Come see John Nye the Hacking Guy (CynergisTek’s Sr. Penetration Tester John Nye) demonstrate the latest tools and techniques that are being used by hackers to gain access to sensitive data. He will also discuss how to keep data safe and the steps that should be taken to improve security and decrease the risks.
Demo 1: Wireless Worries
Today’s technology has been striving for a single purpose for some time: freedom from wires. In that pursuit our devices – whether they be a phone, computer, watch, or even BlueTooth headphones – have become more and more reliant on wireless signals. These wireless signals we rely on vary in their safety and types. The most common is WiFi, which we use daily at work, home, and sometimes out and about. Unfortunately, there is not nearly the amount of security that our general confidence suggests. Wireless networks are a great method for attackers to gain critical information, access to systems, and even the keys to the kingdom if they play their cards right.
In this demo, we will review some of the wireless attacks that could be used against you and your organizations using some of the latest tools available.
Demo 2: Mobile Devices and Portable Hacks
It is very easy to limit the category of mobile devices to our mobile phones. While the tiny computers we carry with us everywhere are mobile devices and have some serious security and safety implications, they are not alone in this category. Laptops, tablets, hybrid devices, smart watches, and maybe even your car are all also mobile devices. Traditionally (a funny term to use when discussing IT), we have relied on perimeter security to keep our devices safe. However, we no longer live in an age of borders.
This demo will demonstrate some of the techniques and devices that attackers can use to compromise mobile devices while they are out of the border and how they can be used to bring back the attacks.
Demo 3: The Problems with Wetware
Wetware, better known as people or users, are not only the sole reason that we have IT, they are the biggest security issue there is. People, even the best and the brightest, make mistakes. These mistakes can cost us, and our organizations, dearly. People fall for scams because they want to help. Phishing and social engineering attacks work so well because of our human nature and desire to be helpful.
In this demo, we will discuss some of the tactics that attackers use to exploit the wetware that your organization relies upon. We will also discuss a few ways to help users be better prepared for scams and attacks and how we can test their response to simulated attacks.
|Monday, February 20th
||11:30am – 12:00pm
||2:30 – 3:00pm
||4:30 – 5:00pm
|Tuesday, February 21st
||2:00 – 2:30pm
||4:00 – 4:30pm
||11:00 – 11:30am
|Wednesday, February 22nd
||10:30 – 11:00am