Training Courses:
- Deep Dive into Open-Source Intelligence
- Threat Hunting Essential Training
- AI in Cybersecurity: The Future of Red Teaming and Blue Teaming
- Threat Hunting: Network Data
- Insider Threat Hunting: Detecting and Responding to Internal Security Risks
- The AI-Driven Cybersecurity Analyst
- Security Operations (SecOps) Essentials: Detecting and Responding to Security Threats
Videos:
Recordings of prior talks, workshops, interviews, and events can be found on YouTube.
Teaching & Workshops:
- Moorpark College: Intro to Pen Testing
- Moorpark College: CEH
- Moorpark College Blue Team & Threat Hunting
- ISSA: Using NMAP for network scanning and penetration testing
- ISACA: Using NMAP for network scanning and penetration testing
- BsidesLV: Using NMAP for network scanning and penetration testing
- California State University, Northridge: Information Security & Information Assurance
- ISSA: Using Wireshark for Incident Response and Threat Hunting
- Moorpark College: CCNA R&S
- Department of Defense: Certified Ethical Hacker
- Department of Defense: Security+
- Department of Defense: CCNA R&S
- ShellCon: Wireshark for Incident Response and Threat Hunting
- DEFCON 27: Wireshark for Incident Response and Threat Hunting
- BSidesLV: Wireshark for Incident Response and Threat Hunting
- ISSA: Fundamental of Malware Analysis
- ISACA: Preparing for the Event – Best Practices for Incident Response and Root-Cause Forensics
- Cloud Security Alliance (CSA): Examining Cloud File Storage Incidents
- OWASP: Wireshark for IR & Threat Hunting
- WSC: Linux for Cybersecurity
- ISSA NAC – Wireshark for IR & Threat Hunting
- ISSA Grand Traverse – Wireshark for IR & Threat Hunting
- ISSA Chattanooga – Wireshark for IR & Threat Hunting
- CSA LA: Intro to Linux for InfoSec
- DEFCON 28: Wireshark for Incident Response & Threat Hunting
- DEFCON 28: Fundamentals of Malware Analysis
Talks:
- DEFCON28: Discovering Cloud File Storage Artifacts
- DEFCON 28: Enumerating Cloud File Storage Gems
- ISSA VC: Fundamentals of Malware Analysis & Response
- ISSA: Shooting Puny Phish in a Barrel
- ISSA Thought Leadership Series: Is Your Organization Ready for Automation?
- ISSA Thought Leadership Series: Practical Advice for the Proactive SOC: How to Escape The Vicious Cycle
- CISO Forum: Decentralized Workforce
- BSidesLV: Your tax data is being leaked
- ISACA: The costly Mistakes of Being Unprepared
- ISACA: AWS Cloud Security on the Dollar Menu
- BSides Augusta: The Costly Mistakes of Being Unprepared
- MSP Expo: The Costly Mistakes of Being Unprepared
- MSP Expo Panel: Panel: Locking up Your Data, Not Your Access is Key to Customer Success
- ToorCon: Shooting Puny Phish in a Barrel
- ToorCon: You’re not alone in your hotel room
- ToorCon: My Little AWS IR Sandbox
- RMISC: Cloud Security on the Dollar Menu
- MBA Regional Panel: The Latest In Cybersecurity
- DEFCON 27: Using Wireshark for Incident Response & Threat Hunting
- DEFCON 27: Phishing with Puny Bait
- ISACA: Counterhacking Websites
- ISACA: Continuous Cloud Security Monitoring
- AppSec California: Continuous Cloud Security Monitoring (CCSM)
- ISACA: Fundamentals of Malware Analysis & Response
- Content Protection Summit: Security Implication of ‘Work from Home’: The Year of Breaches
- OWASP 24 Hour Global Conference – Your Taxes are Still Being Leaked
- ISSA Denver – Continuous Cloud Security Monitoring for Enterprises
- ISSA Capital of Texas – Puny Phishing
Publications:
- Tripwire: State of Security: Your Taxes are Being Leaked
- Loan Vision: Your Role in Keeping Company Data Safe
- Packt (Technical Editor): CISSP in 21 Days
- Tripwire: Staving Off the Monetary Consequences of a Data Breach
- Best Company: What You Need to Know About Disney Plus Compared to Other Streaming Services
- Punycode Phishing: How to Prevent Attacks
- Men’s Journal: Is It Safe to Charge Your Phone At a Public USB Port? Here’s What Experts Say
- SANS: Learn from the Best Cyber Security Practitioners in the World
- SSLstore: The Top Cyber Security Certifications Hiring Managers Will Look For in 2020
- MESA Alliance: CPS 2019: SHIFT, Richey May Technology to Address Security Challenges
- Best Company: What You Need to Know About Disney Plus Compared to Other Streaming Services
- TechTarget: Enterprises betting on SOAR tools to fill security gaps
- Dark Reading: In the Market for a MSSP? Ask These Questions First
- M&E Daily: Important Updates to MPA Best Practices You Don’t Want To Miss
- M&E Daily: Richey May Tech: Remote Working a Daunting Security Challenge
News & Media:
