Conferences News (14 Posts)

1 2 . Last - Previous >>

New Download section with Presentations

A new section has been added to the Download page where you can now find a link to all the public presentations ELYSIUMSECURITY has been giving.
Those presentations cover a wide range of Cyber Security topics and we hope you find them useful.
They are classified as public and you are welcome to re-use them or part of their content, we just ask if you could please reference the source of this material if you do so.

...
>>[READ MORE]

FREE Cyber Security Event - 3rd Episode!

Special guest announced for the next MU.SCL event!
Dr Kaleem Usmani from CERT MU will be presenting on Incident Handling.
You can register now HERE !

This FREE to attend meeting will take place on the Thursday 26th of April 2018, from 6pm to 8pm, at the Flying Dodo Brewing Company in Bagatelle, Mauritius.

We are working on a streaming option for those of you who cannot physically attend.

  • Talk1 - Social Media as a Cyber Weapon (Sylvain Martinez - ELYSIUMSECURITY)
  • Talk2 - Incident Handling in Organisations (Dr Kaleem Usmani - CERT MU)

    The first talk will present how information shared on social media platforms can easily be obtained and used against you. We will also take a look at recent world events and how this data can be aggregated and why this is dangerous.

    The second talk will discuss incident handling in t
  • ...
    >>[READ MORE]

    MU.SCL - Second Meeting for the Mauritius Cyber Security Club

    Following the success of last month event, ELYSIUMSECURITY is happy to confirm the second meeting for the Mauritius Cyber Security Club: MU.SCL
    This FREE to attend meeting will take place at the Flying Dodo Brewing Company in Bagatelle.

    In this second edition, the following two talks will be presented:

  • Talk1 - Introduction to ISO27001, GDPR, FFIEC
  • Talk2 - How to setup an IDS at home

  • The first talk will provide a high level overview of important Cyber Security regulations, standards and best practices relevant to most industries nowadays. At the end of the presentation, attendees should be able to take away key information and follow-up with any questions/worries/debate they may have on the subject.

    The second talk will be more technical and focus on how everyone can install an Intrusion Detection System in their home using Open Source software. This talk will hig...
    >>[READ MORE]

    MU.SCL - The Birth of a Cyber Security Club in Mauritius

    ElysiumSecurity is proud to announce the creation of a Cyber Security Club in Mauritius: MU.SCLE
    This Club has been created to help Mauritian IT Professionals to share information and learn about Cyber Security through an Open Platform and the creation of a Cyber Security Community.

    It is a free monthly event open to everyone , usually two talks of 45 minutes each with a mix of technical and non technical talks. Attendees will be able to ask questions, learn and apply practical knowledge as well as do some professional networking.

    The first event will take place on the 15th of February 2018, at 18:00 at the Flying Dodo in Bagatelle.
    Please REGISTER HERE so we can have an idea on how many people to expect.

    We hope to see you there, for what should be a fun, friendly and casual event whe...
    >>[READ MORE]


    FIRST Technical Colloquium 2017 in Mauritius - Our presentation on IDS

    ElysiumSecurity was invited by the Mauritian National Computer Security Incident Response Team (CERT-MU) to present at the FIRST Technical Colloquium 2017 which took place on the 30th of November 2017.
    We gave a presentation on how IDS can be used both as a traditional defensive tool and also a more original offensive tool.

    The aim of this presentation was to introduce the attendees of the various free and Open Source IDS offerings and to highlight the benefits and key components of a successful IDS implementation.
    It was also emphasised on how easy it is to get started with an IDS both from a software and hardware point of view.

    Below is a link to our presentation. If you want a more complete narrative please fee free to contact us for more information.
    We would like to thanks the Mauritian National Computer Board ...
    >>[READ MORE]


    How to build a Red Team and Why?

    I recently gave a talk at the Rant Forum in London on the topic of "RedTeam, why this is more than a buzz word?". It was an interesting experience and whilst different from traditional security events, as the crowd can and will interrupt you at any time, it was very enjoyable.
    Many attendees asked if I could produce some "slides" after the talk. As no slides were used, below is a collection of notes from wich the talk was based on.

    In this post we will explain what RedTeam is, how does it fit with other similar security services and what advantages does it bring to an organisation. We will also look into what works? what doesn’t? And where is this “new” type of service going?
    1. DEFINITION
    A Red Team is part of a trio of services which increases in sophistication: Vulnerability Assessment, Penetration Testing and then Red Teaming. We will d...
    >>[READ MORE]


    RANT FORUM - Red Team Recipes Presentation

    I will be giving a talk tomorrow evening, the 28th of November at around 6pm, in London at the Risk and Network Threat (RANT) Forum .

    The topic is:
    Why RedTeam is more than just a buzz word? What works? What doesn't? And where is this "new" type of service might be going? All those questions answered by someone who is actually delivering Red Team activities.

    Registration is free, you get free drinks and food... plus you get to hear me talk, so what is not to like?! :)

    You can register HERE

    The RANT Forum is quite different from your typical free security briefing, for a start it is not a sales forum. However, the company behind it is a recruitment agency, so they are still interested in taping the UK Security professional community!
    ...
    >>[READ MORE]


    BlackHat Mobile Security Summit - London 2015

    In June 2015 I attended the Blackhat Mobile Security Summit in London, a 2 days event filled with talks from various researchers and security professionals, there was a 3rd day in the form of a workshop for anyone attending the Interop London hosting event
    Blackhat is historically a USA based event with its main conference taking place in Las Vegas every year, lately they started to host similar (but smaller) conferences around the world such as in Singapore and Amsterdam (which I blogged about last year here).

    This London edition was definitely on the "smaller" side and this actually had a few advantages:

  • You could attend all the sessions as none were run in parallel
  • It was easier to mingle among fellow participants and speakers
  • There was less "walking"! :)

  • The quali...
    >>[READ MORE]

    BlackHat Europe 2014 – Some Highlights

    Hacking conferences are a great way to learn he latest hacking techniques and more underground ways of thinking on IT Security. They complement nicely more corporate Security Training courses such as the ones offered by SANS.

    They tend to be more chaotic, the talks are not as polished, some of the techniques discussed will have limited effect in the real world and connecting to the event WIFI is asking for trouble.
    On the other hand, the atmosphere is buzzing with brain activities, convictions (right or wrong!), passion and cutting edge topics. If you can follow the rythme and embrace the moment then you will get out of this type of conferences energised and full of new ideas!

    This year I attended the “Nuit du Hack” in France which runs other 24h, literally. You get some talks during the day, there is only 1 track so you get to watch/listen to all the talks. And during the night there is a traditional Capture The ...
    >>[READ MORE]


    SANS 575: Mobile Device Ethical Hacking Review

    In the last two years I have been to a few SANS training courses:

    508: Advanced Forensic
    617: Wireless Ethical Hacking
    660: Advance PenTest

    Last week I attended the SANS 575: Mobile Ethical Hacking course,
    it is a nice complement to the 617 Wireless course and although there is some overlaps, especially around WIFI vector attacks, most of the content is different; and when it is not, you get another perspective for those attacks.

    The course gave an overview of the different architectures surrounding the Android, iOS, Blackberry and Windows Mobile phones, how system and app updates...
    >>[READ MORE]