ºÝºÝߣshows by User: fvictory / http://www.slideshare.net/images/logo.gif ºÝºÝߣshows by User: fvictory / Sat, 14 Dec 2019 07:45:42 GMT ºÝºÝߣShare feed for ºÝºÝߣshows by User: fvictory Container security Familiar problems in new technology /slideshow/container-security-familiar-problems-in-new-technology-205712653/205712653 containersecurity-familiarproblemsinnewtechnology-191214074542
Container adoption is on the rise across companies of every size and industry. While containerization is a new and exciting paradigm, it brings with it some of the same technical and organizational issues that security teams have always faced. This presentation will dive into a selection of these familiar issues and suggested solutions to help security teams get a better handle on containers and keep up with the deployment pace that DevOps requires. Check out the Denver Chapter of OWASP! meetup.com/denver-owasp and our annual conference www.snowfroc.com ]]>

Container adoption is on the rise across companies of every size and industry. While containerization is a new and exciting paradigm, it brings with it some of the same technical and organizational issues that security teams have always faced. This presentation will dive into a selection of these familiar issues and suggested solutions to help security teams get a better handle on containers and keep up with the deployment pace that DevOps requires. Check out the Denver Chapter of OWASP! meetup.com/denver-owasp and our annual conference www.snowfroc.com ]]>
Sat, 14 Dec 2019 07:45:42 GMT /slideshow/container-security-familiar-problems-in-new-technology-205712653/205712653 fvictory@slideshare.net(fvictory) Container security Familiar problems in new technology fvictory Container adoption is on the rise across companies of every size and industry. While containerization is a new and exciting paradigm, it brings with it some of the same technical and organizational issues that security teams have always faced. This presentation will dive into a selection of these familiar issues and suggested solutions to help security teams get a better handle on containers and keep up with the deployment pace that DevOps requires. Check out the Denver Chapter of OWASP! meetup.com/denver-owasp and our annual conference www.snowfroc.com <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/containersecurity-familiarproblemsinnewtechnology-191214074542-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Container adoption is on the rise across companies of every size and industry. While containerization is a new and exciting paradigm, it brings with it some of the same technical and organizational issues that security teams have always faced. This presentation will dive into a selection of these familiar issues and suggested solutions to help security teams get a better handle on containers and keep up with the deployment pace that DevOps requires. Check out the Denver Chapter of OWASP! meetup.com/denver-owasp and our annual conference www.snowfroc.com
Container security Familiar problems in new technology from Frank Victory
]]>
108 4 https://cdn.slidesharecdn.com/ss_thumbnails/containersecurity-familiarproblemsinnewtechnology-191214074542-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Kealy OWASP interactive_artifacts /slideshow/kealy-owasp-interactiveartifacts/146852491 kealyowaspinteractiveartifacts-190521040046
Malware on workstations is annoying enough, but when an attacker accesses your systems using remote desktop or other interactive software, you feel down right violated. The presentation includes a technical dive into forensic artifacts generated during interactive logon sessions with multiple examples from real-life investigations. The presentation covers well known artifacts including MuiCache, UserAssist, and Windows Recycler, but also explores lesser known artifacts including the RDP Bitmap Cache, the Windows 10 Timeline, and Jumplists. Speaker Bio: Phillip Kealy is the Senior Manager for Incident Response for the Mandiant Denver and Phoenix offices and provides emergency services to clients when a security breach occurs. With over 15 years of experience in both private and public sector environments, Mr. Kealy has a background in incident response, security architecture, and networking]]>

