http://2015.brucon.org/index.php?title=Training_2015_-_Cyber_Breach_Management&feed=atom&action=history
Training 2015 - Cyber Breach Management - Revision history
2024-03-28T08:41:06Z
Revision history for this page on the wiki
MediaWiki 1.27.4
http://2015.brucon.org/index.php?title=Training_2015_-_Cyber_Breach_Management&diff=4901&oldid=prev
Tom.Gilis: /* Trainer Biography */
2015-04-28T19:52:17Z
<p><span dir="auto"><span class="autocomment">Trainer Biography</span></span></p>
<table class="diff diff-contentalign-left" data-mw="interface">
<col class='diff-marker' />
<col class='diff-content' />
<col class='diff-marker' />
<col class='diff-content' />
<tr style='vertical-align: top;' lang='en'>
<td colspan='2' style="background-color: white; color:black; text-align: center;">← Older revision</td>
<td colspan='2' style="background-color: white; color:black; text-align: center;">Revision as of 19:52, 28 April 2015</td>
</tr><tr><td colspan="2" class="diff-lineno" id="mw-diff-left-l18" >Line 18:</td>
<td colspan="2" class="diff-lineno">Line 18:</td></tr>
<tr><td class='diff-marker'> </td><td style="background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;"></td><td class='diff-marker'> </td><td style="background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;"></td></tr>
<tr><td class='diff-marker'> </td><td style="background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;"><div>Chris has previously taught courses on incident response and digital forensics at venues including CounterMeasure, Black Hat USA, Abu Dhabi and Asia.  He has also written numerous articles on incident response and information security, including his most recent, ”Payment Card Data Theft: Tips For Small Business" - Dark Reading, July 2014.</div></td><td class='diff-marker'> </td><td style="background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;"><div>Chris has previously taught courses on incident response and digital forensics at venues including CounterMeasure, Black Hat USA, Abu Dhabi and Asia.  He has also written numerous articles on incident response and information security, including his most recent, ”Payment Card Data Theft: Tips For Small Business" - Dark Reading, July 2014.</div></td></tr>
<tr><td colspan="2"> </td><td class='diff-marker'>+</td><td style="color:black; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;"><div><ins style="font-weight: bold; text-decoration: none;"></ins></div></td></tr>
<tr><td colspan="2"> </td><td class='diff-marker'>+</td><td style="color:black; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;"><div><ins style="font-weight: bold; text-decoration: none;">[http://www.darkreading.com/attacks-breaches/payment-card-data-theft-tips-for-small-business/a/d-id/1297277? Payment Card Data Theft: Tips For Small Business by Chris Nutt]</ins></div></td></tr>
<tr><td class='diff-marker'> </td><td style="background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;"></td><td class='diff-marker'> </td><td style="background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;"></td></tr>
<tr><td class='diff-marker'> </td><td style="background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;"><div>''Mon. 5 - 7 October 2015 (09:00 - 17:00)''</div></td><td class='diff-marker'> </td><td style="background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;"><div>''Mon. 5 - 7 October 2015 (09:00 - 17:00)''</div></td></tr>
</table>
Tom.Gilis
http://2015.brucon.org/index.php?title=Training_2015_-_Cyber_Breach_Management&diff=4900&oldid=prev
Tom.Gilis: Protected "Training 2015 - Cyber Breach Management" ([Edit=Allow only administrators] (indefinite) [Move=Allow only administrators] (indefinite))
2015-04-28T19:49:01Z
<p>Protected "<a href="/index.php/Training_2015_-_Cyber_Breach_Management" title="Training 2015 - Cyber Breach Management">Training 2015 - Cyber Breach Management</a>" ([Edit=Allow only administrators] (indefinite) [Move=Allow only administrators] (indefinite))</p>
<table class="diff diff-contentalign-left" data-mw="interface">
<tr style='vertical-align: top;' lang='en'>
<td colspan='1' style="background-color: white; color:black; text-align: center;">← Older revision</td>
<td colspan='1' style="background-color: white; color:black; text-align: center;">Revision as of 19:49, 28 April 2015</td>
</tr><tr><td colspan='2' style='text-align: center;' lang='en'><div class="mw-diff-empty">(No difference)</div>
</td></tr></table>
Tom.Gilis
http://2015.brucon.org/index.php?title=Training_2015_-_Cyber_Breach_Management&diff=4899&oldid=prev
Tom.Gilis: /* Trainer Biography */
2015-04-28T19:48:50Z
<p><span dir="auto"><span class="autocomment">Trainer Biography</span></span></p>
<table class="diff diff-contentalign-left" data-mw="interface">
<col class='diff-marker' />
<col class='diff-content' />
<col class='diff-marker' />
<col class='diff-content' />
<tr style='vertical-align: top;' lang='en'>
<td colspan='2' style="background-color: white; color:black; text-align: center;">← Older revision</td>
