This talk will cover Linux automation with Ansible and dive into Linux hardening, focusing on kernel options, SSH, user management and services. The session aims to equip participants with practical knowledge on automating and securing Linux environments efficiently.
I would like to talk about misconceptions when it comes to OPSEC and why OnlyFans models should really know a bit about why it is not smart to pose naked with personally identifiable information showing.
This presentation covers the basics of container technology, including namespaces, control groups, chroot, and capabilities, and outlines their role in container security. It briefly touches on how misconfigurations can lead to security vulnerabilities that we can avoid. This presentation will be demo heavy.
A short lecture intended for high school students and junior college students on integration, synergy between individuals and communities, here and abroad.
In the realm of cybersecurity, the first response to a security incident is critical for containment and recovery. Quick and efficient handling can significantly reduce potential damage and downtime. This presentation will highlight key strategies for responding to security incidents and how they were handled.
The experiences of some recent cyber attacks in our country have shown that cybercriminals can be infltrated in networks for a very long time before we detect them. Most often, we detect them when it's already too late – when they have already exposed our data and/or when it is encrypted and they demand high ransom. Through the talk, we will look at how we can establish an environment for simulating attacks and how, we can use SIEM, to find the indicators that suggest activities that can be attributed to cybercriminals.
In this presentation, we will explore the operation of data diodes, their fundamental characteristics, and through a practical example, examine the functioning of a DIY data diode using optical converters. We'll delve into how these devices, designed to allow data transmission in only one direction, enhance security in sensitive information environments. By understanding the principles behind data diodes and witnessing a hands-on example of constructing one, attendees will gain valuable insights into their potential applications and how they can be integrated into broader cybersecurity strategies.