Malware on workstations is annoying enough, but when an attacker accesses your systems using remote desktop or other interactive software, you feel down right violated. The presentation includes a technical dive into forensic artifacts generated during interactive logon sessions with multiple examples from real-life investigations. The presentation covers well known artifacts including MuiCache, UserAssist, and Windows Recycler, but also explores lesser known artifacts including the RDP Bitmap Cache, the Windows 10 Timeline, and Jumplists. Speaker Bio: Phillip Kealy is the Senior Manager for Incident Response for the Mandiant Denver and Phoenix offices and provides emergency services to clients when a security breach occurs. With over 15 years of experience in both private and public sector environments, Mr. Kealy has a background in incident response, security architecture, and networking]]>
Tue, 21 May 2019 04:00:46 GMT /slideshow/kealy-owasp-interactiveartifacts/146852491 fvictory@slideshare.net(fvictory) Kealy OWASP interactive_artifacts fvictory Malware on workstations is annoying enough, but when an attacker accesses your systems using remote desktop or other interactive software, you feel down right violated. The presentation includes a technical dive into forensic artifacts generated during interactive logon sessions with multiple examples from real-life investigations. The presentation covers well known artifacts including MuiCache, UserAssist, and Windows Recycler, but also explores lesser known artifacts including the RDP Bitmap Cache, the Windows 10 Timeline, and Jumplists. Speaker Bio: Phillip Kealy is the Senior Manager for Incident Response for the Mandiant Denver and Phoenix offices and provides emergency services to clients when a security breach occurs. With over 15 years of experience in both private and public sector environments, Mr. Kealy has a background in incident response, security architecture, and networking <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/kealyowaspinteractiveartifacts-190521040046-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Malware on workstations is annoying enough, but when an attacker accesses your systems using remote desktop or other interactive software, you feel down right violated. The presentation includes a technical dive into forensic artifacts generated during interactive logon sessions with multiple examples from real-life investigations. The presentation covers well known artifacts including MuiCache, UserAssist, and Windows Recycler, but also explores lesser known artifacts including the RDP Bitmap Cache, the Windows 10 Timeline, and Jumplists. Speaker Bio: Phillip Kealy is the Senior Manager for Incident Response for the Mandiant Denver and Phoenix offices and provides emergency services to clients when a security breach occurs. With over 15 years of experience in both private and public sector environments, Mr. Kealy has a background in incident response, security architecture, and networking
Kealy OWASP interactive_artifacts from Frank Victory
]]>
1579 3 https://cdn.slidesharecdn.com/ss_thumbnails/kealyowaspinteractiveartifacts-190521040046-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Automation and open source turning the tide on the attackers /slideshow/automation-and-open-source-turning-the-tide-on-the-attackers-106950655/106950655 automationandopensource-turningthetideontheattackers-180721215114
TOPIC: Automation and Open Source, Turning the Tide on Attackers The security world is still trying figure out how to deal with the overwhelming number of security alerts and data deluge most SOCs are faced with and then turn them into intelligence that is useful and actionable. Throwing more people and tech at the problem has proven to be ineffective and costly. In this talk I walk through methods and tools (that you can actually employ) to turn the tide in your favor and create a security team that proactively deals with threats.]]>

TOPIC: Automation and Open Source, Turning the Tide on Attackers The security world is still trying figure out how to deal with the overwhelming number of security alerts and data deluge most SOCs are faced with and then turn them into intelligence that is useful and actionable. Throwing more people and tech at the problem has proven to be ineffective and costly. In this talk I walk through methods and tools (that you can actually employ) to turn the tide in your favor and create a security team that proactively deals with threats.]]>
Sat, 21 Jul 2018 21:51:14 GMT /slideshow/automation-and-open-source-turning-the-tide-on-the-attackers-106950655/106950655 fvictory@slideshare.net(fvictory) Automation and open source turning the tide on the attackers fvictory TOPIC: Automation and Open Source, Turning the Tide on Attackers The security world is still trying figure out how to deal with the overwhelming number of security alerts and data deluge most SOCs are faced with and then turn them into intelligence that is useful and actionable. Throwing more people and tech at the problem has proven to be ineffective and costly. In this talk I walk through methods and tools (that you can actually employ) to turn the tide in your favor and create a security team that proactively deals with threats. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/automationandopensource-turningthetideontheattackers-180721215114-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> TOPIC: Automation and Open Source, Turning the Tide on Attackers The security world is still trying figure out how to deal with the overwhelming number of security alerts and data deluge most SOCs are faced with and then turn them into intelligence that is useful and actionable. Throwing more people and tech at the problem has proven to be ineffective and costly. In this talk I walk through methods and tools (that you can actually employ) to turn the tide in your favor and create a security team that proactively deals with threats.
Automation and open source turning the tide on the attackers from Frank Victory
]]>
147 4 https://cdn.slidesharecdn.com/ss_thumbnails/automationandopensource-turningthetideontheattackers-180721215114-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
CNG 256 cloud computing /slideshow/cng-256-cloud-computing/82939274 cng256cloudcomputing-171129022604
As part of the CNG256 Cloud Class ]]>

As part of the CNG256 Cloud Class ]]>
Wed, 29 Nov 2017 02:26:04 GMT /slideshow/cng-256-cloud-computing/82939274 fvictory@slideshare.net(fvictory) CNG 256 cloud computing fvictory As part of the CNG256 Cloud Class <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/cng256cloudcomputing-171129022604-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> As part of the CNG256 Cloud Class
CNG 256 cloud computing from Frank Victory
]]>
53 1 https://cdn.slidesharecdn.com/ss_thumbnails/cng256cloudcomputing-171129022604-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
CNG 256 wireless wi-fi and bluetooth /slideshow/cng-256-wireless-wifi-and-bluetooth/82938977 cng256wireless-wi-fiandbluetooth-171129022034
ºÝºÝߣs for my Vulnerability Assessment Class ]]>

