About us | Advertising | SecurityWatch
Home   Articles   Blog   Reviews   Press Releases   Security Tools   Sponsored Solutions
Press Releases
Non-Profit Provides Hacker Re-Training
Friday, 13 August 2004 14:51 EST

Forum Cross-Trains Hackers with Managers

August 12, 2004, Las Vegas, NV, USA

As part of their mission to promote security and privacy awareness, the non-profit ISECOM is bringing its week-long forum and cross-training event, ISESTORM, to the University of Nevada, Las Vegas from October 16th to the 23rd with support from UNLV's Rebelcard Services.

What sounds like social welfare for hackers is actually a successful series of free and low-cost programs run by the open-source group, ISECOM. Hacker re-training is the concept of a cross-over of the positive elements of hacking with business disciplines to benefit both hackers in need of professional skills and managers, internal auditors, and even school teachers in need of hacker-like testing and analysis skills.

"You can read websites or buy a book if you want to know what tools and techniques a hacker uses," said the ISECOM Managing Director, Pete Herzog. "But you really need someone with experience, a mentor from the trenches of the business and government sectors, to understand why you should use certain tools, why a best practice may not be best for you, and why the reported security results are right-- or wrong."

ISECOM is the international non-profit "Institute for Security and Open Methodologies" whose open, grass-roots approach to security standards has made them a progressive center-piece in the world of security and security testing, commonly known as penetration testing or ethical hacking. This is all because of a little book (now over 200 pages) they maintain for free called the Open Source Security Testing Methodology Manual (OSSTMM) which became the defacto re-training manual using hacking in a professional setting.

ISESTORM is in its second run and it has grown since it's Barcelona debut. Starting ISESTORM with the Open Source Security Exhibition, ISECOM provides a free forum for the open source security and privacy community and an opportunity for anyone to meet the developers and project leaders where they can get together, share ideas, and showcase their hard work. The exhibition combines the exhibitors with the forum to promote interaction.

"I found the Open Source aspect most appealing, as a small business owner I can't afford to pay the tens of thousands of pounds required for commercial tools. To listen to experienced professionals hints and tips for maximizing the use of these free solutions was worth the event cost alone," said Simon Biles, a UK IT consultant who attended ISESTORM Barcelona earlier this year.

After the exhibition follows 6 more days with 7 master tracks to choose from. This brings security awareness and hacker re-training with a combination of over 70 classes. ISESTORM promotes the professional and business sides of security tests and audits to teach better security management, avoiding security solution snake-oil, and to develop secure software. It is not about teaching anyone how to hack according to Herzog. "It's to teach you to look at your infrastructure and know why it's insecure." ISESTORM guest lecturers include consultants and managers from IBM, Symantec (SYMC), Foundstone, Tripwire as well as various universities and open source community leaders.

The Open Source Forum on October 16th is only $9.95 ($7.95 if you use your RebelCard) but attendance is limited to 2000 tickets. Educational Tracks start at $600 for a mini-track, $1000 for an evening track, and $2500 for a full-week track with one of the OPST, OPSA, BS 7799 Lead Auditor, and Hacker Highschool Teacher certification exams included.

Only 20 people per Master Track will be accepted. For those with a tight budget, ISECOM provides internship opportunities as a work-for-training proposition.



Featured Articles

Software application development has only been around since the late 1970s. Compared to other industries and professions, the software industry is still very young. Ever since organizations began to use computers to support their business tasks, the people who create and maintain those “systems” have become more and more sophisticated and specialized.

A new Trojan horse is designed to produce forge Google ads that are formatted to look like legitimate ones. The Trojan attempts to incorporate its ads in Google AdSense publishers program. Once installed, the Trojan horse downloads itself onto the computer and replaces the original ads with its own ads.

According to Burton Group, identity federation can be defined as ‘the agreements, standards and technologies that make identity and entitlements portable’. There are three main federation models - simple (point-to-point), hub and spoke (uni or bi-lateral) and circle of trust (many-to-many).

Scan all company email for viruses, Trojans and worms with 4 virus engines, all in one package - GFI MailSecurity for Exchange/SMTP! Download your free 60-day trial today!

Check your website security with Acunetix Web Vulnerability Scanner. Audit your web applications for SQL injection, cross site scripting & more. Download trial!

Network Security Tools

SpyDefense
SpyDefense protects your computer against annoying, and harmful software such as Spyware, Adware, Trojan horses, etc. SpyDefense is anti-spyware software that prides itself on a very user friendly environment.


Proactive Security Auditor
Proactive Password Auditor is a password security test tool that's designed to allow Windows NT, Windows 2000, Windows XP and and Windows Server 2003-based systems administrators to identify and close security holes in their networks.


File Securer
File Securer is a powerful tool designed to protect your sensitive folder and personal file. With strong security, File Securer embeds the protect into windows system kernel, both on command mode and window mode, all work professionally.




What's up, IT? Blog

Phishing By The Numbers: 41,000 Blocked Sites in 2005
Top 7 PHP Security Blunders
The human factor and information security
Why I Love Vulnerability Analysis In 2005
IT security fear factor: Tape backups
Uncovering Cyber Flaws
State of the security mart
When the hardware gets smart
Security for SMBs
Four Security Resolutions For The New Year

Copyright © IT-Observer.com 2000 - 2006    Privacy Policy | RSS Feeds
Site Meter