[OWASP-Malaysia] Fwd: April 25: SANS Instructors at MCMC - Managing InfoSec and Latest Forensics Advances

Mohd Fazli Azran mfazliazran at gmail.com
Sat Apr 16 03:15:59 EDT 2011


For who have time and wanna participate please join! Thanks

---------- Forwarded message ----------
From: The SANS Institute <sans at sans.org>
Date: Thu, Apr 14, 2011 at 2:48 AM
Subject: April 25: SANS Instructors at MCMC - Managing InfoSec and Latest
Forensics Advances
To: fazli at owasp.org


Dear Mohd Fazli Azran Abd Malek,

Herding Cats and Forensics Time Travel: Managing Information Security
and the Latest Advances in Digital Forensics

As a part of SANS' contribution to the local Information Security
community, we are pleased to invite you to the next presentation in
Malaysian Communications And Multimedia Commission's (MCMC) "Securing
the Network Industry Talk Series #2" featuring two of the SANS
Institute's top instructors, Mark Hofman and Hal Pomeranz, who will be
delivering interesting, informative and free presentations on Managing
Information Security and Digital Forensics on Monday, April 25, at
MCMC's Cyberjaya Facility at 2:00 p.m.

In addition, MCMC will also present the National Threat Landscape: First
Quarter Report 2011 from its Network Security Centre activities and
monitoring.

Date: Monday, 25 April 2010
Time: 2:00 p.m. - 5:00 p.m.
Venue: SKMM Auditorium

To join this session, kindly RSVP to: istiarty at cmc.gov.my

Read on below for the topics and brief abstracts.

Herding Cats or Managing Security, which Challenge is Greater?
by Mark Hofman, SANS Certified Instructor
To many both tasks will seem impossible, but they do not have to be. As
a consultant into many different types of organizations it is remarkable
how many of them face exactly the same issues, regardless of the
industry, regardless of whether they are public or private companies.
One of the main issues we see is that teams, whilst trying their
hardest, just cannot get ahead of the game. They are stuck in the
vicious cycle of identifying problems, fixing problems, identifying
problems, fixing problems, and so on.

In the time available we will explore what some of these challenges are
and what others have done in order to resolve the problem. We will also
talk about some of the critical security functions that must be in place
in order to defend your networks and keep your data where it should be.
Hopefully resulting in less grey hair, more sleep, and herded cats.

Super Timeline Analysis
by Hal Pomeranz, SANS Faculty Fellow
Super Timeline Analysis will completely change the way you approach
Digital Forensics.  Forever.  And the tools are free!

Temporal data is located everywhere on a computer system.  File system
MAC times, log files, network data, registry data, internet history
files and file metadata all contain time data that can be correlated
into critical analysis to successfully solve cases.  But forensic
analysts must master a variety of operating systems, investigation
techniques, and incident response tactics to solve challenging cases.
Until recently, timeline analysis frameworks have not existed to easily
allow multiple examinations of time based data into a single framework
that is easily analyzed by investigators.

Timeline analysis has changed the way many of us approach complex cases.
It helps uncover additional indicators of compromise and aids in
identifying when anti-forensic techniques have been used. Learn how to
get started with this technology, and see how timeline analysis can
streamline your investigations and give you comprehensive visibility
into system activity.

Mark Hofman bio
Mark Hofman is a director and founder of Shearwater Solutions and has
over 15 years' experience in ICT Security. He has worked for both
private industry and government and has provided a wide range of
information security consulting services to numerous organizations,
including the financial sector, private sector, and government
organizations. Mark has had a number of publications, has trained and
lectured internationally, and is a handler for the Internet Storm
Center. Mark holds professional certifications, including CISSP, GIAC
GCFW, CompTIA Security+ and BSI lead auditor accreditations.

Mark will be teaching SEC 401: SANS Security Essentials Bootcamp Style
at SANS IMPACT Malaysia 2011 (June 27-July 2)

http://www.sans.org/info/75079


Hal Pomeranz bio
Hal Pomeranz is the founder and technical lead for Deer Run Associates,
a consulting company focusing on Digital Forensics and Information
Security. He is a SANS Faculty Fellow and the creator of the SANS/GIAC
Linux/Unix Security Track (GCUX), as well as being an instructor in the
SANS Forensics curriculum.

An expert in the analysis of Linux and Unix systems, Hal provides
forensic analysis services through his own consulting firm and by
special arrangement with MANDIANT. He has consulted on several major
cases for both law enforcement and commercial clients. Hal is a regular
contributor to the SANS Computer Forensics blog, and co-author of the
weekly Command-Line Kung Fu blog.

****************

SANS IMPACT: Malaysia 2011 (June 27-July 2): Save $400 before May 18
Build your information security and Forensics skills with SANS'
world-renowned training at IMPACT's global headquarters in Cyberjaya,
Malaysia.

We are delighted to be returning to Kuala Lumpur, Malaysia this July to
conduct the following two courses from SANS' core curriculum:

- Security 401: SANS Security Essentials Bootcamp Style (GSEC)
- Forensics 508: Advanced Computer Forensic Analysis and Incident
Response (GCFA)

You have four weeks left to save US$400 on your course tuition  - the
Early Bird deadline is May 18. So don't delay - to get the best savings,
start making your training and travel plans now!
(http://www.sans.org/info/75079)

These classes will be hosted by International Multilateral Partnership
Against Cyber Threats (IMPACT), held at Cyberjaya Global HQ.

For more information about these courses please read on below:

- Security 401: SANS Security Essentials Bootcamp Style (GSEC) taught
by SANS Certified Instructor Mark Hofman

Maximize your training time and turbo-charge your career in security by
learning the full SANS Security Essentials curriculum needed to qualify
for the GSEC certification. In this course you will learn the language
and underlying theory of computer security. At the same time you will
learn the essential, up-to-the-minute knowledge and skills required for
effective performance if you are given the responsibility for securing
systems and/or organizations.

- Forensics 508: Advanced Computer Forensic Analysis and Incident
Response (GCFA) taught by SANS Certified Instructor, Michael Murr
This course will give you a firm understanding of advanced incident
response and computer forensics tools and techniques to investigate data
breach intrusions, tech-savvy rogue employees, advanced persistent
threats, and complex digital forensic cases.

Learning more than just how to use a forensic tool, by taking this
course you will be able to demonstrate how the tool functions at a low
level. You will become skilled with new tools, such as the Sleuthkit,
Foremost, and the HELIX3 Pro Forensics Live CD. SANS hands-on technical
course arms you with a deep understanding of the forensic methodology,
tools, and techniques to solve advanced computer forensics cases.

For complete course descriptions see: http://www.sans.org/info/75089
Register today for SANS IMPACT: Malaysia 2011!
(http://www.sans.org/info/75079)

Please feel welcome to contact us at AsiaPacific at sans.org or
training at impact-alliance.org for further information.

Best regards,

Suresh Mustapha
MD Asia Pacific
SANS Institute

**************************

To change your subscription, address, or other information, visit
http://portal.sans.org.  If you wish to have your name removed from our
mailing list, visit the site above, click on "update your account" and
check the box "Do not send any email."

SANS Institute, 8120 Woodmont Ave., Suite 205, Bethesda, MD 20814-2743

**************************
-------------- next part --------------
An HTML attachment was scrubbed...
URL: https://lists.owasp.org/pipermail/owasp-malaysia/attachments/20110416/fe6b7f3a/attachment.html 


More information about the OWASP-Malaysia mailing list