ºÝºÝߣs for my Vulnerability Assessment Class ]]>
Wed, 29 Nov 2017 02:20:34 GMT /slideshow/cng-256-wireless-wifi-and-bluetooth/82938977 fvictory@slideshare.net(fvictory) CNG 256 wireless wi-fi and bluetooth fvictory ºÝºÝߣs for my Vulnerability Assessment Class <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/cng256wireless-wi-fiandbluetooth-171129022034-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> ºÝºÝߣs for my Vulnerability Assessment Class
CNG 256 wireless wi-fi and bluetooth from Frank Victory
]]>
160 1 https://cdn.slidesharecdn.com/ss_thumbnails/cng256wireless-wi-fiandbluetooth-171129022034-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Differential learning SnowFROC 2017 /slideshow/differential-learning-snowfroc-2017/73266673 differentiallearning-170317223943
as presented at SnowFROC 2017 https://snowfroc.com/ by Denver Chapter of OWASP - https://www.owasp.org/index.php/Denver Learn of the different college programs around Colorado • Learn of different certifications • Decide which is better for you • Understand the challenges facing our industry • Learn of extracurricular activities like -RMCCDC and Cyber Patriots]]>

as presented at SnowFROC 2017 https://snowfroc.com/ by Denver Chapter of OWASP - https://www.owasp.org/index.php/Denver Learn of the different college programs around Colorado • Learn of different certifications • Decide which is better for you • Understand the challenges facing our industry • Learn of extracurricular activities like -RMCCDC and Cyber Patriots]]>
Fri, 17 Mar 2017 22:39:43 GMT /slideshow/differential-learning-snowfroc-2017/73266673 fvictory@slideshare.net(fvictory) Differential learning SnowFROC 2017 fvictory as presented at SnowFROC 2017 https://snowfroc.com/ by Denver Chapter of OWASP - https://www.owasp.org/index.php/Denver Learn of the different college programs around Colorado • Learn of different certifications • Decide which is better for you • Understand the challenges facing our industry • Learn of extracurricular activities like -RMCCDC and Cyber Patriots <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/differentiallearning-170317223943-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> as presented at SnowFROC 2017 https://snowfroc.com/ by Denver Chapter of OWASP - https://www.owasp.org/index.php/Denver Learn of the different college programs around Colorado • Learn of different certifications • Decide which is better for you • Understand the challenges facing our industry • Learn of extracurricular activities like -RMCCDC and Cyber Patriots
Differential learning SnowFROC 2017 from Frank Victory
]]>
188 3 https://cdn.slidesharecdn.com/ss_thumbnails/differentiallearning-170317223943-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Phishing Forensics - SnowFROC - Denver Chapter of OWASP /slideshow/phishing-forensics-snowfroc-denver-chapter-of-owasp/73266462 phishingforensics-snowfroc-170317222634
In this presentation I will cover the basic forensics of Phishing ]]>

In this presentation I will cover the basic forensics of Phishing ]]>
Fri, 17 Mar 2017 22:26:34 GMT /slideshow/phishing-forensics-snowfroc-denver-chapter-of-owasp/73266462 fvictory@slideshare.net(fvictory) Phishing Forensics - SnowFROC - Denver Chapter of OWASP fvictory In this presentation I will cover the basic forensics of Phishing <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/phishingforensics-snowfroc-170317222634-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> In this presentation I will cover the basic forensics of Phishing
Phishing Forensics - SnowFROC - Denver Chapter of OWASP from Frank Victory
]]>
239 2 https://cdn.slidesharecdn.com/ss_thumbnails/phishingforensics-snowfroc-170317222634-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Active defensecombo clean /slideshow/active-defensecombo-clean/69257440 activedefensecomboclean-161118153751
Active Defense presentation by John Strand, Black Hills Info Sec]]>

Active Defense presentation by John Strand, Black Hills Info Sec]]>
Fri, 18 Nov 2016 15:37:51 GMT /slideshow/active-defensecombo-clean/69257440 fvictory@slideshare.net(fvictory) Active defensecombo clean fvictory Active Defense presentation by John Strand, Black Hills Info Sec <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/activedefensecomboclean-161118153751-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Active Defense presentation by John Strand, Black Hills Info Sec
Active defensecombo clean from Frank Victory
]]>
337 3 https://cdn.slidesharecdn.com/ss_thumbnails/activedefensecomboclean-161118153751-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Dns security threats and solutions /slideshow/dns-security-threats-and-solutions-65179443/65179443 dnssecurity-threatsandsolutions-160820045851
Infloblox Cricket Liu slides from the Denver OWASP presentation on August 17th, 2016]]>

