Deep Dark Web Seminar

Starts:  Jul 11, 2019 8:00 AM (ET)
Ends:  Jul 12, 2019 4:00 PM (ET)

DETAILS

Cyber threat landscape is greater than surface web (google, yahoo, bing, etc.). Over 96% of the web is hidden behind gates. Breached data often ends up in data dumps on these hidden corners, sold, traded, or offered for free. These decisions are made based on adversarial motivating factors. As such, it is important for IT auditors, cyber operations professionals, Open Source Intelligence (OSINT analysts, and security managers to understand the real threats. 

The intent of this training seminar on the Deep Dark Web is to provide vigilance and hands-on experience through demos with the deep and dark web using multiple “gateways.” The class will challenge auditors, IT pros, cyber analysts, and managers to think from the adversarial perspective. As we all know, “paper security” has not solved cyber issues; therefore, this is a great opportunity for the industry to learn about the real risks so that they can best mitigate them.

Date and Time

July 11-12, 2019, 8:00 am - 4:00 pm *Check-in begins at 8:00 am*
Each student will be provided breakfast and lunch for each day of the seminar.

Location

George Mason University - Arlington Campus
3351 Fairfax Drive, Founders Hall - Room 120, Arlington, Virginia, 22201, USA

Who Should Attend

This seminar is for: 

  • Cyber operations professionals to learn about the real threat landscape and how to proactively identify and perform threat remediation. 
  • IT Auditors to gain practical understanding, application, analysis, and proper probing, decision making during audits. This is for IT auditors that want more hands-on experience than exercises based solely on theory. 
  • Managers to get a broader awareness on what happens when organizations/people are targeted or hacked. 

Learning Objectives

Attendees will achieve the following learning outcomes during this two-day seminar:

  • Learn and understand why more than 90% of the web is hidden and ways to discover what is hidden. 
  • Learn and understand what the deep and dark web concepts based on real life experience using as part of labs. There is way more than the “Tor network.”
  • Learn and understand why the deep and dark web exists and what it's used for. 
  • Learn and understand attribution management for anonymity purposes. 
  • Learn to develop reports based on facts and be the one voice that is different. 

AGENDA

  • Learn and understand why more than 90% of the web is hidden and ways to discover what is hidden. 
  • Learn and understand what the deep and dark web concepts based on real life experience using as part of labs. There is way more than the “Tor network.”
  • Learn and understand why the deep and dark web exists and what it's used for. 
  • Learn and understand attribution management for anonymity purposes. 
  • Learn to develop reports based on facts and be the one voice that is different. 

Practical Exercises

The class will have two (2) hands-on exercises for attendees to engage either individually or in small teams. These exercises are setup to provide real life experience analyzing complex problems by doing hands-on research, analyzing findings, and reporting back to the instructors. This is an opportunity for cyber professionals to do a deep dive on concepts deemed controversial but extremely important. The intent of these exercises is to teach real research, think critically, and report based on facts.

Final Product/Presentation 

Participants are required to develop a final presentation for the class about concepts learned during the seminar. Instructors will walk through all exercises in detail, challenge participants to think in “nontraditional” ways, and coach to ensure assignments are completed. This is a demanding course, attendance, participation, and being present is vital for successful completion.

Technology Requirements 

Participants are required to bring their own laptops with at least 8GB RAM, 50GB hard disk, and virtualization enabled to use for the hands-on portions of the exercises.  NOTE: Personal laptops only with admin access. Client and corporate devices are not encouraged for use in this course nor will they be allowed. 

