Event locked in Sched to limit confusion. See registration to determine current session availability. YOU ARE REQUIRED TO REGISTER AT https://bsidessf.regfox.com/2022 TO ATTEND THIS WORKSHOP (i.e. this session cannot be reserved with Sched) ----- We will explore phishing attacks, software supply chain attacks, and Kubernetes credential exfiltration attacks in a way that demonstrates how these concepts build on each other. ----- This workshop will utilize a rogue-like deck-building game that I have built with the sole intention of teaching cybersecurity principles and the steps of the cyber kill chain. We will explore phishing attacks, software supply chain attacks, and Kubernetes credential exfiltration attacks in a way that demonstrates how these concepts build on each other.
Attending this workshop allows all participants to get their hands dirty in performing various forms of cyberattacks--no prior experience is required.