Active Directory Certificate Services is widely deployed in many corporate & enterprise environments. It is also heavily misconfigured in many of them. If you want to learn how to get easy wins on penetration tests, this is right up your alley. For defenders, this is a great way to learn about privilege escalation vectors in your environment.
Too often, we see people in our industry who love spending all their time, at work and after hours, on computers. That is not necessarily a bad thing; however, that lifestyle is not for everyone. Many people need to recharge by spending time in nature or with friends, but will that hurt their careers? It often leads to a case of imposter syndrome - feeling like they do not belong because their job is not their life or their only passion. Having outside interests does not make a person any less technically savvy. Diversity in interests and experiences is what makes many teams so successful. The question becomes how to use seemingly unrelated interests to help further career development. The key is to find opportunities to shine. In this flash talk, I will share how some of my interests, like football and crocheting, have led to new opportunities and how bringing my authentic self to work has helped me fight off imposter syndrome.
It is easy to send emails to users, but very difficult to institute cyber awareness. At the end of the day, we must ask ourselves: Do our users care? Are they likely to notify us when cyber threats occur, to ignore them, or to “take the bait” and become another victim? Your organization may be at any level of cyber maturity, but every company’s security program needs to devote resources to building its culture through boredom-free security awareness training.
During this presentation, Jeff will share his experiences, frustrations, and insights, followed by an open discussion. He will cover:
Security data platforms have been around for many years, and have always been one of a Blue Team’s most critical tools. We’ve come a long way from the early days of syslog servers and grep however! In this session we will discuss how to build a modern platform in the cloud, automating ingestion, filtering, and routing to detection-as-code tooling.
For the last few years there has been a large movement to move EVERYTHING in cybersecurity left. And it’s extremely important for an organization to be more automated and utilize tools that enable better use of Human Resources. However, most of the shift left has been focused on operation or development components of IT and cybersecurity. As important as those are, it’s time to shift compliance left as well and create a near real-time view of how organizations are meeting their security controls in an effort to have a better cybersecurity and compliance posture.