MEET THE PRESENTER

babur

Babur Kohy

Deep and Dark Web Behavioral Scientist; Outstanding Adjunct Professor of The Year in Cybersecurity, Northern VA Regions

Babur Kohy is an accomplished Cyber Security educator, researcher, and dedicated volunteer. He currently serves as an Adjunct Professor of Cyber Security, at the Northern Virginia Community College (NVCC) and teaches out of the NOVA Loudoun Campus, Reston Technology Center. His passion resides in educating students on secure human behavior, engaging them in Cyber Security issues early on and connecting industry to academia through conferences, workshops, and professional networking. Outside of his academic career, Babur serves as a Cyber Security Advisor to public/private sectors, volunteers with multiple non-profit organizations, and is the founder of CyTalks, a platform for the members of academia, community, and industry to discuss Cyber Security matters. His research includes secure human behaviors, dark web, emerging technologies, and organizational cyber resilience, fake news and intelligence manipulation. He has achieved Master’s Degree in Cyber Security, Bachelor’s Degree in Business, and is currently pursuing Doctoral Degree in Cyber Security.

warren

Warren Holston

Deep & Dark Web Expert; Author, Beware The Predator

As a career Technical Operations Officer, Mr. Warren Holston has worked throughout the Intelligence Community, Department of Defense, and defense industry for more than 30 years. He has served as a U.S. Navy Explosive Ordnance Disposal Diver, a collection officer and senior manager in the Central Intelligence Agency, and a Subject Matter Expert for the Department of Defense U.S. Special Operations Command. Mr. Holston has managed and conducted counterterrorism, covert action, and technical collection operations worldwide and is recognized as having contributed significantly to the national security of the United States of America. He was awarded the CIA’s Intelligence Commendation Medal for “conceiving of, and implementing, a clandestine sensor operation against a high priority denied area intelligence target” and the Distinguished Career Intelligence Medal for “superior performance in the conduct of clandestine operations in the CIA.” Mr. Holston is the author of the personal security book Beware the Predator and lectures extensively on the application of personal tradecraft in a digital world. He is also the author of the poetic artwork of Peace in Darkness, A Study of the Darkness in Humanity.

ADDITIONAL DETAILS

Special Instructions

All Students: Please arrive at 8:00am the first day for registration

ISACA Members from Other Chapters: You will need to bring your ISACA Membership Card to the event to verify your ISACA Membership.

Presentations

If permission is granted from the instructor, a link to the presentation(s) will be made available along with the CPE certificate.

Requests for Assistance

If you require assistance for an audio, visual, or other disability, please contact the event organizers, to discuss your needs, as soon as possible.  We need as much advance notice as possible to determine whether requests can be accommodated. Thank You.

Cancellation

If you are unable to attend an event, you can cancel your registration. To receive a refund, all cancellations must be received a week in advance of the seminar start date. A $15 cancellation fee is charged.

To cancel, access your payment confirmation e-mail message and click the UNREGISTER link.

 

CPE

Earn up to 14 Continuing Professional Education (CPE) credits in the area of Specialized Knowledge. The ISACA® GWDC is registered with the National Association of State Boards of Accountancy (NASBA) as a sponsor of continuing professional education on the National Registry of CPE Sponsors. State boards of accountancy have final authority on the acceptance of individual courses for CPE credit. Complaints regarding registered sponsors may be submitted to the National Registry of CPE Sponsors through its website: http://www.learningmarket.org.

CPE Distribution and Evaluation Survey

CPE's will be distributed via e-mail along with the event evaluation survey after the completion of the event. Attendees must be present the full day to receive full CPE credit.

CPE-Related Details

  • Prerequisites and Advance Preparation: None
  • Program Knowledge Level: None
  • Delivery Method: Classroom Live / In person

Details

Start:
July 11 @ 8:00 am
End:
July 12 @ 4:00 pm
Cost:
GWDC Member Fee: $650.00, Other ISACA Chapter Member: $700.00, Non-Member: $780.00
Event Category:
Event Tags:
, , , , 
Website:
CLICK TO REGISTER »

Venue

George Mason University, Founder’s Hall – Room 120
3351 Fairfax Drive 
Arlington, VA 22201 United States
+ Google Map

Location

George Mason University
3351 Fairfax Drive
Founder's Hall Room 120
Arlington, VA 22201

Contact