C4I CENTER SEMINAR SERIES
COHOST: CENTER FOR SECURE INFORMATION SYSTEMS (CSIS)
The IOC professional team of IOC Bucket, LLC presents
“Agile Defensive Technologies”
The ability to successfully mold with the evolving adversary will be critical in successfully defending an enterprise network. The open IOC (Indicator of Compromise) community is a global framework of public, private, and government entities that embrace the open IOC concept as a method of detection and incident response. This community can baseline the entire Industrial Base presenting a unified defensive strategy enhancing the security of a nation. IOC Bucket enables everyone the search capability, where customers can search through its reputation database, for any one of the 500+ indicators in the IOC framework returning IOC matches for download. Learn how IOCs work, how to develop them, and how to use them with your current defense mechanisms.
Our lead speaker, known as “Meathead,” has professional expertise that includes penetration testing, exploitation research, and network defensive technologies. In addition, he has 7 years’ experience in the network security field. After graduating from the United States Naval Academy, with a degree in Information Technology, Meathead was selected as a data communications and satellite transmissions Officer. He is also a published author in the field of computer security his certifications include Certified Information Systems Security Professional (CISSP), Penetration Testing and Ethical Hacking (GPEN), Certified Ethical Hacker (CEH), Security +, and Network +.
Heather Ward (GMU alumna) is currently an associate conducting assessments on applications, source code, and web assets. She has over six years of experience with DoD and one year with commercial networks. WoW has extensive knowledge in a vast number of security software tools used in the IA Community. She has a B.S. in Information Technology with a minor in Business and a graduate certificate in Project Management.
Nathan McBride (Grrimm) currently works as a CTO for Polito Inc. conducting penetration testing engagements for public and private clients. He studies a variety of languages such as Python, Java, C#, C, and the list goes on. Grrimm has over 10 years’ experience in the cybersecurity field within the DoD, federal agencies, and the public sector specializing in Unix security. He has obtained the GSEC, GPEN and Linux+ certifications. He has worked on numerous projects at various bases such as Quantico / Dahlgren, VA. He has both blue team and red team knowledge utilized by MCOTEA and HQMC C4 CY. He released his first android app last December called Binary Blackout and will continue to release security applications throughout this year.
1:30 pm - 2:30 pm
Engineering Building Room 4705