<td colspan='2' style="background-color: white; color:black; text-align: center;">Revision as of 19:48, 28 April 2015</td>
</tr><tr><td colspan="2" class="diff-lineno" id="mw-diff-left-l18" >Line 18:</td>
<td colspan="2" class="diff-lineno">Line 18:</td></tr>
<tr><td class='diff-marker'> </td><td style="background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;"></td><td class='diff-marker'> </td><td style="background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;"></td></tr>
<tr><td class='diff-marker'> </td><td style="background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;"><div>Chris has previously taught courses on incident response and digital forensics at venues including CounterMeasure, Black Hat USA, Abu Dhabi and Asia.  He has also written numerous articles on incident response and information security, including his most recent, ”Payment Card Data Theft: Tips For Small Business" - Dark Reading, July 2014.</div></td><td class='diff-marker'> </td><td style="background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;"><div>Chris has previously taught courses on incident response and digital forensics at venues including CounterMeasure, Black Hat USA, Abu Dhabi and Asia.  He has also written numerous articles on incident response and information security, including his most recent, ”Payment Card Data Theft: Tips For Small Business" - Dark Reading, July 2014.</div></td></tr>
<tr><td class='diff-marker'>−</td><td style="color:black; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;"><div><del style="font-weight: bold; text-decoration: none;"></del></div></td><td colspan="2"> </td></tr>
<tr><td class='diff-marker'>−</td><td style="color:black; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;"><div><del style="font-weight: bold; text-decoration: none;">More information is available on [http://carnal0wnage.attackresearch.com/ carnal0wnage]</del></div></td><td colspan="2"> </td></tr>
<tr><td class='diff-marker'>−</td><td style="color:black; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;"><div><del style="font-weight: bold; text-decoration: none;"></del></div></td><td colspan="2"> </td></tr>
<tr><td class='diff-marker'>−</td><td style="color:black; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;"><div><del style="font-weight: bold; text-decoration: none;"><br>[[Image:300px-twitter-icon.jpg|17px]] [https://twitter.com/attackresearch @attackresearch]</del></div></td><td colspan="2"> </td></tr>
<tr><td class='diff-marker'>−</td><td style="color:black; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;"><div><del style="font-weight: bold; text-decoration: none;"></del></div></td><td colspan="2"> </td></tr>
<tr><td class='diff-marker'>−</td><td style="color:black; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;"><div><del style="font-weight: bold; text-decoration: none;">Links : </del></div></td><td colspan="2"> </td></tr>
<tr><td class='diff-marker'>−</td><td style="color:black; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;"><div><del style="font-weight: bold; text-decoration: none;">* [https://www.youtube.com/watch?v=rMm6_GF_i_E (Youtube) Russ Gideon - Paint by Numbers vs. Monet (BruCON 0X05)]</del></div></td><td colspan="2"> </td></tr>
<tr><td class='diff-marker'>−</td><td style="color:black; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;"><div><del style="font-weight: bold; text-decoration: none;"></del></div></td><td colspan="2"> </td></tr>
<tr><td class='diff-marker'> </td><td style="background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;"></td><td class='diff-marker'> </td><td style="background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;"></td></tr>
<tr><td class='diff-marker'> </td><td style="background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;"><div>''Mon. 5 - 7 October 2015 (09:00 - 17:00)''</div></td><td class='diff-marker'> </td><td style="background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;"><div>''Mon. 5 - 7 October 2015 (09:00 - 17:00)''</div></td></tr>
</table>
Tom.Gilis
http://2015.brucon.org/index.php?title=Training_2015_-_Cyber_Breach_Management&diff=4898&oldid=prev
Tom.Gilis: /* Trainer Biography */
2015-04-28T19:48:36Z
<p><span dir="auto"><span class="autocomment">Trainer Biography</span></span></p>
<table class="diff diff-contentalign-left" data-mw="interface">
<col class='diff-marker' />
<col class='diff-content' />
<col class='diff-marker' />
<col class='diff-content' />
<tr style='vertical-align: top;' lang='en'>
<td colspan='2' style="background-color: white; color:black; text-align: center;">← Older revision</td>
<td colspan='2' style="background-color: white; color:black; text-align: center;">Revision as of 19:48, 28 April 2015</td>
</tr><tr><td colspan="2" class="diff-lineno" id="mw-diff-left-l12" >Line 12:</td>
<td colspan="2" class="diff-lineno">Line 12:</td></tr>
<tr><td class='diff-marker'> </td><td style="background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;"></td><td class='diff-marker'> </td><td style="background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;"></td></tr>
