Cybersecurity! The attacks still keep coming! I’m sure everyone is painfully aware about COVID-19 as well as the “Work from home” / “Stay at home” orders. Due to current events, ECInfoSec has not been able…
Category: Presentation
Like it or not, Ready or not, you are being sent to the Devil’s Triangle of CyberSpace. Three powerful forces have been converging on US business in cyberspace over the past three years. Cybercrime has…
Special Agent Donald Todd from the Wisconsin Department of Justice discusses the current cyber threat landscape with a focus being on the threat actors targeting the United States. Included in the discussion will be the…
It is not a question of if a security breach will happen, it is just a matter of when will it happen. What should you being doing now to prepare your company for a security…
How does TCP/IP networking really work under the hood? What makes network protocol’s tick? Understanding how network technologies work is key on how to break them from a security perspective. In what ways are the…
Ethical Hacker Sam Gibson presents on how he is able to pivot around Windows Environments with ease, and gives pointers on how to prevent it from happening to you. He highlights what tactics are used…
How can you detect security problems that are happening on your network? What tools are free and open source? This presentation goes into an introduction of Network Intrusion Detection Systems (IDS) and Network Intrusion Prevention…