Loading…
This event has ended. Visit the official site or create your own event on Sched.
Mine for the best information security knowledge in the Black Hills of South Dakota!
Friday, October 26 • 9:00am - 3:00pm
Campfire Stories - 15 minutes each

Sign up or log in to save this to your schedule, view media, leave feedback and see who's attending!

Feedback form is now closed.
9:20am - Dakota Nelson & Derek Banks - You Can Run, But That’s Why You Can’t Hide: Analyzing Fitness App Data
9:40am - Justin Williams - PowerShell and Sysmon for Blue Team
10:00am - Jordan Drysdale & Kent Ickler - Somewhere Beyond the C....Level
10:20am - John Grigg - TradeCraft for N00bs - a refresher for everyone else!
10:40am - Emily Austin & Michael Haynes - The Ultimate Feedback Loop: Using data and pentesting to build a better security program
11:00am - Daniel Lowrie - Where’s my safe place? Building a lab to learn pen testing.
11:20am - Mike Saunders - Web App 101: Getting the lay of the land
11:40am - Jeff Man - What Are We Doing Here?
1:00pm - Ryan Wisniewski - From 0day to HeroDay - Surviving an Attack and Creating a Security Organization
1:20pm - Leo Loobeek - Protect Your Payloads With KeyServer
1:40pm - Ted Demopoulos - Infosec Rock Star: How to Accelerate Your Career Because Geek Will Only Get You So Far
2:00pm - Jordan Axtman - Network Security and Why We're Bad at It





Speakers
JA

Jordan Axtman

FRSecure
Jordan is a Network Security Analyst for FRSecure who holds a Security+ certification and is an active board member for North Dakota Infragard. He has been blue teaming for 8 years and red teaming for 3 years professionally. In his spare time, he built a home computer security lab... Read More →
avatar for Derek Banks

Derek Banks

Security Analyst, Black Hills Information Security
Derek has over 20 years of experience in the IT industry as a systems administrator for multiple operating system platforms, and monitoring and defending those systems from potential intruders. He has worked in the aerospace, defense, banking, manufacturing, and software development... Read More →
avatar for Ted Demopoulos

Ted Demopoulos

Ted Demopoulos’ professional background includes over 30 years of experience in Information Security and Business, including 25 years as an independent consultant. Ted helped start a successful information security company, was the CTO at a "textbook failure" of a software startup... Read More →
avatar for Jordan Drysdale

Jordan Drysdale

Black Hills Information Security
Jordan is one of Black Hills’ security analysts. He hails from the land of enterprise networking tech support, where stress was high and the challenges were strong. Most days, Jordan enjoys wireless research and malware sample packet data served with coffee.
JG

John Grigg

John Grigg has years of diverse experience within the Navy, the Intelligence Community, and in the corporate cyber security world with focuses on building and developing cyber defense systems, SIEM/IDS/IPS engineering, malware analysis, and cyber operations.
avatar for Kent Ickler

Kent Ickler

Black Hills Information Security
Kent is a business school Masters graduate with a focus on Network Infrastructure Design and Management. He has experience in Higher Education Management, Finance, and SMB.  His hobbies include woodworking, frisbee golf, and medieval architecture.
LL

Leo Loobeek

Protiviti
Leo Loobeek is a senior consultant with Protiviti performing offensive security operations ranging from textbook penetration tests to stealth and red team operations. With the majority in the offensive security space researching post-exploitation techniques, Leo finds his niche in... Read More →
DL

Daniel Lowrie

ITProTV
Daniel LowrieITProTV Edutainer - SecurityDaniel worked as a systems and network admin before moving into teaching. He was drawn to ITProTV because he himself is a visual learner and that’s key to ITProTV’s content. He holds certifications in A+, Network+, Linux+, CEH, and MCSA... Read More →
JM

Jeff Man

Respected Information Security expert, advisor, evangelist, and co-host on Paul’s Security Weekly. Over 35 years of experience working in all aspects of computer, network, and information security, including risk management, vulnerability analysis, compliance assessment, forensic... Read More →
DN

Dakota Nelson

BHIS
Dakota started attending information security conferences while still in high school, and has been hooked ever since. Trained as a software developer, he is particularly interested in developing novel tooling and automation to make red teams more effective. He enjoys creating and... Read More →
avatar for Mike Saunders

Mike Saunders

Red Siege
Mike's love of IT started in the third grade when he discovered he could view the code of BASIC programs on an Apple ][e.  He has held many IT and IT security positions, including developer, network and system administrator, security architect and security incident handler.  Currently... Read More →
JW

Justin Williams

Justin Williams is an Information Security professional focused on defense strategies with his current organization. During his career, he has worked in systems and server administration, .NET development, database management, and help desk operations. He spends his free time learning... Read More →
avatar for Ryan Wisniewski

Ryan Wisniewski

Ryan has helped multiple companies stabilize their infrastructure operations and launch security programs to ensure the systems stay running as expected.  He cut his teeth on the mainframe helping write the operating system and hold multiple patents with IBM.  He has recently helped... Read More →


Friday October 26, 2018 9:00am - 3:00pm MDT
Conference Room