By: Mike A. Bryan
Hello again, dear readers, and welcome to 2021. We hope that you had wonderful holidays and were able to enjoy them as much as possible in this crazy pandemic.
Last year, I set out to produce a webinar on each of the topics in our PowerUp: Cyber Games to serve as introductory material for the team leaders and participants. Not only were the webinars well-attended, but they have been used by numerous teachers and educators since we put them on our website and on our YouTube channel. Due to the success of these webinars, I found several more topics that may be used in the PowerUp: Cyber Games in the future, and hosted webinars on those topics as well. After taking a little time off to manage the PowerUp: Cyber Games registration, I have put together another series of webinars for the winter and spring of 2021.
None of these topics specifically relate to our PowerUp: Cyber Games, but they are all interesting facets of various information technology topics. Up first was Ben Cronin of CrowdStrike presenting the Incident Response Life Cycle. This webinar focused on what happens when a company or organization experiences a hack or breach, and the steps that can be taken to fight and/or mitigate the negative impact of such an action. This process is fascinating, and I highly recommend everyone watch the recording to learn how it all works. The following week, Thomas Canfield of GFI Digital will be presenting on a very broad topic, penetration testing. “Pentesting” as it is referred to in the industry, is when a company or organization either hires an outside company or tasks their own cyber staff with attempting to penetrate the security defenses in place at that company or organization. This is a hot job right now, so if you are wanting to become an “ethical hacker,” this could be a good job for you.
- Sign up here for Weds., Jan. 20th at 10am – Pentesting
In February, Bob Hernandez of SAIC will be doing a live Linux demo. Linux is the operating system of choice for cybersecurity professionals. It is very difficult to become a Linux expert, for the complexity of the language and commands takes some time to master, but Bob will give us a good overview of what Linux does and how it can be used successfully in cybersecurity. Later in February, we will have the honor of Dan Hulbert hosting “A Day in the Life of a SOC” live from the Security Operations Center at Mastercard here in St. Louis. This one will be exciting, for we will see exactly how Mastercard manages their worldwide cybersecurity from the front row!
- Sign up here for Weds., Feb. 3rd at 10am – Linux demo
- Sign up here for Weds., Feb. 17th at 10am – A Day in the Life of a SOC
March will bring us two more webinars, both hosted by Anastacia Webster of the Department of Homeland Security. They will focus on Digital Forensics, which is what investigators of a hack or a breach do to gather information on the hack or breach. The first one will concentrate on the FTK Imager, while the second will focus on Autopsy. Both software tools are vital to the activities of a digital forensics professional, and are widely used in the industry. We are very lucky to have someone from Homeland Security joining the ranks of our volunteers and are excited to see what she has to say.
- Sign up here for Weds., March 3rd – Digital Forensics, part one
- Sign up here for Weds., March 17th – Digital Forensics, part two
Finishing up the series in April will be two more webinars, both hosted by Chris Elbring of an “undisclosed” organization. Chris is a volunteer that has served in multiple capacities for CyberUp’s mission, and we are looking forward to his explanation of the OWASP Top 10. In case you didn’t know, there is a professional group called OWASP, or the Open Web Application Security Project, that puts out a “top 10” list of the most common hacks or breaches from the previous year. Last, Chris will join us again in late April to talk about application security throughout the software development life cycle. Believe it or not, there are still companies producing software and applications without incorporating cybersecurity into the production cycle, and only worrying about it when everything else is done. This is bad, very bad, and Chris will explain exactly why this is a problem and what needs to be done to remedy it.
- Sign up here for Weds., April 7th at 10am – The OWASP Top 10
- Sign up here for Weds., April 21st at 10am – Application Security in the SDLC
We hope you will join us for these upcoming webinars. We will also be posting them on our website and YouTube channel, just like the earlier videos. To find out the schedule of events, navigate your browser to Eventbrite and search “CyberUp.” We hope to see many of you in the audiences for these awesome events. Happy 2021!