New Monthly Webinars

We are pleased to announce that registration for the October and November HTCIA member’s only webinars are open. Our webinars have been quite successful and I think we can continue to attract lots of members. Remember, you can earn continuing education credits (CPEs) for these sessions.

Make Honeypots Work For You With Mirage with Mick Douglas

On October 29, 2014 at 10:00am PST join our speaker Michael Douglas, Instructor for SANS while he talks about Mirage. Honeypots are a great way for a defender to not only see what the attackers are doing, but to quickly, and automatically, deploy countermeasures. Does your business cringe when you talk about auto shun on the firewall? Mirage takes honeypots to the next level, allowing enterprise wide response, attacker frustration, and most importantly… automated graduated response. Attend this presentation and add another tool to your defensive weapons locker!

Even when his job title indicated otherwise, Mick Douglas has been doing information security work for over ten years. He has received a bachelor’s degree in Communications from the Ohio State University and holds the CISSP, GPEN, GCUX, GWEB, and GSNA certifications. Prior to joining Black Hills InfoSec, Mick has done computer and network security in a variety of industries including: academia, telecommunications, banking, and insurance. He is always excited for the opportunity to share with others so they do not have to learn the hard way! When he’s not “geeking out” you’ll likely find him indulging in one of his numerous hobbies; photography, scuba diving, or hanging around in the great outdoors.

To register for this webinar visit –


 Enterprise Security Monitoring: Comprehensive Intel-Driven Detection with David Bianco

On November 26, 2014 at 10:00am PST join our host David Bianco, well known DFIR expert from Mandiant. This is a great time to be in the detection field! More and more organizations are waking up to the fact that an effective detection program is a “must-have” to protect themselves against sophisticated threats. This creates a market for high-quality threat intelligence, and many groups are stepping up to meet this demand. With very little effort, your organization can connect to any number of quality data feeds, both commercial and free. However, this can lead to it’s own problems: almost no one is using threat intel effectively! Now that you’re drowning in a sea of intel, how do you make sense of it all and ensure that you are making maximum use of this information to provide the best possible detection strategies for your organization? When you fully leverage your knowledge of an adversary to rapidly detect and respond to their attacks, you deny them access to their tradecraft. You become a harder target and they feel the burn! David developed the ESM method it’s fundamental model, the “Pyramid of Pain”, while creating and running the worldwide detection program at a Fortune 5 company. Learn how to apply ESM in your org to bring the fight to the attackers!

Before coming to work as a DFIR subject matter expert at Mandiant, David spent five years helping to build an intel-driven detection & response program for a Fortune 5 company. He set detection strategies for a network of nearly 500 NSM sensors in over 160 countries and led response efforts for some of the company’s the most critical incidents, mainly involving targeted attacks. He stays active in the community, speaking and writing on the subjects of Incident Detection & Response and Threat Intelligence.

To register for this webinar visit –

Leave a reply