ISACA Workshop

  • ISACA Workshop: Technical Versatility in Cybersecurity

    Gain an insight into the vast array of technical knowledge required by a technical Cybersecurity practitioner. Attendees will be led through four interactive online labs that cover packet analysis, malware analysis, file forensics, and browser exploitation. In this workshop, attendees will be lead through four online labs that cover packet analysis, malware analysis, file forensics, and browser exploitation.

    CPD credits: 2

    view workshops agenda

  • Wednesday, November 14th & Thursday, November 15th, 2pm - 4pm

    Location: 1C04

    Target audience

    Managerial and technical cybersecurity professionals.


    Moderator

    Dustin Brewer, Manager Cybersecurity Technical Content, ISACA


    Learning objectives

    • Packet Analysis: Utilizing Wireshark and DNS to build a narrative on a clients activities on the network
    • Malware Analysis: Conducting simple static and dynamic analysis on a nefarious binary file
    • File Forensics: Recovering information from a mobile platform
    • Browser Exploitation: Demonstrating the simplicity of browser attacks using open source software in Kali Linux

    Benefits of attending

    Attendees will gain an insight into the vast array of technical knowledge required by a technical Cybersecurity practitioner as well as the benefit of performance based hands-on training.


    Level: General


  • Want to participate?

    If you haven't got your visitor pass yet, simply register for your pass for Infosecurity North America, and tick the box on the registration form to indicate you are interested in the ISACA Workshop.

    get my pass

    If you already have your visitor pass, use our quick form to register your interest in the ISACA Workshop so we can contact you to book your place.

    I've already got my pass

  • Interested in attending?

    Online registration is now available. Register before September 30th to get early bird rates.

    Register to attend

    What else is happening?

    See what else we have in store for you at Infosecurity North America 2018.

    See more

We use cookies to operate this website and to improve its usability. Full details of what cookies are, why we use them and how you can manage them can be found by reading our Privacy & Cookies page. Please note that by using this site you are consenting to the use of cookies.