Webinar Series

Winning Defcon: Cybersecurity Competitions  





 

Winning Defcon: Cybersecurity Competitions  

______________________

What does it take to win a cybersecurity competition? We will find out about the competition and hear about the experience from one of this year's youngest winners at Defcon. Competitions are being used more and more to help students learn about a field, help employers find new employment candidates, or just create an environment to spur innovation.

Competitions may include all different types of challenges covering skills ranging from programming, hardware hacking, to social engineering. Capture the flag, where one team tries to defend a resource and a second team tries to take the resource, has been used consistently in cybersecurity to help evaluate technology and ranges in size from simple internal exercises to full scale military operations.





Register for the next Webinar




Our Speakers

Brandon Holland

Joel Holland 

Marc Rogers

Thirteen year old Brandon Holland is a cyber-enthusiast. He has been going to cyber security conferences for the past 5 years and embraces every learning opportunity he gets. He won his first security competition when he was 11. This past year at the 2020 virtual Defcon he competed in two different security competitions. One was a teens-only competition which he won; the other was an adult competition in which he was the captain of the winning team. Outside of security, his fifth grade science fair project was Decrypting Cyphers with Python Programming. He has competed in many math and science competitions every year. He recently won the Academic Excellence award for his grade at school. Brandon has also been a key component in his basketball clubs for four years. He enjoys playing basketball, spending time with friends and family and, as expected, gaming. 

Chief Technology Officer, SOD

Joel serves as CTO and has responsibility for security operations, service delivery, infrastructure and compliance. Prior to joining Security On- Demand, Joel spent 10 years at EISI, a software and SaaS provider to the financial services industry where he served as Chief Information Security Officer and Vice-President of Operations. Prior to EISI, Joel was VP of Engineering & Operations for StyleLogic. Joel began his career as a nuclear engineer for the U.S. Navy. He has a B.S in Nuclear Engineering from Georgia Institute of Technology and holds certifications in ISO 27001, CRISC, LEAN, Six Sigma and is a Certified Information Security Manager (CISM). 

VP of Cybersecurity Strategy, Okta

With a career that spans more than twenty years, Marc has been hacking since the 80’s and is now a white-hat hacker renowned for hacking things like Apple's TouchID and the Tesla Model S. Prior to Okta, Mr. Rogers served as the Head of Security for Cloudflare and spent a decade managing security for the UK operator, Vodafone. He's been a CISO in South Korea and has also co-founded a disruptive Bay Area startup. In his role as technical advisor on “Mr. Robot,” he helped create hacks for the show. He's also an organizer and the Head of Security for the world’s largest hacking conference: DEF CON. Most recently Mr Rogers helped found the CTI League, a multi national cybersecurity initiative combining industry professionals, government agencies and law enforcement from 80 different countries.

 


Register for the next Webinar



Watch Other Webinar Recordings! 

Webinar One 

⁠Responding to COVID-19 Changing the Cybersecurity Landscape 

Since the start of the COVID-19 pandemic we have seen a massive increase in cyber-attacks. In this webinar we discuss some of the measures people have taken to help those attacked while disabling some of the attacks. This is being done by companies and also by individual volunteers who have come together to create a taskforce to protect the people and institutions fighting these invisible attackers. 

 

Webinar Two

⁠Cyber Attacks Taking Advantage of COVID-19: Detailed Views 

In this webinar, we dive deeper into the discussion of new and evolving cybersecurity challenges brought on by the COVID-19 pandemic.  


 

Webinar Three

What We Can Learn to Better Prepare for the Next One

⁠In this week's webinar, we discuss innovative methods we can use to gather a complete data set on these attacks, analysis techniques that might be useful in examining this data set and potential recommendations that will arise as a result of the analysis process, and what data is available now and why it's not enough.  We also touch on how you can get involved to help now and what we can do to prepare for the future.