Black Box, a solutions integrator, says its Black Box Cyber Defense Clinic is a series of free workshops to address cybersecurity preparedness.
The clinics will teach IT and security professionals how to conduct incident response using their own IT teams and deploy tools if or when their network is compromised.
Each of the sessions includes a 30-minute discussion to set the context, 2 hours of hands-on lab training, and 30 minutes of Q&A discussion. Each clinic is designed to stand on its own and does not require attendance at previous sessions. However, attending all three clinics allows pros to go deeper into cyber defense training.
IT and security professionals who are interested in these clinics may register and sign up for notifications at Black Box’ website. They are on 14 Oct, 18 Nov and 16 Dec.
Smash & Grab
All cyberattacks first start with reconnaissance. The threat agent learns about the network and how it is designed and looks for vulnerabilities that make it possible to execute a compromise and move horizontally in the network. In this three-part interactive event, Black Box experts will help IT pros assume the role of a hacker and understand recon and front-door attack methodologies.
Ransomware & Insider Threat
The Smash & Grab clinic explained how to find vulnerabilities in the network. In this clinic attendees will learn how to exploit those vulnerabilities. They’ll find out how ransomware works by executing an attack in a lab environment, and they’ll act as an evil insider to perform a data breach by exfiltrating data.
Access Control and Centralized Defense
Now that attendees have compromised hosts and exfiltrated data, it is time to perform at the policy level by applying network access control and centralized event monitoring. Attendees will discover the keys to responding to a cyber incident by controlling access to network resources and monitoring event data using Splunk to look out for malicious threats.
You might also like...
The recursive filter has the advantage of using less hardware, but is more complex to understand.
Live TV production may not be the best fit for perfectionists who can’t recognize ‘good enough’ and move on. Live TV has no patience, no second chances and can never be late. Every live shot is a first impression.
Once the basic requirements for reproducing sound were in place, the most significant next step was to reproduce to some extent the spatial attributes of sound. Stereophony, using two channels, was the first successful system.
TAG Video Systems takes advantage of over 70,000 globally deployed probing points to give users the ability to dive deep into streaming content monitoring. The company anticipates more than 100,000 probing point deployments by the end of 2021.
In the last article in this series, we looked at why integrated monitoring is a necessity in modern broadcast IP workflows. In this article, we dig deeper to understand what is new in IP monitoring and how this integrates with…