By Laura Natcher | Nov 23, 2019 | Events

Thursday, December 12, 2019
11:30 AM – 1:00 PM EST

Continental Technologies
235 Schilling Circle
Suite 100
Hunt Valley, MD 21031

Register Here

Please join us for a lunch and learn on December 12, 2019 at CTI’s Corporate Headquarters in Hunt Valley, Maryland. During this event, you will learn the methods that an attacker may use to gain unauthorized access to a victim’s systems, data, and facilities. This educational event will put you in the driver’s seat of an attacker and take you through various scenarios that are relevant to your organization. 

This event will be catered by Pappas Seafood, featuring Maryland’s BEST Crab Cakes (Oprah said so herself.) This is an excellent opportunity to engage with our Cybersecurity experts who will provide best practices that you can leverage to protect your organization.

Seating is limited… reserve your spot here!

The following scenarios will be reviewed during the simulated training:

  • Who Are You? – Hackers will attempt to gain as much information and insight about you prior to an attack. There are several ways in which you or your organization can protect yourself.
  • Closer Than You Think – An attacker may try to gain physical access to your workplace. There are several sources in which they can find information to make it appear as if they are a legitimate employee.
  • On a Phishing Trip – One of the most successful attack methods an attacker will use is through phishing. An attacker’s goal is to use deception to lure the victim into opening an email attachment or clicking a malicious URL.
  • I Am You – Data breaches are occurring at a rapid rate in which user credentials are compromised. Passwords are no longer the security blanket that they used to be. This scenario will show you how an attacker can crack a password in minutes.
  • Over The Air – Everywhere you go, the Internet is accessible through wireless. This can be at the local coffee shop, store outlet, or restaurant. But how do you know if your connection is secure? Hackers are able to spoof wireless access points to insert themselves in-between a connection to obtain sensitive information.
  • Show Me The Money – Cybercrime is turning into a billion dollar industry. One of the reasons it is profitable is due to ransomware. Do you have controls in place to protect against your files being encrypted?

Information on the Presenter:

Craig Jackson, CISSP, OSCP, GPYC, GAWN, CEH – Cybersecurity Professional Services Consultant

Mr. Jackson is a consultant with CTI, where he leads information security engagements for customers across the mid-Atlantic region. For the past five years he has specialized in penetration testing, wireless security & design, regulatory compliance, and corporate security training. He also serves on the board of directors for InfraGard Maryland, currently as president of the chapter. Craig holds a degree in Information Assurance, as well as OSCP, CISSP, GPYC, GAWN, CEH, and other vendor certifications.

What your afternoon will look like:   

  • 11:30-11:45 Arrival
  • 11:45-12:00 Introductions from our brilliant team
  • 12:00-12:45 Lunch is served and presentation begins
  • 12:45-1:00 Last bites and Q&A