BHIS Webcasts

Black Hills Information Security

Podcast audio-only versions of weekly webcasts from Black Hills Information Security

Episodes

  1. Data Loss Prevention (DLP) Survival Guide - Ashley Knowles

    5 DAYS AGO

    Data Loss Prevention (DLP) Survival Guide - Ashley Knowles

    How quickly could you detect sensitive data being exfiltrated? Join us for a free one-hour BHIS webcast with Ashley Knowles on best practices for data loss prevention and keeping your most sensitive information safe. You’ll learn about common vulnerabilities, real-world scenarios, and practical, actionable strategies to protect the data you’ve been hired to safeguard. 🛝 Webcast Slideshttps://www.blackhillsinfosec.com/wp-content/uploads/2026/02/SLIDES_Data-Loss-Protection-Survival-Guide.pdf Chapters (00:00) - Intro (03:20) - About Ashley Knowles (03:49) - Why DLP Shouldn't Terrify You (Too Much) (08:33) - Understanding Your Data Landscape (10:46) - Data Classification Framework (12:12) - Where Does Your Data Live? (14:47) - Understanding Data Exfiltration (18:57) - Advanced Exfiltration Methods (22:43) - The Insider Threat Reality (24:42) - How to Stop Data Loss: The Basics (26:14) - Technical Controls That Work (28:07) - Recommended Layered Approach (31:19) - Cloud & Modern Workplace Protection (32:24) - The Purple Team Process (34:41) - Purple Team Testing: Scenario 1 (37:01) - Purple Team Testing: Scenario 2 (39:36) - Purple Team Testing: Scenario 3 (40:35) - Purple Team Testing: Scenario 4 (41:03) - Purple Team Testing: Scenario 5 (42:26) - Starting Your DLP Journey (44:13) - Key Takeaways & Action Items (44:39) - Questions & Resources (56:22) - The "What it's like to work with Black Hills Information Security" segment Creators & Guests Jason Blanchard - Host Ryan Poirier - Producer Deb Wigley - Host Bryan Strand - Guest Ashley Knowles - Guest Chat with your fellow attendees in the BHIS Discord server:https://discord.gg/bhisin the #🔴live-chat channel 🔗 Register for FREE Infosec Webcasts, Anti-casts & Summits – https://poweredbybhis.com Click here to watch a video of this episode. Brought to you by: Black Hills Information Security  https://www.blackhillsinfosec.com Antisyphon Training https://www.antisyphontraining.com/ Active Countermeasures https://www.activecountermeasures.com Wild West Hackin Fest https://wildwesthackinfest.com Click here to view the episode transcript. 🧦 SOC Summit 2026https://www.antisyphontraining.com/event/soc-summit/

    1h 10m
  2. Simplify Pentest Workflows Using Cerno - Chris Traynor

    1 FEB

    Simplify Pentest Workflows Using Cerno - Chris Traynor

    Are you reviewing findings or managing chaos?  🛝 Webcast Slideshttps://www.blackhillsinfosec.com/wp-content/uploads/2026/01/SLIDES_Simplify-Pentest-Workflows-Using-Cerno.pdf ✏️ Learn from Chris Traynor with Offensive Tooling for Operatorshttps://www.antisyphontraining.com/product/offensive-tooling-for-operators-with-chris-traynor/ 🔗 Register for FREE Infosec Webcasts, Anti-casts & Summits – https://poweredbybhis.com If you are a pentester, you have been there. Hundreds of findings. Critical vulns buried in noise. Too many terminal windows, lost context, and manual tracking slowing you down. On offensive work, time is everything, and disorganization wastes it fast. Join us for a free one-hour webcast with Chris Traynor, Security Consultant at Black Hills Infosec, as he introduces Cerno, a new free and open-source tool designed to bring order to pentest findings. Cerno is a Terminal User Interface tool that imports vulnerability data for structured review and validation. Navigate findings with keyboard shortcuts, launch tools with a single keystroke, track progress automatically, extract CVEs, look up related exploits, compare findings across hosts, and follow built-in or custom verification workflows. You'll learn how to use Cerno to organize, review, and validate pentest findings faster, reduce chaos during engagements, and stay efficient under real-world time pressure. Get familiar with Cerno: https://github.com/ridgebackinfosec/cerno Chapters (00:00) - Intro – Simplify Pentest Workflows Using Cerno w/ Chris Traynor (06:26) - The Problem (11:18) - The Solution (13:37) - Feature Overview (17:00) - Database-First Design (17:40) - Module Architecture (18:34) - Data Flow (19:25) - Interactive TUI (21:39) - Severity Filtering (23:20) - Finding Review (25:32) - Tool Orchestration - nmap (27:58) - NetExec & Custom Tools (29:08) - NetExec DB [Beta] (30:45) - Host Comparison (33:03) - Session Persistence (34:46) - Configuration (36:45) - Demo Time (58:01) - Getting Started (58:12) - Resources (58:36) - Thank You / Free Labs (01:00:21) - CTF challenge (01:00:46) - Free Survival Guide - Spearphish General Store (01:01:05) - QA Start (01:10:39) - Taking Care of Business Related Plugs Chat with your fellow attendees in the BHIS Discord server:https://discord.gg/bhisin the #🔴live-chat channel 🧦 SOC Summit 2026https://www.antisyphontraining.com/event/soc-summit/

