Back to All Events

TAO Lunch & Learn : Field Guide to Cybersecurity Research with Rapid7

  • GRIT Building Solutions 919 Southwest Taylor Street, Suite 800 Portland, OR, 97205 United States (map)

Field Guide to Cybersecurity Research with Rapid7

WHAT YOU WILL LEARN

Security is the responsibility of all technology users, manufacturers, and intermediaries-- and that collaboration is the only way to achieve long-term change. Openly sharing security information, helping peers to learn, grow, and develop new capabilities, and supporting others in raising and addressing issues that affect the cybersecurity community is the mission of Rapid7.

Join them, and Technology Association of Oregon, at a Lunch & Learn on Wednesday, June 5th from 11:30 am - 1:00 pm to learn more about Rapid7's two key research projects - Project Sonar and Project Heisenberg, and how participants can leverage this security research to improve their information security programs.

  • Project Sonar started in September of 2013 with the goal of improving security through the active analysis of public networks. While the first few months focused almost entirely on SSL, DNS, and HTTP enumeration, the discoveries and insights derived from these datasets, especially around the identification of systems unknown to IT teams, led to the expansion of Project Sonar to include the scanning of UDP services. Today, Project Sonar conducts internet-wide surveys across more than 70 different services and protocols to gain insights into global exposure to common vulnerabilities. The datasets are available to the public at opendata.rapid7.com in an effort to enable further security research.

  • Project Heisenberg began in 2014 with a singular purpose: understand what attackers, researchers, and organizations are doing in, across, and against cloud environments. It does this by deploying low interaction honeypots—or computers that do not solicit services—globally and recording telemetry about connections and incoming attacks to better understand the tactics, techniques, and procedures used by bots and human attackers. 

WHO SHOULD ATTEND
The topic will be most relevant for technology enthusiasts of all kinds, IT leaders, cybersecurity practitioners, and executives tasked with improving their security posture.

Earlier Event: March 20
Eugene Product Showcase