<tr><td class='diff-marker'> </td><td style="background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;"><div>=Trainer Biography=</div></td><td class='diff-marker'> </td><td style="background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;"><div>=Trainer Biography=</div></td></tr>
<tr><td class='diff-marker'>−</td><td style="color:black; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;"><div>[[File:<del class="diffchange diffchange-inline">Russ_Gideon</del>.<del class="diffchange diffchange-inline">png</del>|thumb|125px]]</div></td><td class='diff-marker'>+</td><td style="color:black; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;"><div>[[File:<ins class="diffchange diffchange-inline">Chris</ins>.<ins class="diffchange diffchange-inline">Nutt.jpg</ins>|thumb|125px]]</div></td></tr>
<tr><td class='diff-marker'> </td><td style="background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;"><div>Chris Nutt is an expert in the field of incident response and digital forensics.  He has more than 10 years of experience helping global organizations manage and conduct complex investigations into attacks targeting intellectual property and financial information.  </div></td><td class='diff-marker'> </td><td style="background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;"><div>Chris Nutt is an expert in the field of incident response and digital forensics.  He has more than 10 years of experience helping global organizations manage and conduct complex investigations into attacks targeting intellectual property and financial information.  </div></td></tr>
<tr><td class='diff-marker'> </td><td style="background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;"></td><td class='diff-marker'> </td><td style="background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;"></td></tr>
</table>
Tom.Gilis
http://2015.brucon.org/index.php?title=Training_2015_-_Cyber_Breach_Management&diff=4895&oldid=prev
Tom.Gilis: Created page with "=Cyber Breach Management= ===Course Description=== The frequency, scope, and sophistication of attacks against computer networks is increasing daily. This course will teach..."
2015-04-28T19:47:51Z
<p>Created page with "=Cyber Breach Management= ===Course Description=== The frequency, scope, and sophistication of attacks against computer networks is increasing daily. This course will teach..."</p>
<p><b>New page</b></p><div>=Cyber Breach Management=<br />
<br />
===Course Description===<br />
The frequency, scope, and sophistication of attacks against computer networks is increasing daily. This course will teach students how to successfully manage the people, processes, and voluminous data required to successfully investigate and recover from a breach. All phases of the incident response process will be covered and hands-on exercises will provide tools for analyzing system artifacts as well as scrutinizing and communicating technical findings.<br />
<br />
=Course Contents=<br />
<br />
To be specified<br />
<br />
= Student requirements = <br />
The class is geared toward students with a background in digital forensics, computer networking or systems administration. Students should be familiar with common computing and networking terms and concepts such as file systems, RAM, DNS, active directory, IP addresses, firewalls, etc. Comfort with the Windows and Linux command line would also be beneficial.<br />
<br />
=Trainer Biography=<br />
[[File:Russ_Gideon.png|thumb|125px]]<br />
Chris Nutt is an expert in the field of incident response and digital forensics. He has more than 10 years of experience helping global organizations manage and conduct complex investigations into attacks targeting intellectual property and financial information. <br />
<br />
He is a recent addition to Kroll’s Cyber Security practice, but spent the prior seven years with Mandiant, where he helped develop their investigative methodologies, digital forensics techniques, and technologies.<br />
<br />
Chris has previously taught courses on incident response and digital forensics at venues including CounterMeasure, Black Hat USA, Abu Dhabi and Asia. He has also written numerous articles on incident response and information security, including his most recent, ”Payment Card Data Theft: Tips For Small Business" - Dark Reading, July 2014.<br />
<br />
More information is available on [http://carnal0wnage.attackresearch.com/ carnal0wnage]<br />
<br />
<br>[[Image:300px-twitter-icon.jpg|17px]] [https://twitter.com/attackresearch @attackresearch]<br />
<br />
Links : <br />
* [https://www.youtube.com/watch?v=rMm6_GF_i_E (Youtube) Russ Gideon - Paint by Numbers vs. Monet (BruCON 0X05)]<br />
<br />
<br />
''Mon. 5 - 7 October 2015 (09:00 - 17:00)''<br />
<br />
[[File:Register.jpg||link=https://registration.brucon.org/training-registration/]]<br />
<br />
[[Training|Back to Training Overview]]</div>
Tom.Gilis