fbpx
Share on:

DEFCON 31

DEF CON is the world’s largest annual hacker conference, and it’s a great place to learn about the latest security threats and how to protect your organization. This year’s conference is being held in Las Vegas from August 10th-13th, and there are a number of talks that would be of interest to SMB security practitioners. I have been attending DEFCON now for around 10 years, with this being the 7th year officially as a staff member (goon) on the production photo team, and regular panel member for the late night game show “Who’s Slide”.

How to Secure Your SMB

One talk that I’m definitely planning on attending is “How to Secure Your SMB” by John Strand. This talk will cover the top security threats facing SMBs and how to mitigate them. John Strand is a well-known security expert with over 20 years of experience. He is the founder of BlackHills Information Security, and Antisyphon Infosec Training, and he is the author of several books on security, including “The Art of Security” and “The Security Risk Assessment Handbook.”

I believe that this talk would be very helpful for SMB security professionals. It will provide them with a comprehensive overview of the security threats that SMBs face, and it will give them some practical tips on how to mitigate those threats.

The Art of Security Logging

This talk will teach you how to collect, analyze, and interpret security logs to detect and respond to attacks. Patrick Wardle is a well-known security researcher and author. He is the founder of the security blog Null Byte, and he is the author of several books on security, including “The Art of Security Logging” and “The Practice of Network Security Monitoring.”

I believe that this talk would be very helpful for security professionals who are responsible for collecting and analyzing security logs. It will provide them with a comprehensive overview of the logging process, and it will give them some practical tips on how to use logs to detect and respond to attacks.

Hunting in the Dark: Defeating Advanced Adversaries

This talk will discuss how to hunt for advanced adversaries who are using sophisticated techniques to evade detection. Kevin Beaumont is a well-known security researcher and author. He is the founder of the security blog The Kevin Beaumont Blog, and he is the author of several books on security, including “Hunting in the Dark” and “The Cyber War.”

I believe that this talk would be very helpful for security professionals who are interested in and responsible for threat hunting in their organization. It will provide them with a comprehensive overview of the threat landscape, and it will give them some practical tips on how to identify and respond to advanced attacks.

 

Amanda Berlin DEFCONIn addition to these talks, there are also a large number and variety of workshops and tutorials that would be of interest to anyone in the technology and security space. These sessions will provide hands-on training on topics such as incident response, penetration testing, and malware analysis.

Overall, DEF CON is a great opportunity to learn from some of the world’s leading security experts. If you’re serious about protecting your organization, I encourage you to attend the conference.

I hope you’ll join me at DEF CON 31!

Security news and stories right to your inbox!