Videos

iOS 11 isn’ t all fun and games

iOS 11 isn’ t all fun and games

The topic discussed in this webcast is just one of the subjects we cover in SANS FOR585: Advanced Smartphone Forensics (http://www.sans.org/u/xt0). For more information, please check a previous webcast regarding the recent FOR585 course content additions here (http://dfir.to/NewFOR585) Overview: SANS instructors Heather Mahalik and Domenica "Lee" Crognale discuss iOS 11 messages and the differences they have seen compared to older iOS versions. They walk you through their methods for testing and creating data sets for examination, as well as provide attendees with tips on how to better understand iOS 11 messages. Additionally, they will discuss procedures used for developing the query and how your mobile forensics tools might be blurring the lines on what the data represents. Speaker Bios Heather Mahalik Heather has worked on high-stress and high-profile cases, investigating everything from child exploitation to Osama Bin Laden’s media. She has helped law enforcement, eDiscovery firms, and the federal government extract and manually decode artifacts used in solving investigations around the world. All told she has more than 14 years of experience in digital forensics, including eight years focused on mobile forensics – there’s hardly a device or platform she hasn’t researched or examined or a commercial tool she hasn’t used. These days Heather is the Director of Forensic Engineering at ManTech CARD. Heather previously led the mobile device team for Basis Technology, where she focused on mobile device exploitation in support of the federal government. She also worked as a forensic examiner at Stroz Friedberg and the U.S. State Department Computer Investigations and Forensics Lab, where she handled a number of high-profile cases. She has also developed and implemented forensic training programs and standard operating procedures. @HeatherMahalik Domenica Crognale Domenica is one of the course co-authors of SANS FOR585: Advanced Smartphone Forensics. She has been working in digital forensics for more than 10 years and specializing in mobile devices since 2009. In previous jobs she has provided training to military and government agencies, worked on high-profile cases, tested and validated various mobile forensics utilities, and provided security assessments for many mobile applications. In her day job, she spends time dissecting third-party mobile applications, where there is no shortage of interesting data left behind. She maintains multiple certifications including the GASF, EnCE, CCE, and CISSP. @domenicacrognal
Getting Started with the SIFT Workstation Webcast with Rob Lee

Getting Started with the SIFT Workstation Webcast with Rob Lee

An international team of forensics experts helped create the SANS Investigative Forensic Toolkit (SIFT) Workstation and made it available to the whole community as a public service. The free SIFT toolkit, that can match any modern forensic tool suite, is also featured in SANS FOR508: Advanced Threat Hunting and Incident Response course (http://www.sans.org/FOR508). It demonstrates that advanced investigations and responding to intrusions can be accomplished using cutting-edge open-source tools that are freely available and frequently updated. The SANS Investigative Forensic Toolkit has become the most popular download on the SANS website. Over the past year, 20,000 individuals have downloaded the SIFT workstation and has become a staple in many organizations key tools to perform investigations. This session will demonstrate some of the key tools and capabilities of the suite. You will learn how to leverage this powerful tool in your incident response capability in your organizations. To download the SIFT Workstation please visit: http://dfir.to/SIFT-Download Speaker Bio Rob Lee is the curriculum lead and author for digital forensic and incident response at the SANS Institute (http://dfir.to/2yx0W5U) With more than 19 years of experience in computer forensics, vulnerability and exploit discovery, intrusion detection/prevention and incident response, he provides consulting services via HARBINGERS LLC. in the Boston, MA. area. Before directing services at HARBINGERS, Rob worked with government agencies in law enforcement, defense, and intelligence communities as a lead for vulnerability discovery and exploit development teams supporting Title10/50 cyber operations. Following his work in the intel community, he worked at the incident response firm MANDIANT for 5 years. Notably, he co-authored MANDIANT's first detail threat intelligence reports on Chinese APT activity titled "M-Trends: The Advanced Persistent Threat."
CyberSecurity: With great power comes great responsibility | Ryan Heiob | TEDxSaintThomas

