Event Series Conference

Campfire Talk: So My Credentials have been Leaked…Now What? – Dwayne McDaniel

DMG: Track 3 - Hotel Lobby Meeting Room 1906 Deadwood Mountain Drive, Deadwood, SD, United States

This session will look at how to deal with credential leaks from detection through closing the final related ticket the incident generated. We will look at topics such as validation of secrets, scoping impact, assembling the right players, to how to offload tribal knowledge with tools like notebooks and playbooks. We will also look at preventing future leaks with some open source tools and non-intrusive workflow adjustments.

Event Series Conference

Workshop: Automating Attacks – Alex Martirosyan

DMG: Track 3 - Hotel Lobby Meeting Room 1906 Deadwood Mountain Drive, Deadwood, SD, United States

With the latest advancements of attack and breach simulation tools, many organizations are still playing catchup to know where to begin. Endpoint detection and response (EDR) tools have become heavily relied upon with default configurations. As an industry, we have pushed a lot of the responsibility of managed service providers without fully understanding what we are signing up for. This workshop will help beginners understand what the latest buzzwords mean such as Atomic Testing, Micro Emulation Plans, and Purple Teaming.

Event Series Conference

Making Magnets for Needles in Noisy Haystacks: Operationalizing ATT&CK with Risk Based Alerting – Haylee Mills

DMG: Track 2 - Stage 2, General Session Area 1906 Deadwood Mountain Drive, Deadwood, SD, United States

MITRE ATT&CK helps us identify threats, prioritize data sources, and improve security posture, but how do we actualize those insights for better detection and alerting? We shift to alerts on aggregated behaviors over direct alerts, and make our noisy datasets into valuable treasure troves tagged with ATT&CK metadata. Let's discuss the key features needed to implement this in any security toolset!

Event Series Conference

Six Ways to Defend Better RN – David Kennedy

DMG: Track 1 - Main Stage, General Session Area 1906 Deadwood Mountain Drive, Deadwood, SD, United States

Running two large sized companies that both focus on breaking into companies as well as defending them has helped put things into perspectives on both successes and failures from a defense perspective. This talk will dive into some of the most common methods attackers go after organizations, but focus on non traditional ways of defending the network against them. We'll be diving into prevention, detection, deception, AI (or lack thereof and marketing fluff), and much more. Let's cut right down to it, and walk away with six things you can do today to better defend and identify attacks earlier in the attack cycle.

Event Series Conference

Workshop:  Intro to Social Engineering – Ed Miro

DMG: Track 4 - Back Stage 1906 Deadwood Mountain Drive, Deadwood, SD, United States

“Intro to Social Engineering” is a 4-hour course that will provide students an extensive crash course in the study, practice, and defense of social engineering. The course will include interactive elements/technology designed to make the session fun and engaging. In this course we will clearly define ‘social engineering’, cover the most common attack vectors utilized in this domain, and explore the history & development of social engineering.

Event Series Conference

Tool Shed Demo: Elrond

DMG: Track 4 - Back Stage 1906 Deadwood Mountain Drive, Deadwood, SD, United States

Python-written tool providing a one-liner command for accelerating the collection, processing, analysis and outputting of digital forensic artifacts.

Event Series Conference

Cybersecurity for the “Have-Nots” of the World – Jake Williams

DMG: Track 1 - Main Stage, General Session Area 1906 Deadwood Mountain Drive, Deadwood, SD, United States

The cybersecurity landscape can broadly be broken down into dividing between the “haves” vs the “have-nots.” The security recommendations offered by so many of “just deploy X” fall on deaf ears to the *vast majority* of organizations who fall into the latter category of “have-nots.” Until the security gap for the “have-nots” of the world is closed, we’re doomed to continue failing at security overall (/screams in “software supply chain”).

Event Series Conference

Tool Shed Demo: TBD

DMG: Track 4 - Back Stage 1906 Deadwood Mountain Drive, Deadwood, SD, United States

Presented by: Mathew Eidelberg Details coming soon! Details about Mathew Eidelberg coming soon!

Event Series Conference

Tool Shed Demo: Badrats

DMG: Track 4 - Back Stage 1906 Deadwood Mountain Drive, Deadwood, SD, United States

Badrats is an open-source Command and Control (C2) tool designed for initial access. Supporting 5 unique implants written in different languages, it allows operators to switch up their tradecraft on the fly depending on the defensive controls in place inside a client environment.

Event Series Conference

The Lost Underground – Ray and Mike Felch

DMG: Track 1 - Main Stage, General Session Area 1906 Deadwood Mountain Drive, Deadwood, SD, United States

Take an exhilarating journey back in time to the 80s, 90s, and 00s as this father and son duo reveal what it was like to get started in an untamed security landscape populated by ruthless hackers. Join us for a captivating presentation as we delve into the intriguing world of the lost underground scene, revealing the stories, techniques, and culture that defined this rebellious era.

Event Series Conference

Immunity, Free Speech, and the (Potential) Death of the Internet: A Section 230 Update – Kelli Tarala

DMG: Track 2 - Stage 2, General Session Area 1906 Deadwood Mountain Drive, Deadwood, SD, United States

There is a potential shift in Internet law with a lively debate surrounding it. Has Big Tech taken over free speech and political discourse? Are algorithms deciding our future? This year, the Supreme Court will be hearing the case Gonzalez v. Google LLC, in which the plaintiff asserts that Google's algorithm allows ISIS recruitment videos to be presented to young, impressionable youths. The Gonzalez's legal team asserts that Google as the publisher of the content is at least partially responsible for their daughter's death in the Islamic State attack in Paris in 2015.

Event Series Conference

Tool Shed Demo: TBD

DMG: Track 4 - Back Stage 1906 Deadwood Mountain Drive, Deadwood, SD, United States

Presented by: Steve Borosh Details coming soon! Details about Steve Borosh coming soon!

Event Series Conference

Keynote: Building a Winning Team Culture: Unleashing the Power of Collaboration and Excellence – Heath Adams

DMG: Track 0 - General Session Area 1906 Deadwood Mountain Drive, Deadwood, SD, United States

In today's fast-paced and competitive world, organizations are increasingly recognizing the importance of building a winning team culture to drive success. In this keynote, we will explore the key elements of fostering a team culture that fuels collaboration, innovation, and excellence. We will delve into the significance of leadership and its role in setting a clear vision, values, and goals that align with the team's purpose. By cultivating an environment of trust, respect, and open communication, we can empower team members to bring their best selves to work and contribute to the collective success.

Event Series Conference

Tool Shed Demo: TBD

DMG: Track 4 - Back Stage 1906 Deadwood Mountain Drive, Deadwood, SD, United States

Presented by: Corey Ham Details coming soon! Details about Corey Ham coming soon!

Event Series Conference

Awards with John Strand

DMG: Track 0 - General Session Area 1906 Deadwood Mountain Drive, Deadwood, SD, United States

John Strand makes a few closing remarks and award announcements to bid farewell to conference attendees and get the conference closed out.