Information Technology
-

Through the Hack the Pentagon program, The Department of Defense (DoD) had asked Synack to look for vulnerabilities left undetected by traditional security solutions in one of their highly complex and sensitive systems. The DoD was going to push the limits of security beyond that of most enterprises, and the results were surprising. Hear from Synack CEO Jay Kaplan how the government can benefit from bug bounty programs, what Hack the Pentagon revealed about DoD security, and why more and more organizations are employing red team penetration testing. 

Jay Kaplan co-founded Synack after serving in several security-related capacities at the Department of Defense, including the DoD’s Incident Response and Red Team. Prior to founding Synack, Jay was a Senior Cyber Analyst at the National Security Agency (NSA), where his focus was supporting counterterrorism-related intelligence operations. Jay received a BS in Computer Science with a focus in Information Assurance and a MS in Engineering Management from George Washington University studying under a DoD/NSA-sponsored fellowship. Jay holds a number of security certifications from ISC(2) and GIAC.

Encina Hall, E008 (garden level)

Jay Kaplan CEO Synack
Seminars
Authors
News Type
Blogs
Date
Paragraphs

Can Bitcoin thrive without China? 

Bitcoin started the month of September trading at an all-time high of $4,950. By implementing Segregated Witness, or SegWit, Bitcoin allowed more transactions to take place and signaled confidence that Bitcoin would scale. On September 4, the Chinese central bank banned trading in initial coin offerings (ICOs), leading to rumors that China was considering banning Bitcoin trading altogether. Those rumors were confirmed on September 14, and Bitcoin exchanges operating in China were told to cease trading for now. This article explores what happened next, and what the future of Bitcoin is without its largest mining pools...

 

Hero Image
Bitcoin accepted here Getty Images
All News button
1

Are you interested in cybersecurity? Have you wanted to learn offensive cyber techniques  but don't know where to get started? The Applied Cybersecurity team is hosting an introductory workshop to get people going with practicing exploitation and offensive cyber techniques in an ethical setting. In particular, we will focus on gaining familiarity with techniques used for competing in Capture the Flag (CTF)* competitions. We'll be hosting the first workshop this Friday, in preparation for the Hitcon CTF next week. Bring a laptop! This workshop will assume no prerequisite experience with hacking or cybersecurity so please attend regardless of how unfamiliar you are with the topic. For this workshop, we will focus on web vulnerabilities, binary reversing, and some basic cryptography challenges. Note that experience equivalent to CS107 will be useful. Food will be provided! RSVP here: https://goo.gl/forms/M5yzuQasIZpL4Ovy1

Shriram 366

News Type
News
Date
Paragraphs

The Stanford Applied Cyber Team took 1st place in the Collegiate Penetration Testing Competition (CPTC) Western Regionals.

After 8 hours of intense penetration testing on Saturday, October 7th, at Uber HQ in San Francisco, the Stanford team returned to campus and authored a 52 page findings and remediation report, finishing up at 3AM and then returning to the CPTC competition venue to deliver their recommendations by 8AM Sunday.

Demonstrating moxie and professionalism under fire, the team consisting of Paul Crews, Albert Liang, Kate Stowell, Travis Lanham, Wilson Nguyen, Colleen Dai, and coach Alex Keller have qualified for the CPTC Nationals November 3-5 in Rochester, NY.

 

Hero Image
cptc applied cybersecurity team
All News button
1
Subscribe to Information Technology