Video recordings of CyberCamp reports. Understanding network security issues

Colossus with feet of clay, or why networks are imperfect and how attackers use it / Sergey Pavlenko, Head of Design and Implementation Department, Information Security Center, Jet Infosystems

About pentest: network attacks that no one agrees on / Evgeniy Artemyev, Penetration Testing Specialist, Jet Infosystems

From flat networks to zero trust. Secure Network Architecture: Concepts and Frameworks / Stanislav Kalabin, Head of Network Security Group, Jet Infosystems

Network traffic analysis profit for SOC / Alexey Lednev, Head of Attack Detection, Security Expert Center, Positive Technologies (PT ESC)

Web Authentication Password Passing Problem / Alexander Zherdev, virus analyst, Group-IB

How to properly build DDoS protection for your Enterprise network with many public services / Gleb Khokhlov, Product Director, MITIGATOR

To watch these performances, scroll down.

Colossus with feet of clay, or why networks are imperfect and how attackers use it / Sergey Pavlenko, Head of Design and Implementation Department, Information Security Center, Jet Infosystems

In the report: what problems are inherent in the design of the TCP / IP protocol stack; why networks are insecure and require protection; the most common scenarios for intruders to penetrate the perimeter of an organization; what level can be done with modern networks to improve their security, and how to effectively counter attackers.

About pentest: network attacks that no one agrees on / Evgeniy Artemyev, Penetration Testing Specialist, Jet Infosystems

In the report: features of internal network penetration testing; how easy it is to bypass 802.1x on an internal pentest; which protection methods prevent an attack on the LLMNR, mDNS and NBT-NS protocols, and which ones prevent EIGRP and OSPF 32.

From flat networks to zero trust. Secure Network Architecture: Concepts and Frameworks / Stanislav Kalabin, Head of Network Security Group, Jet Infosystems

In the report: what is the concept of Zero Trust, why is it attractive, what is the complexity of its implementation and how modern approaches help to solve the problems of Zero Trust; whether it is possible to implement this model in practice, or it can only be aspired to in theory.

Network traffic analysis profit for SOC / Alexey Lednev, Head of Attack Detection, Security Expert Center, Positive Technologies (PT ESC)

In the report: what benefits can an analyst of monitoring systems derive from network traffic; basic tools for analyzing network traffic, the pros and cons of analysis at the perimeter and within the network.

Web Authentication Password Passing Problem / Alexander Zherdev, virus analyst, Group-IB

In the report: problems of HTTP and HTTPS, because of what they arise, methods and methods of password protection, protocols for its transmission.

How to properly build DDoS protection for your Enterprise network with many public services / Gleb Khokhlov, Product Director, MITIGATOR

In the report: the theory of protection against DdoS attacks, myths and misconceptions about DoS and DDoS, the process of detecting and suppressing attacks, building in-depth protection with interaction between echelons, schemes for introducing MITIGATOR into the network.

CyberCamp is a project for the exchange of practical experience on the topic of cybersecurity, so all our events are accompanied by free practice on the cyberlearning platform. At the large annual CyberCamp, we prepare team cyber exercises, and for the CyberCamp MeetUp format, individual ones. This time, participants searched for answers in a network traffic dump, studied the virtual infrastructure network, and conducted an investigation using a traffic analysis system.

We publish end-to-end winner rating cyber exercises of the second CyberCamp meetup. The next meetup will be held on April 20, the topic will be DevSecOps. It will be interesting! Registration will open April 5th.

Similar Posts

Leave a Reply

Your email address will not be published. Required fields are marked *