Emerging Cyber Ranges: Competition to Compliance

Summary

Matthew J. Harmons SANS @ Night presentation Emerging Cyber Ranges: Competition to Compliance, delivered on June 27, 2018, explores how purpose-built environments can accelerate offensive and defensive security practice, foster competitive e-sports, and underpin formal compliance and product validation efforts .

2018-06-27 · 2 min · mjh

Internet of Everything: Hands-On Cyber Security

Summary

The SANS @ Night Internet of Everything workshop on June 21, 2017, by Matthew J. Harmon frames the cybersecurity challenges posed by a rapidly expanding landscape of interconnected devices and emphasizes why smart often means exploitable.

2017-06-21 · 2 min · mjh

Threat Intelligence and Baselining

2016-07-20 · 2 min · mjh

Threat Intelligence 101: Introduction and Foundations

2015-10-20 · 2 min · mjh

Threat Intelligence: Neighborhood Watch for Your Networks

2015-07-23 · 2 min · mjh

State of Cyber Security

2015-05-07 · 2 min · mjh

ACM Club Cyber Security Workshop

Summary

Matthew J. Harmons ACM Club Cyber Security Workshop, presented at Saint Paul College on April 9, 2014, frames the modern cybersecurity landscape as a high-stakes arena where adversaries backed by virtually limitless R&D budgets that need only exploit a single vulnerability to wreak havoc. Through vivid attack-map visuals and a rundown of headline-grabbing breaches, Harmon drives home that traditional defenses alone are no longer sufficient.

2014-04-09 · 2 min · mjh

DDoS Survival

2013-10-18 · 2 min · mjh

Cloud Security

2013-06-18 · 2 min · mjh

Java Exploits: Offense and Defense

Summary

Matthew J. Harmons (ISC)2 Twin Cities Chapter presentation Java Exploits: Offense and Defense, delivered on October 24, 2012, examines the pervasive risk of client-side Java vulnerabilities and outlines why these flaws represent a critical attack vector for organizations. Harmon, drawing on his two decades of security experience, highlights how the Java sandbox can be bypassed via reflection and code injectiondemonstrated by high-impact exploits documented by researchers like Joshua Drake and Adam Gowdiakand underscores the urgency of addressing these pervasive weaknesses.

2012-10-24 · 2 min · mjh

Security on a Shoestring Budget

Summary

The Minnesota Council for Non Profits presentation Security on a Shoestring Budget by Matthew J. Harmon and Natascha E. Shawver delivers practical guidance for nonprofit organizations to improve their security posture without large investments. It frames security as a mission enabler rather than a cost center and stresses that common-sense controls can dramatically reduce risk.

2012-03-16 · 2 min · mjh

Why Take the Risk? Doing Risk Assessments Right

Summary

The SANS presentation Why Take the Risk? Doing Risk Assessments Right by Matthew J. Harmon, delivered at the 30th Annual Minnesota Government IT Symposium on December 7, 2011, lays out a structured approach for organizations to identify, analyze, and manage IT risks. Harmon draws on industry standards and real-world examples to show how a disciplined risk assessment process can both prevent loss and add strategic value.

2011-12-07 · 2 min · mjh

Incident Handling, Forensics and Hacking Techniques

The SANS Incident Handling & Forensics presentation by Matthew J. Harmon provides a comprehensive overview of how organizations should prepare for, respond to, and learn from security incidents. Drawing on industry best practices and real-world examples, it emphasizes the importance of structured processes, clear communication, and rigorous evidence handling to minimize damage and restore operations promptly.

2011-10-19 · 2 min · mjh