Take an adventure through Cyberspace as we scratch the surface of two vulnerabilities that shook the IT world in early 2018 - Spectre and Meltdown. In this webinar we will compile and run the proof of concept code for these two exploits in a safe online laboratory environment. We will also briefly touch on mitigation techniques for these attacks.
- Run the Spectre proof of concept in order to understand the offensive side of the vulnerability.
- Check Windows control settings to see if the system is susceptible to the attack.
- Go through the patching process in order to understand the defensive side of the vulnerability.
- Run the Meltdown proof of concept in order to understand the offensive side of the vulnerability.
- Check Linux kernel versions and patch levels.
- Compare kernel versions and exploit possibilities.
Manager of Technical Content
Dustin Brewer has 14 years of experience in the IT field beginning with networks, programming, and hardware specialization. While serving in the U.S. Military, he excelled in the Cybersecurity field with Computer Incident Response Teams and as a Senior Test Engineer while stationed at Fort Meade. Working as an independent contractor and lead developer for defense contract agencies, he specialized in computer networking security, penetration testing, and training for various DoD and commercial entities. As the Manager for Cybersecurity Technical Content with ISACA, he currently develops innovative training programs to best prepare cybersecurity specialists for the future of this dynamic field.