CyberSecurity: With great power comes great responsibility | Ryan Heiob | TEDxSaintThomas

In his TEDxSaintThomas talk entitled, "CyberSecurity: With great power comes great responsibility," Ryan will explore what is happening in the cyber world today and the ways to protect ourselves. What are the actual threats that present themselves that ordinary computer users may not know exist? Ryan Heiob, originally from Michigan, Ryan moved to the Virgin Islands in 2008. Ryan has worked in all fields of Technology over the past 17 years and believes in continuous education to keep up with the ever-changing technology landscape. His main focus is now Internet Security and how we can protect our privacy by education and being aware of the new threats that we’re facing. This talk was given at a TEDx event using the TED conference format but independently organized by a local community.
The Homeland Security Information Network Celebrates 10 Years!

The Homeland Security Information Network Celebrates 10 Years!

This video highlights the HSIN Program’s mission goals and achievements over the past decade. As the designated sensitive-but-unclassified information sharing and collaboration system for DHS and its partners since 2006, HSIN senior leadership reflect on 10 years of HSIN growth and success.
SANS DFIR Cyber Threat Intelligence Summit

SANS DFIR Cyber Threat Intelligence Summit

REGISTER AT: www.sans.org/CTI-Summit Summit Dates: January 31, 2017 and February 1, 2017 Training Course Dates: January 25-30, 2017 Join SANS at this innovative Summit as we focus on enabling organizations to build effective cyber threat intelligence analysis capabilities. The Cyber Threat Intelligence Summit & Training is back for another year of in-depth talks, world-class SANS Training, DFIR NetWars, and exclusive networking opportunities! This year's Summit aims to provide specific analysis techniques and capabilities that can be utilized to properly create and maintain Cyber Threat Intelligence in your organization. While Cyber Threat Intelligence is a relatively new field, we can draw upon classic intelligence approaches to better secure our organizations. Throughout the Summit, we'll be going old school by examining traditional intelligence methods and techniques; and applying them to cyber threat intelligence. The Summit & Training will explore the following: - How classic intelligence approaches are applied to CTI analysis and production - Interesting perspectives and case studies that challenge CTI assumptions and result in a shift in understanding - Classic methods of producing Cyber Threat Intelligence - Implementing and making decisions based off of intelligence - Case studies on the application of cyber threat intelligence to a security or business problem - Innovative ways to utilize or analyze CTI with classic techniques - New tools developed to support or enable CTI
NATO Cyber Security Symposium – NIAS 2016

NATO Cyber Security Symposium – NIAS 2016

NATO cyber experts have gotten together with their industry counterparts to build their cyber defence capacity. The meeting took place at an event in Mons, organised by the NATO Communications and Information Agency. NCIA runs NIAS every year.

DARPA’s Cyber Grand Challenge: Expanded Highlights from the Final Event

DARPA’s Cyber Grand Challenge: Expanded Highlights from the Final Event

On August 4, 2016, seven high-performance computers successfully played a game of Capture the Flag during the Final Event of DARPA's Cyber Grand Challenge. In doing so, they made history, proving that it is possible to automate cybersecurity.

The winners: 1st Place - Mayhem, built by ForAllSecure; 2nd Place - Xandra, built by TECHx; 3rd Place - Mechanical Phish, built by Shellphish. From here, it is up to the teams and the hacker and programmer communities to continue this revolution in computer security.

Strengthening the Cyber Security Posture of U.S. Federal Government

Strengthening the Cyber Security Posture of U.S. Federal Government

Subject matter expert, Ian Doyle, Security Strategist, IBM Security, U.S. Federal discusses the current federal cyber security landscape and how the IBM Security Framework through a multi-faceted approach helps government agencies prevent, detect and respond to the cyber security threat.

Hear about the key areas within the IBM Security Framework - intelligence & analytics, integration, expertise, and how these enable cyber security situational awareness and continuous monitoring for federal agencies.