Workshop 1 | Recon Like an Adversary: Uncovering Modern Techniques in Attack Surface Management

Join our expert, Jason, in a comprehensive 2-hour workshop designed to demystify the advanced techniques adversaries employ to infiltrate organizations. This session is a deep dive into the world of attack surface management using open-source tools, tailored to emulate both adversaries and professional bug hunters.
Workshop Highlights:
  1. Introduction to Reconnaissance Techniques: Gain insights into the methodologies used by adversaries in their initial approach to an organization.
  2. Tool Mastery: Explore a range of common tools and techniques for targeting organizations. This includes:
    1. Email Acquisition: Methods and tools for gathering email data.
    2. Technology Profiling: Techniques for identifying the technology stack of an organization.
    3. External Attack Surface Analysis: A focus on cloud and mobile environments, among others.
    4. Historical Data Mining: Strategies for uncovering valuable historical endpoint data.
  3. Live Demonstrations: Experience real-time use of each tool in the toolchain. Jason will share personal tips and tricks, enhancing your learning experience.
  4. Practical Application: The workshop features live targets, offering a real-world scenario for participants to engage with and learn from.
  5. Interactive Learning Experience: Participants are encouraged to actively engage, ask questions, and share experiences throughout the session.
This workshop is an invaluable opportunity for anyone in the offensive security field, offering practical, hands-on experience with live demonstrations. Be prepared for an engaging and enlightening journey into the world of ethical hacking and cyber reconnaissance.

Bio: Jason Haddix, also known as jhaddix, leads as CEO and “Hacker in Charge” of Arcanum Information Security, a premier firm specializing in assessments and training. Currently, he is the Field CISO for Flare.io and a Strategic Advisor to Bugcrowd. With a distinguished 20-year tenure in cybersecurity, Jason has previously held notable positions such as CISO at Ubisoft, Head of Trust at Bugcrowd, Director of Penetration Testing at HP, and Lead Penetration Tester at Redspin. He has expertise across nearly all cybersecurity domains and is ranked 57th all-time on Bugcrowd’s bug bounty leaderboards. A prolific speaker, Jason has delivered numerous talks on offensive security methodologies at major conferences including DEFCON, BlackHat, RSA, OWASP, Nullcon, SANS, IANS, BruCon, and Toorcon, among others.

Workshop 2 | Intro to Windows Forensics for Insider Threat

This 1-hour comprehensive workshop is designed to equip IT professionals, security analysts, and incident responders with the skills 
and knowledge necessary to investigate insider threats using Windows forensics techniques. Participants will learn how to collect digital
evidence, analyze windows artifacts, and identify suspicious insider activities.
 
Key Topics Covered:
  • Introduction to Insider Threats: Understanding the nature and impact of insider threats on organizations.
  • Windows Forensics Fundamentals: Overview of forensic principles, tools, and methodologies specific to Windows environments.
  • Data Acquisition and Preservation: Techniques for collecting and preserving digital evidence from Windows systems.
  • Windows forensic Analysis: Interpreting Windows artifacts to uncover potential insider threat activities, including file access and deletion, web browsing, downloads, logon events, and software execution history.
  • File System Forensics: Investigating file system artifacts to uncover unauthorized access and potential data exfiltration.
  • Network Forensics: Examining network traffic and connections to trace insider threat actions.
Outcome: By the end of this workshop, participants will have a solid understanding of basic Windows forensics and be able to effectively investigate and respond to insider threats, ensuring the security and integrity of their organization’s IT infrastructure.
 

Bio: Jacky is a senior cybersecurity specialist leading the cyber client team at Commissionnaires du Québec, a distinguished non-profit security company with a rich history spanning 99 years, founded in 1925 by World War I Canadian military veterans. In addition to his role at Commissionnaires du Québec, Jacky serves as an army reservist and team lead for the cyber protection team at the 34 Signal Regiment in Montreal. Jacky specializes in providing comprehensive cybersecurity services, including vulnerability assessment, incident response, and digital forensics. Currently, he is preparing to defend his PhD research in Immunology. Jacky can convincingly argue that many immunological concepts align perfectly with cybersecurity—so much so that he might just start prescribing firewalls as a cure for the common cold!

Limited seating

Registration for the workshops is available with the purchase of a ticket. A small fee is required to show commitment. Please note that the workshop will be in English.