Infloblox Cricket Liu slides from the Denver OWASP presentation on August 17th, 2016]]>
Sat, 20 Aug 2016 04:58:51 GMT /slideshow/dns-security-threats-and-solutions-65179443/65179443 fvictory@slideshare.net(fvictory) Dns security threats and solutions fvictory Infloblox Cricket Liu slides from the Denver OWASP presentation on August 17th, 2016 <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/dnssecurity-threatsandsolutions-160820045851-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Infloblox Cricket Liu slides from the Denver OWASP presentation on August 17th, 2016
Dns security threats and solutions from Frank Victory
]]>
425 5 https://cdn.slidesharecdn.com/ss_thumbnails/dnssecurity-threatsandsolutions-160820045851-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Cng 125 – chapter 12 network policies /slideshow/cng-125-chapter-12-network-policies/52462466 cng125chapter12-networkpolicies-150906052628-lva1-app6891
for Arapahoe CC class]]>

for Arapahoe CC class]]>
Sun, 06 Sep 2015 05:26:28 GMT /slideshow/cng-125-chapter-12-network-policies/52462466 fvictory@slideshare.net(fvictory) Cng 125 – chapter 12 network policies fvictory for Arapahoe CC class <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/cng125chapter12-networkpolicies-150906052628-lva1-app6891-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> for Arapahoe CC class
Cng 125 – chapter 12 network policies from Frank Victory
]]>
385 7 https://cdn.slidesharecdn.com/ss_thumbnails/cng125chapter12-networkpolicies-150906052628-lva1-app6891-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Authentication vs authorization /slideshow/authentication-vs-authorization/28267490 authenticationvsauthorization-131114220236-phpapp01
Authentication vs Authorization. Our book covers authorization, but not authentication ]]>

Authentication vs Authorization. Our book covers authorization, but not authentication ]]>
Thu, 14 Nov 2013 22:02:36 GMT /slideshow/authentication-vs-authorization/28267490 fvictory@slideshare.net(fvictory) Authentication vs authorization fvictory Authentication vs Authorization. Our book covers authorization, but not authentication <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/authenticationvsauthorization-131114220236-phpapp01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Authentication vs Authorization. Our book covers authorization, but not authentication
Authentication vs authorization from Frank Victory
]]>
4970 4 https://cdn.slidesharecdn.com/ss_thumbnails/authenticationvsauthorization-131114220236-phpapp01-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
9.0 security (2) /slideshow/90-security-2/28267268 9-131114214804-phpapp01
This is the slides for my CompTIA A+ class ]]>

This is the slides for my CompTIA A+ class ]]>
Thu, 14 Nov 2013 21:48:04 GMT /slideshow/90-security-2/28267268 fvictory@slideshare.net(fvictory) 9.0 security (2) fvictory This is the slides for my CompTIA A+ class <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/9-131114214804-phpapp01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> This is the slides for my CompTIA A+ class
9.0 security (2) from Frank Victory
]]>
605 3 https://cdn.slidesharecdn.com/ss_thumbnails/9-131114214804-phpapp01-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Lesson 6 web based attacks /slideshow/lesson-6-web-based-attacks/27514580 lesson6webbasedattacks-131023222408-phpapp01
]]>

]]>
Wed, 23 Oct 2013 22:24:08 GMT /slideshow/lesson-6-web-based-attacks/27514580 fvictory@slideshare.net(fvictory) Lesson 6 web based attacks fvictory <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/lesson6webbasedattacks-131023222408-phpapp01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br>
Lesson 6 web based attacks from Frank Victory
]]>
1094 3 https://cdn.slidesharecdn.com/ss_thumbnails/lesson6webbasedattacks-131023222408-phpapp01-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
https://public.slidesharecdn.com/v2/images/profile-picture.png nuclearducks.com https://cdn.slidesharecdn.com/ss_thumbnails/containersecurity-familiarproblemsinnewtechnology-191214074542-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/container-security-familiar-problems-in-new-technology-205712653/205712653 Container security Fam... https://cdn.slidesharecdn.com/ss_thumbnails/kealyowaspinteractiveartifacts-190521040046-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/kealy-owasp-interactiveartifacts/146852491 Kealy OWASP interactiv... https://cdn.slidesharecdn.com/ss_thumbnails/automationandopensource-turningthetideontheattackers-180721215114-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/automation-and-open-source-turning-the-tide-on-the-attackers-106950655/106950655 Automation and open so...