1 minute read

ABOUTTHETALK SPEAKER BIO

We have designed open source techniques, software, and content for generating randomised hacking challenges. In this talk I will describe our approach to teaching cyber security, designing fun security challenges, and our technology and infrastructure.

Advertisement

Socials&Links http://z.cliffe.schreuders.org

DrZ.CliffeSchreudersisReaderinCyberSecurityand Director of the Cybercrime and Security Innovation (CSI) Centre at Leeds Beckett University. Cliffe believes that learners should be given the opportunity to put theory into practice. He has a well established publication track record, including publications in journals such as ACM Transactions on Information and System Security (TISSEC), International Journal of Information Security, and Computers&Security,andistheauthorofmanypeerreviewed papers. Cliffe leads the Hacktivity and SecGen projects (as lead architect and developer, working collaboratively with others). Cliffe has experience working as a software engineer and leading funded collaborative research projects with a largenumberofstaff.

About The Workshop

An avenue of privilege persistence and elevation for attackers is to find and exploit plain text secrets in our systems. Honeytokens are fake AWS tokens that alert us when an attacker tries to exploit them, notifying us of a breach. In this workshop, we learn howtocreateanddeploythem.

The workshop will be 90 minutes long - please bring yourlaptopwithyou.

This article is from: