
I absolutely love giving presentations! I love to run my mouth, so being able to do so in front of like-minded individuals is a passion of mine. I’ve started to lose track of the various presentations I’ve given, so I made this page to catalogue my work and provide resources should anyone be interested in reviewing the content.
Table of Contents
SANS Summits & Webinars
Oh You Silly Framework!: An Intro to Analyzing .NET Malware – SANS@Mic Sydney
Nov 4, 2020, SANS Sydney 2020 @Mic Webcast
Webcast DescriptionSign up here: https://www.sans.org/webcasts/silly-framework-intro-analyzing-dotnet-malware-sansatmic-sydney-117015
LOCKED OUT! Detecting, Preventing, & Reacting to Human Operated Ransomware
2020, SANS Webcast
Webcast DescriptionRecording available on SANS.org; requires a free SANS.org account (simple, easy sign-up)
Hunting Human-Operated Ransomware Operators
Summit Talk DescriptionLink: https://www.sans.org/event/threat-hunting-and-incident-response-summit-2020/summit-agenda
CactusCon & BSides Talks
Implementing a Kick-Butt Training Program: Blue Team GO!
Operationalizing Cyber Threat Intelligence (CTI): Pivoting & Hunting
2017, CactusCon — Not recorded
Exposing the Neutrino EK: All the Naughty Bits
GitHub repo with files: https://github.com/rj-chap/ExposingNeutrino
TAPIOCA: How to Automate Yourself Out of a Job
Work / Vendor Presentations
Protecting Your Workforce from Business Email Compromise
Webinar DescriptionRyan Chapman, BlackBerry Principal Consultant, Incident Response & Digital Forensics, walks through:
– Tips for securing your business email
– Business email compromise (BEC) threats and how to avoid them
– The evolution of phishing attacks from malware deployment to credential theft
– How BEC attacks should be analyzed and reported
– How a BEC Assessment can help you understand your email-based threat landscape
Don’t miss this valuable presentation on ways to address the threats facing remote workers. Watch this webinar on-demand now.
The official, On-demand webinar is available here: https://blogs.blackberry.com/en/2020/10/webinar-protecting-your-workforce-from-business-email-compromise
A modified version of the webinar is also available on YouTube:
Incident Response in Your Newly Expanded Workforce
2020, Nth Generation Symposium Breakout Session
No recording available, yet
Threat Hunting in 2020: Focal Points for Success
2020, SINC Virtual Roundtable
Link: https://sincusa.com/event/blackberry-virtual-roundtable-new-york-new-jersey/
Sign up at the link above to view recording
IT Security Outlook 2020: What to Expect in the Year Ahead
2020, eSecurity Planet
Link: https://globalmeet.webcasts.com/starthere.jsp?ei=1276480&tp_key=c653ee8eb5&sti=cylance
Sign up to view on-demand.
Threat Intelligence – Buzzword or Buzz-Worthy?
JavaScript Deobfuscation
YouTube videos, not quite presentations. But hey, they’re fun!
MalWerewolf: JS/Shellcode Deobfuscation
Splunk Talks
PowerShell Power Hell: Hunting for Malicious PowerShell with Splunk
Security Operations Use Cases: ‘Cause Bears, Pandas, and Sandworms
Security Operations: Hunting Wabbits, Possum, and APT
2016, Splunk Live! Scottsdale
No recording available
Slides available here: https://www.slideshare.net/Splunk/bechtel-customer-presentation-61159932
Security Operations Use Cases: ‘Cause Bears, Pandas, and Sandworms
2015, Splunk Live! Santa Clara — Same as 2015 .Conf preso
Security Operations Center Use Cases
2014, Splunk Live! Phoenix
No recording available
Cyber Forensics Workshop
This is a 6-part workshop that I presented to students from Cal State University Fullerton (CSUF) back in 2014. While the version of WireShark we use is quite old, the content is still completely viable here in 2020.