BSides Jacksonville 2024 Pre-Conference Workshops

:bangbang: All workshops are held on Friday, Nov 15th, at UNF and require pre-registration.
Register For Pre-Conference Workshops Here

Friday, November 15th 2024

Time Workshop 1 Workshop 2 Workshop 3 Workshop 4
09:00-10:00 Landing Your First InfoSec Job - Jobs, Resume Prep, Interviewing Active Directory, Powershell, Blue and Red Team Professionally Evil API Security  
10:00-11:00 Incident Response in Action: An Interactive Discussion on Common Cybersecurity Scenarios
11:00-12:00
12:00-13:00 Break - Lunch
13:00-14:00 Landing Your First InfoSec Job - Jobs, Resume Prep, Interviewing Active Directory, Powershell, Blue and Red Team Professionally Evil API Security  
14:00-15:00  
15:00-16:00 Incident Response in Action: An Interactive Discussion on Common Cybersecurity Scenarios
16:00-17:00
:star: Please check the posted schedule for updates. The schedule is subject to change.

Workshops

Landing Your First InfoSec Job - Jobs, Resume Prep, Interviewing

A working session/presentation on how to land your first job in infosec
This will start with a run down on information security jobs, types of resumes, and then move to preparing resumes for applying for jobs, and direct feedback on their resume. Discussion on approaches to interviewing with pointed feedback on what's really important.

Speaker: Ed Spencer, CISSP, GCDA, A+, Sec+, PenTest+, CySA+
Currently a cybersecurity manager with nearly 30 years of experience in IT and Information Security roles. Holds or has held more than a dozen certifications and has trained thousands of people on a variety of topics. His greatest achievements are in helping others change their lives through new careers or elevating their career to a new height.
Time: 9:00am - 5:00pm
Cost: $125
Active Directory, Powershell, Blue and Red Team

Active Directory is a Monolith. Powershell is insanely powerful. Together they can be used to hunt for threats and test those systems. Join Michael Marbut and Eric Kuehn for a hands-on workshop where we will dive into both red team and blue team sides of Active Directory utilizing Powershell.

Speaker: Michael Marbut and Eric Khuen
Time: 9:00am - 5:00pm
Cost: $200
Professionally Evil API Security

If you want to learn how to perform security testing on web applications that use application programming interfaces (APIs), this course is for you. APIs are the connective tissue responsible for transferring information between systems, both internally and externally. They are also a common target for cyberattacks, as they can expose sensitive data, application logic, and internal infrastructure. In this course, you will learn the basics of API penetration testing, including: What is an API and how it works What are the common types of APIs (SOAP and REST) and their differences What are some of the most common security risks and vulnerabilities of APIs How to use tools and techniques to test APIs for security issues By the end of this course, you will be able to conduct a basic API pen test using a systematic approach and industry best practices. You will also gain hands-on experience with popular tools such as Postman, Burp Suite, Nmap, and OWASP ZAP. This course is suitable for beginners who have some knowledge of web application security and want to expand their skills to API security testing.

Speaker: Jennifer Shannon, Senior Security Consultant at Secure Ideas
Jennifer is a Senior Security Consultant with Secure Ideas with a background in malware analysis, penetration testing, and teaching. She graduated with honors from Florida State College at Jacksonville’s networking program. An avid computer geek for most of her life, she began her journey in cybersecurity as a SOC Analyst where she showed an aptitude for both penetration testing and malware analysis. She was quickly promoted into a role that capitalized on her abilities. She has experience performing penetration tests against web applications, mobile software and platforms, and social engineering. Jennifer discovered a passion for computers and problem solving at a young age. She bought Steal This Computer Book 2.0, by Wallace Wang, with one of her first paychecks, and became enamored with hacking and cyber security. While pursuing her degree she dedicated time to teaching computing skills to underrepresented minorities. She is the co-leader for the TOOOL chapter in Jacksonville, FL. Jennifer continues to be passionate about teaching and is eager to share her knowledge with anyone who will listen. In her free time, she likes gaming, playing around with SDR’s, and painting.
Time: 9:00am - 5:00pm
Cost: $200
Incident Response in Action: An Interactive Discussion on Common Cybersecurity Scenarios

Scenario A: Adware with a Side of C2
An interactive scenario-based discussion on "when a medium-sized retail company notices a spike in DNS traffic from several workstations across different departments. Upon further investigation, the security team discovers C2 traffic embedded within the DNS queries. After analyzing the network traffic, they trace the issue back to a seemingly harmless browser extension installed on multiple machines. This extension, marketed as an ad blocker, was actually adware that opened the door to a more sophisticated attack." Participants will have the opportunity to decide which log sources to investigate while discussing key points like types of logs and data sources used in detection, preventative measures that can be taken to avoid these types of threats, and common security oversights that make them vulnerable to such activity.

Speaker: TBA
Time: 10:00am - 12:00pm
Cost: $50

Scenario B: Dual-Approval > Dueling with Wire Fraud Scams
An interactive scenario-based discussion on "when a financial officer at a mid-sized manufacturing company receives an email that appears to be from the company’s CEO. The email is written in a tone that mimics the CEO’s style, urgently requesting the transfer of a large sum of money to a new international account for a strategic business acquisition. Attached to the email is an "invoice" from a legitimate-looking vendor, further validating the request. The financial officer, under pressure to comply quickly, starts initiating the wire transfer." Participants will have the opportunity to decide which log sources to investigate while discussing key points like types of logs and data sources used in detection, preventative measures that can be taken to avoid these types of threats, and common security oversights that make them vulnerable to such activity.

Speaker: TBA
Time: 3:00pm - 5:00pm
Cost: $50