BSidesDFW2023  --  Cyber Threat Defense Program  --  Afternoon

Registrations are closed

Looks like we are sold out.

BSidesDFW2023 -- Cyber Threat Defense Program -- Afternoon

Attendees will learn the tactics, techniques, and procedures to leverage and minimize the threat, information collection, and exploitations.

By BSidesDFW

Date and time

Saturday, November 4, 2023 · 1:30 - 4:30pm CDT

Location

UNT Discovery Park

3940 North Elm Street Denton, TX 76207

About this event

Title: Cyber Threat Defense Program

Description: Dark Angel Contracting provides a comprehensive Cyber Threat Defense Training Program, designed for corporations, the Department of Defense (DoD), federal and local governments, and high-net-worth individuals. We empower organizations, officers, executives, and private individuals with the tools necessary to minimize their digital footprint, enhance their cybersecurity posture, and protect sensitive and valuable Information.

Led by our deeply experienced civilian and DoD professionals, this hands-on instructor-taught training series is the perfect opportunity to comprehensively learn the operational threats in today's ever evolving digital landscape. Drawing from the knowledge and experiences of offensive and defensive Cyber Operators from multi-industry verticals as well as DoD, attendees will be walked through the "Cyber Hacking Kill Chain". Utilizing real world scenarios, attendees will learn how to implement cybersecurity techniques to mitigate nefarious threat actors from accessing sensitive information or conducting malicious attacks. Successful completion of the Cyber Threat Defense Program will empower attendees with the ability to minimize their digital footprint and thereby reduce potential cyber intrusions.

Ubiquitous cyber threat identification and capability understanding.

Signals and human intelligence collection modalities with operator protection methodologies.

Technical hands-on device, network, software, and online best practice development.

Educate attendees on the core concepts of how technology operates today

Attendees will learn the tactics, techniques, and procedures to leverage and minimize the threat, information collection, and exploitations.

Enable attendees with the ability to identify, install, configure, and maintain hardened computer and internet based systems, software, and applications.

Duration: 3 hours

Prerequisites: None

Audience: Everyone

Organized by

Sales Ended