Loading Events

« All Events

  • This event has passed.

Using Deception to Stop Ransomware in its Tracks! 4 Hour Training $25.00!

July 16 @ 12:30 pm - 4:30 pm PDT


Limited virtual spots available! Renown Security Expert: Kevin Hardwell Cardwell Engineering Solutions International

Description: No product will make us secure, estimates are since 2019 more than $100 Billion a year is spent on cyber security products, yet we had many data breaches, we are losing the battle, so it is time for another approach. Organizations need to start with the foundations of defense in preparation for deploying deception and taking control of your networks.
The recent wave of ransomware attacks against Pipeline companies and others shows that we have to look at the fundamentals. There is no reason in a modern network for a ransomware attack to take out the entire enterprise network, at the most it can take out a machine and even an entire network segment, but it should never take out the enterprise, the only way this can happen is poor network design!
We have to rethink how we do security; this will take a concentrated effort at using the proven methods of segmentation and isolation.
No matter how much “security” is put in place, the reality is we are running our data on protocols that were developed many years ago when the Internet was small and as a result of this, these protocols are based on the principle of trust; therefore, to truly defend we need to modify these protocols. The concept is, if the protocols can be changed then the result of this will be frustration and confusion for the adversary.
In this webinar defensive concepts will be explored and an introduction to the power of using deception at different layers of the network. The attacker depends on information that is gathered during their surveillance, and with deception we change the network at layer 2-4 and the result of this is the attacker’s collected data is no longer valid and useless for them, this requires the attacker to start the information gathering process over again. These concepts change the game and puts the defender in control! The concepts have been deployed at Capture the Flag events and frustrated and confused the hackers for hours!
Forever you have heard that the hackers are in control and they only need to find one-way in. This webinar will show you how to flip that model and we only need one packet to identify the attacker and prepare our response strategy. We are in control of our networks because we have designed it and this webinar will show you how to take advantage of that.


Speaker Bio:  Kevin Cardwell spent 22 years in the U.S. Navy. He has worked as both software and systems engineer on a variety of Department of Defense projects and early on was chosen as a member of the project to bring Internet access to ships at sea. Following this highly successful project he was selected to head the team that built a Network Operations and Security Center (NOSC) that provided services to the commands ashore and ships at sea in the Norwegian Sea and Atlantic Ocean. He served as the Leading Chief of Information Security at the NOSC for six years. While there he created a Strategy and Training plan for the development of an expert team that took personnel with little or no experience and built them into expert team members for manning of the NOSC.
He is an Instructor, Curriculum Developer, Technical Editor and Author for Computer Forensics, and Hacking courses. He is the author of the EC Council Certified Penetration Testing Professional, Ethical Hacking Core Skills, Advanced Penetration Testing and ICS/SCADA Security courses. He has presented at the Blackhat USA, Hacker Halted, ISSA and TakeDownCon conferences as well as many others. He has chaired the Cybercrime and Cyberdefense Summit in Oman and was Executive Chairman of the Oil and Gas Cyberdefense Summit. He is author Defense and Deception: Confuse and Frustrate the Hackers, Building Virtual Pentesting Labs for Advanced Penetration Testing 1st and 2nd edition, Advanced Penetration Testing for Highly Secured Environments 2nd Edition and Backtrack: Testing Wireless Network Security. He holds a BS in Computer Science from National University in California and a MS in Software Engineering from the Southern Methodist University (SMU) in Texas. He developed the Strategy and Training Development Plan for the first Government CERT in the country of Oman that is rated as the top CERT for the Middle East. He serves as a professional training consultant to the Oman Information Technology Authority and developed the team to man the first Commercial Security Operations Center in the country of Oman. He has worked extensively with banks and financial institutions throughout the Middle East, Africa, Europe and the UK in the planning of a robust and secure architecture and implementing requirements to meet compliance. He currently provides consultancy to Commercial companies. He provides training and consultancy to the Oman CERT and the SOC team in monitoring and incident identification of intrusions and incidents within the Gulf region. He holds the CEH, ECSA. LPT Master, APT, CTIA , CSA CHFI, ECIH. CPENT as well as other certifications. He is currently the President and one of the founders of Cyber2Labs LLC and Cardwell Engineering Solutions International

Major IT Projects – Kevin Cardwell Lead/Managed
Internet Access to U.S. Navy warships
Network Operations and Security Center – European Headquarters
Conversion of Dead Reckoning Tracer to a Fully Digital System
Systems Engineer for the Digitization of Periscope RADAR Detection System
Software Engineer Head for the Remote Mine Hunting Software System
Strategy training plan for the Team to Man the CERT in Country of Oman
Design and implementation of the first commercial Security Operations Center in the country of Oman
Implementation of the Network Architecture for the two international airports in the country of Oman
Security baseline development for the Oman Telephone company and the Airport Management Commission
DoD Drone Research for Offensive tactics to counter drones as a weapon
Strategy and Training Plan for the Algerian Army Network Security Specialists
Strategy and Training Plan to secure multiple countries in Africa


July 16
12:30 pm - 4:30 pm PDT