Knights in shining armor harken back to days of war, pageantry, and gallantry. Expert craftspeople shaped, tempered, and hardened plate armor for maximum protection. You can’t cut through plate armor, but the Medieval sword masters told combatants to: “Meet strength with weakness and weakness with strength. Strike at the gaps in the armor.”
This is the same strategy that cyber criminals employ today. Even with the best security fortifications in place, cyber criminals will strike at the gaps in your armor.  How long do you want to be owned by the enemy before you find out about it, and can do something about it?  Search is a powerful solution that helps you identify your weaknesses and proactively minimize risk to your organization.

During this luncheon, you will learn to search and address the gaps in your security armor to discover:
- How open source augments traditional security models
- New ways of thinking about security including: intelligence driven operations, threat hunting, and insider threats
- New methods of finding, fixing, and finishing the bad actors from your network


Join cyber security expert, Kevin Keeney, who built MOCYBER, which lead to the creation of RockNSM and CAPESstack. His passion for network security monitoring and cyber operations solutions built around open source is inspiring. The projects he has been involved in are now utilized by many organizations inside and outside the U.S. Department of Defense. Kevin has spent over two decades in commercial and public sector roles fighting cyber criminals in addition to working and consulting with companies ranging from global Fortune 200 to small businesses to improve defenses. He has achieved many distinctions, but most recently was invited by the U.S. Senate's Homeland Security Committee to testify on Cyber Threats Facing America.  Kevin currently is a Cyber Security Advocate for Elastic, the company that developed the open source Elastic Stack, including Elasticsearch and X-Pack.

Kevin looks forward to sharing his insights on cyber security, incident response, leadership, and team development with you.

Agenda

0 Response to "June 29: Medieval Knights, Modern Security, and Search with Cyber Security Expert, Kevin Keeney"

Post a Comment

Group Tools

Random Prize Winner
Use this tool to generate random numbers for prize drawings.

Computer Humor Slideshow
Just for fun!




Follow this twitter list of the twitter accounts for the user groups. Ask for your group to be added to this list: twitter list
Subscribe to the Kansas City User Group Newspaper at Paper.li

Blog Archive

Followers