What is Tactical Edge?

In this exotic episode of the Exploring Information Security podcast, Ed Rojas joins me to answer the question, "What is Tactical Edge?"

Ed (@EdgarR0jas) is the creator of Tactical Edge (@Tactical3dge), which runs October 24 - 27, 2016, and PVC Security podcast co-host. For listeners of that podcast, I apologize. You've heard about about Tactical Edge extensively. However, I managed to get a little more out of him in this episode. We discuss origins and what makes this conference unique.

In this episode we discuss:

  • What is Tactical Edge
  • The origins of the conference
  • What makes it unique
  • Some of the fun activities to take part in while at the conference.

How to attend a conference

In this driven episode of the Exploring Information Security podcast, I discuss how to attend a conference with Wolfgang Goerlich, the director of security strategy at CBI.

Wolf (@jwgoerlich), recently produced an interesting PVCSec episode at CodeMash on the challenges of getting into infosec. One of the interesting notes from that podcast was learning how to attend a conference. It was such a great point that I invited Wolf back on EIS to discuss how to get the most out of attending a conference.

In this episode we discuss:

  • We define what attending a conference is
  • The individual goals of attendees
  • Attending a conference: pre-game, attending, and post-conference
  • Experiences that should be taken away from attending a conference

More Resoruces

What is the Security Culture Conference? - Part 2

In this relationship building episode of the Exploring Information Security podcast, I explore what is the Security Culture Conference in Oslo, Norway, June 14 - 15, 2015 with the creator of the Security Culture Framework Kai Roer.

Kai (@kairoer), is a speaker, trainer, consultant, and the creator of the Security Culture Framework (SCF). The framework deals with embedding a security mindset into the entire organization. It takes security awareness training to the next level by not only performing the training, but then measuring it's effectiveness. The Security Culture Conference is a result of that idea. It brings the brightest minds in security and gives them a platform to share ideas on the security culture in an organization. The conferences is June 14 - 15 in Oslo, Norway.

EIS listeners can get a discount on an admission ticket by entering promo code: PVCSEC

In part two we focus on the Security Culture Framework:

  • Why you should attend the conference
  • What was the motivation for the conference?
  • The type of content people can expect
  • The activities attendees can expect while attending the conference

What is the Security Culture Conference? - Part 1

In this relationship building episode of the Exploring Information Security podcast, I explore what is the Security Culture Conference in Oslo, Norway, June 14 - 15, 2015 with the creator of the Security Culture Framework Kai Roer.

Kai (@kairoer), is a speaker, trainer, consultant, and the creator of the Security Culture Framework (SCF). The framework deals with embedding a security mindset into the entire organization. It takes security awareness training to the next level by not only performing the training, but then measuring it's effectiveness. The Security Culture Conference is a result of that idea. It brings the brightest minds in security and gives them a platform to share ideas on the security culture in an organization. The conferences is June 14 - 15 in Oslo, Norway.

EIS listeners can get a discount on an admission ticket by entering promo code: PVCSEC

In part one we focus on the Security Culture Framework:

  • What is the Security Culture Framework
  • How it's applied to an organization
  • The four items of success
  • Metrics used to measure security culture

More Resources

How to network in information security - part 2

In this edition of the Exploring Information Security podcast, I discuss with Johnny Xmas how to network in information security.

Johnny (@J0hnnyXm4s) is a penetration tester for Redlegg and an accomplished speaker at security conferences around the United States and Iceland. One of Johnny's more recent talks is titled "That's not my RJ45 Jack" which covers, among other topics, how to interact with people. I saw this talk in April when I went to BSides Nashville and it has a lot of good information that can be applied to networking with people in general.

In part two we discuss:

  • Resources for getting better at networking
  • Some of the challenges of learning to network

How to network in information security - part 1

In this edition of the Exploring Information Security podcast, I discuss with Johnny Xmas how to network in information security.

Johnny (@J0hnnyXm4s) is a penetration tester for Redlegg and an accomplished speaker at security conferences around the United States and Iceland. One of Johnny's more recent talks is titled "That's not my RJ45 Jack" which covers, among other topics, how to interact with people. I saw this talk in April when I went to BSides Nashville and it has a lot of good information that can be applied to networking with people in general.

In part one we discuss:

  • What is networking?
  • How can Twitter be leverage to strengthen and improve your network?

What is CircleCityCon?

In the ninth edition of the Exploring Information security (EIS) podcast, I talk with Grap3 Ap3 and Dr. BearSec about the security conference CircleCityCon.

Both Grap3 Ap3 and Dr. BearSec are organizers for the wonderful event. In this episode they talk about the origins of the conference, some of the challenges of putting the conference together, the atmosphere of the conference, and what attendees can expect for next year. Follow Grap3 Ap3 (@grap3_ap3) and DrBearSec (@drbearsec) and of course the conference (@CircleCityCon) on Twitter.

In this interview we cover:

  • What is CircleCityCon?
  • How did it get started?
  • The challenges of putting the conference together
  • What to look forward to in 2016

What is BSides Augusta?

In this episode of the Exploring Information Security (EIS) podcast, I talk with one of the organizers of BSides Augusta, Doug Burks.

2015 will be the third year for the security conference and it looks to be even bigger and better than last year. This year the conference features a two blue team tracks, a red team track, CTF challenge, a lock pick village, and much more.  Doug also talked about his own conference that leads into BSides Augusta, the Security Onion conference. BSides Augusta is sold out, but the Security Onion conference still has tickets available.

Security Onion Conference - September 11, 2015 - Tickets available

BSides Augusta - September 12, 2015 - SOLD OUT with waiting list

In this interview Doug discusses:

  • What is BSides Augusta
  • How the security conference got started
  • The blue team atmosphere
  • The Security Onion conference

How to organize an information security conference

Originally posted on July 2, 2015.

In the second edition of the Exploring Information Podcast (EIS) my infosec cohort Adam Twitty and I talk to Ed Rojas about how to put together an information security conference.

Ed Rojas (@EdgarR0jas) is a Master Consultant for HP Enterprise Security and the creator of Security Zone information security conference in Columbia and the organizer of the BSides Nashville security conference. I had the pleasure of attending BSides Nashville this year and got the opportunity to snap a few pictures. Ed was a very accommodating and passionate host for the event. 

In this interview Ed talks about:

  • The first step to organizing a security conference
  • The time and effort it requires
  • How to pick the right date
  • The biggest challenges putting together an event
  • Some of the mistakes that were made
  • Where to host the event