Event Series Conference

Six Things DevOps Wants from InfoSec – Naomi Buckwalter

DMG: Track 1 1906 Deadwood Mountain Drive, Deadwood

Why does it seem that DevOps and Security are always at odds with each other? Why does Security have such a bad reputation among developers? In this talk, "Six Things DevOps Wants from InfoSec", you'll learn that developers actually WANT to work with Security - they care about writing secure code! But we as security professionals need to understand that developers don't want another "Big Brother" telling them what to do - they need an active and supportive partner in the delivery process. This talk will showcase six things that every DevOps teams want from their InfoSec teams. Everyone is on the same team, after all. Let's help DevOps accomplish their goal to release the best - and most secure - code possible.

Event Series Conference

Rethinking Penetration Testing – Mike Saunders

DMG: Track 1 1906 Deadwood Mountain Drive, Deadwood

The current model for traditional penetration testing is broken. The typical scan and exploit model doesn’t reflect how real attackers operate after establishing a foothold. Many organizations aren’t mature enough to need or benefit from a proper red team assessment. Organizations are often unsure how to approach a Purple Team

Event Series Conference

Destroying the Fog of War: Demonstrating Realistic End-to-End Attacks and Detective Controls – Jeff McJunkin

DMG: Track 1 1906 Deadwood Mountain Drive, Deadwood

This talk reveals the five ways outside attackers gain internal access and outlines defenders' three core objectives: reducing initial access, lowering detection and response time, and slowing down attackers. Through live demonstrations, real-world examples, and even a unique Mario Kart analogy, this talk provides actionable insights into detective controls and slowing down attackers.

Event Series Conference

Six Ways to Defend Better RN – David Kennedy

DMG: Track 1 1906 Deadwood Mountain Drive, Deadwood

Running two large sized companies that both focus on breaking into companies as well as defending them has helped put things into perspectives on both successes and failures from a defense perspective. This talk will dive into some of the most common methods attackers go after organizations, but focus on non traditional ways of defending the network against them. We'll be diving into prevention, detection, deception, AI (or lack thereof and marketing fluff), and much more. Let's cut right down to it, and walk away with six things you can do today to better defend and identify attacks earlier in the attack cycle.

Event Series Conference

Cybersecurity for the “Have-Nots” of the World – Jake Williams

DMG: Track 1 1906 Deadwood Mountain Drive, Deadwood

The cybersecurity landscape can broadly be broken down into dividing between the “haves” vs the “have-nots.” The security recommendations offered by so many of “just deploy X” fall on deaf ears to the *vast majority* of organizations who fall into the latter category of “have-nots.” Until the security gap for the “have-nots” of the world is closed, we’re doomed to continue failing at security overall (/screams in “software supply chain”).

Event Series Conference

The Lost Underground – Ray and Mike Felch

DMG: Track 1 1906 Deadwood Mountain Drive, Deadwood

Take an exhilarating journey back in time to the 80s, 90s, and 00s as this father and son duo reveal what it was like to get started in an untamed security landscape populated by ruthless hackers. Join us for a captivating presentation as we delve into the intriguing world of the lost underground scene, revealing the stories, techniques, and culture that defined this rebellious era.