    1h 24m
  3. Active Directory Attack Path in Action

    19 JAN

    Active Directory Attack Path in Action

    Are small Active Directory misconfigurations putting you at risk? 🔗 Register for FREE Infosec Webcasts, Anti-casts & Summits –  https://poweredbybhis.com 🛝 Webcast Slideshttps://www.blackhillsinfosec.com/wp-content/uploads/2026/01/SLIDES_Active-Directory-Attack-Path-in-Action.pdf Antisyphon Training events featuring Alyssa & Kaitlynhttps://www.antisyphontraining.com/search/Alyssa%20Kaitlyn Chapters (00:00) - Intro - Active Directory Attack Path in Action (02:29) - Alyssa and Kaitlyn Fun Facts (03:06) - Webcast Overview (03:57) - Web Services (06:43) - Jenkins Env Hunter - Tool by Kent Ickler! (08:16) - Test Credentials (09:20) - Username Enumeration (12:35) - Domain Enumeration (14:34) - NetExec (15:35) - BloodHound.py (16:52) - SharpHound (17:51) - ADExplorer (19:53) - Convert Snapshot (20:30) - BOFHound (23:09) - Identify Attack Path (24:18) - Abusing RBCD for Local Priviledge Escalation (27:06) - Machine Account Quota (28:03) - Resource-Based Constrained Delegation Expolitation Flow (30:59) - Create Computer Object (32:21) - Set Delegation (33:45) - Delegation Attribute (34:16) - Select a Target Account (34:57) - Avoid Protected Users (35:47) - Get Privileged TGS (37:30) - Delegation Failure Example (38:02) - Escalation Success (39:41) - Dump local Secrets (41:16) - Domain Admin Compromised (42:02) - Attack Path Summary (44:47) - Defensive Considerations (46:05) - Related Antisyphon Courses (46:31) - More Resources (47:50) - Q&A Start (50:26) - Alternative Path for Attackers (51:53) - Whats the Assumed Compromize Course like? (56:50) - Are Extended Test Timelines an advantage? (58:14) - BHIS "Side Quest" capabilities (59:18) - BHIS CPT On-Boarding Process (01:02:52) - Getting the Ball Rolling on Test Assessments (01:04:45) - The Price of Continous Pen Testing (01:05:53) - Favorite Things About Customer CPTs Join Kaitlyn Wimberley and Alyssa Snow (Black Hills Infosec – Continuous Penetration Testers) for a free one-hour webcast where they’ll walk through an example Active Directory attack path, from un-credentialed network access to Domain Administrator.You’ll learn how attackers can escalate from un-credentialed access to Domain Admin, identify common misconfigurations, and understand how small weaknesses can combine to compromise your network. Chat with your fellow attendees in the Black Hills Infosec Discord server:https://discord.gg/BHISin the #🔴live-chat channel. Brought to you by: Black Hills Information Security  https://www.blackhillsinfosec.com Antisyphon Training https://www.antisyphontraining.com/ Active Countermeasures https://www.activecountermeasures.com Wild West Hackin Fest https://wildwesthackinfest.com 🧦 SOC Summit 2026https://www.antisyphontraining.com/event/soc-summit/

    1h 10m
  4. Inside SOC: Triage Smarter, Not Harder w/ Tom DeJong

    19/12/2025

    Inside SOC: Triage Smarter, Not Harder w/ Tom DeJong

    Inside SOC: Triage Smarter, Not Harder w/ Tom Dejong 🛝 Webcast Slideshttps://www.blackhillsinfosec.com/wp-content/uploads/2025/12/SLIDES_Inside-SOC-Triage-Smarter-Not-Harder-1.pdf Could you triage an alert on the spot? Learn why alert triage is a crucial skill for every SOC analyst. Tom will teach you the basics of triage, including alert anatomy, how to separate real threats from noise, and when to escalate or close an alert.You’ll also learn documentation best practices, common mistakes to avoid, and tips for strengthening your soft skills.This webcast is ideal for anyone starting out in a SOC or looking to sharpen their foundational skills. Chat with your fellow attendees in the Antisyphon Discord server:https://discord.gg/bhisin the #🔴live-chat channel (00:00) - Inside SOC: Triage Smarter, Not Harder (01:54) - About Tom DeJong (03:04) - Agenda: What We’ll Cover Today (03:44) - What Is Triage? (07:00) - Why Triage Matters (08:24) - The Triage Mindset (13:10) - Anatomy of an Alert (18:14) - The Triage Process (23:44) - Real Threat or Just Noise (27:44) - Escalate or Close (33:12) - Common Mistakes to Avoid (35:12) - Tips for Making the Right Call (36:00) - Smart Documentation Tips (39:24) - Basic Documentation Template (40:10) - Soft Skills That Make a Difference (45:11) - Managing Alert Fatigue (50:28) - Live Demo (56:37) - Rule Logic and Detection Examples (59:19) - Resources and References (59:44) - Wrap-Up and Thanks (01:00:39) - Post Show Banter Q&A 🔗 Register for FREE Infosec Webcasts, Anti-casts & Summits –  https://poweredbybhis.com Brought to you by: Black Hills Information Security  https://www.blackhillsinfosec.com Antisyphon Training https://www.antisyphontraining.com/ Active Countermeasures https://www.activecountermeasures.com Wild West Hackin Fest https://wildwesthackinfest.com 🧦 SOC Summit 2026https://www.antisyphontraining.com/event/soc-summit/

    1h 19m

About

Podcast audio-only versions of weekly webcasts from Black Hills Information Security