a free online event

Cyber
Security
Day

October 17, 2024

Powered by

Microsoft
CertNexus
MILE

Join Us for CyberSecurity Day: Strengthen Your Digital Defenses

Prepare to elevate your cybersecurity knowledge at CyberSecurity Day on 17th October, where industry experts will dive deep into the latest threats and defenses. This event is your chance to learn practical, cutting-edge strategies to protect your organization from evolving cyber threats. The event is most beneficial for CIOs, IT directors and managers, IT security managers and anyone interested in CyberSecurity.

Get insights on:

  • Infiltration Tactics: Discover how attackers exploit home routers with simple commands, compromising entire networks with ease.
  • Active Directory Security: Learn about insidious persistence methods and how to outsmart attackers trying to hide within your systems.
  • Encryption Vulnerabilities: Witness a real-time demonstration of how BitLocker, even with TPM, can be compromised without a PIN.

Stay ahead of cyber threats and fortify your security posture with actionable knowledge from top cybersecurity professionals.

CyberSecurity sessions brought to you by the LLPA network

Where SHELL you go, and with whom…
By WILLIAM ISCHANOE

We’ll show how attackers easily infiltrated our entire household through home routers with just a few simple characters. We don’t download anything on our PC, we don’t click on anything—just load a webpage, and our new and supposedly secure router surrenders its SHELL to the net. We’ll practically explain the connection between Command execution, named pipes, Shell, pivoting, and how attackers used this cocktail to navigate through our homes.

Insidious Persistence in Active Directory
By LUBOMÍR OŠMERA

The attacker has successfully gained initial access to the environment and is even lucky enough to obtain a privileged identity. But time is against him! He has only seconds left before detection components discover him, thwart his efforts, and permanently close the doors to the company. He must find a reliable way to hide and persist in the environment until he’s ready to take his next step or complete his plan. The dice are cast! The hide-and-seek game between attacker and defender begins. Let’s explore some insidious persistence methods an attacker might use against your Active Directory because those who are prepared won’t be caught off guard.

BitLocker plus TPM minus PIN
By ONDŘEJ ŠEVEČEK

How much (non)sense does it make to operate BitLocker encryption on system partitions with keys stored in TPM, without requiring a PIN at startup? We’ll demonstrate a real offline attack on a computer that still has both TPM and an encrypted disk.

Speakers

WILLIAM ISCHANOE

Expert Consultant and Instructor. He enjoys delving into anything that someone forgot to encrypt, Windows components from a security perspective, authentication, PKI, IPSec, and WiFi.

Certifications
MCSE, MCSA, MCT, MCTS, MCITP, CEI, CEH, ECSA

LUBOMÍR OŠMERA

Instructor, consultant, and architect in Microsoft technologies. His primary focus is on the security of the Microsoft ecosystem (both cloud and on-premises). He implements security technologies for both small companies and international corporations.

Certifications
MCSE, MCT, CEH, CND

ONDŘEJ ŠEVEČEK

Expert Consultant and Instructor. Specializes in Microsoft technologies with a focus on security, authentication and identity management, cryptography, PKI, and forensic investigations in enterprise environments. He programs in C++, C#, JavaScript, and PowerShell.

Certifications
CISA, MCSM, CEH, CHFI

Request your free access to this event