate in the hands-on learning objectives, please ensure to follow the preparation instructions below. Phishing and malicious spam attacks continue to pose a significant risk in today’s cyber threat landscape. Using forensic and malware analysis fundamentals, this class is designed to teach students how to analyze malicious downloaders, phishing emails & malicious spam.
For returning students, we will have updated content and malware samples; to include a new capstone.
Upon successful class completion, students will be able to:
– Build analysis skills that leverage complex scenarios and improve comprehension.
– Demonstrate an understanding of forensic fundamentals used to analyze an email.
– Use open-source information to collect and analyze threat actor data; identify indicators of compromise, and demonstrate how to pivot on that information.
– Demonstrate how to analyze a malicious downloader; to include but not limited to debugging and deobfuscation.
– Participate in a hand to keyboard combat capstone. Students will be given a malicious sample and demonstrate how to analyze.
Student Download Link: bit.ly/DC919
1. Students will be required to download two virtual machines. In regards to the downloaded virtual machines, these should be imported into your virtual machine software and ready before the start of class.
2. If any additional technical support is needed, the instructors will make themselves available online; via email to email@example.com.
Sunday, March 8, 1:45 PM
• 2 PM Forensic Introduction
• 6 PM Open Discussion at Raleigh Times Bar