applied security conferences and training: CanSecWest | PacSec |

Security Masters Dojo

Advanced and intermediate security training and technology enhancement for information security professionals.

CanSecWest: Security Masters Dojo Vancouver

WORKSHOP:OPSEC for Security Researchers

Register for the March 16-17, 2020 (2-day course)

Instructor(s):
Krassimir Tzvetanov

Description

Whether performing an in-depth investigation or merely quick research, the investigator (or researcher) and the investigation itself are exposed to certain risks.

This workshop focuses on security and safety issues pertaining to online research and investigations. It covers different areas of the investigative process and how tools and particular techniques can leak information detrimental to the case or the investigator.

PREREQUISITE WARNING Each class has prerequisites for software loads and a laptop is mandatory. These individual class guides will list material the students are expected have knowledge about coming in and software tools that need to be pre-installed before attending so you get the maximum benefit from the focused intermediate or advanced level course. Please pay particular attention to the prerequisites, as the material listed there will not be reviewed in the courses, and will be necessary to get the maximum benefit out of these educational programs.

The workshop focuses on both the technical and soft - intelligence and counterintelligence aspects of OPSEC, thus it is useful to both technical investigators as well as non-technical folks, like mainstream journalists and lawyers.

From technology point of few the workshop covers different browser and infrastructure fingerprinting techniques, ad platforms, browser hooking, instant messaging programs, email security and tracking.

On the investigative side the workshop focuses on deceptionion techniques and their application in intelligence and counterintelligence.

Furthermore, it goes deeper into how investigators and blue teams can be profiled and targeted. Those can be either direct attack against their computer or supporting infrastructure, their person or the investigation, which in turn may be as subtle as steering it in the wrong direction or making the evidence inadmissible in court.

As it covers the dangers, this workshop provides series of countermeasures and mitigations, which can help the investigator increase their level of safety and security and decrease their digital footprint.

In addition, the workshop introduces containerization and how it can be used to segment and streamline the process.

In more details the agenda roughly looks as follows:



What you will need to bring:

Students must have a laptop with VMWare Playe or VBox. (*Note the latter does not perform as well.)