Our October meeting will be a joint event with the Roanoke-Blacksburg Technology Council. As this is a special event, please note the special date and time and that registration is required.
We work tirelessly to bring you a variety of InfoSec content every month. We talk about blue team, identity management, SIEM, and even legal issues. But we know….we know it’s the dark arts you fancy. This month we’re teaming up with our friends at the Roanoke-Blacksburg Technology Council to bring you a double benny: deep technical content presented by local talent!
Many new RISE attendees ask how they can get started in InfoSec. Where do I start? What skills do I need. How can I learn new skills? Black Hills InfoSec posted a fantastic curated list of “30 Things to Get You Started”. It covers a variety of areas from log analysis, password cracking, hardware hacking, and more. Content includes blog posts and video to satisfy all types of learners.
It only takes initiative and a few minutes a day to sharpen your skills. RISE can help pair you with the people and tools – all you need to provide is the desire and effort!
We ran into a few issues with flight delays and technology – unfortunately our streaming and recording failed to save audio for this event so we do not have a video available. But RISE attendees pulled together to make this a great interactive meeting covering Hack the Box. If you weren’t able to make the event, keep reading for notes from the demonstrations. Special thanks to R&K Solutions for hosting this event.
One of the most asked about topics at RISE meetings is “How do I become a Red Teamer?” or “What skills do I need for penetration testing?” As the “opposition force” of IT security, Red Teams have long held the most visible and alluring jobs in the realm of InfoSec. Shrouded in mystery they are known for their advanced skills that can penetrate even the most diligent of defenses. The role requires a breadth of IT system and application knowledge but also depth in several areas to understand fundamentals of operation and how to thwart them. This sometimes poses a barrier to entry to the new InfoSec professional uncertain about how to approach the myriad skills needed for success in the role.