Topic: Ever wanted a command-line to every one of your endpoints? Now you can…
Abstract: No slides! We’ll spend our evening working on several different 1E Tachyon environments and show you how our affordable hunt + operations tool can make a difference where you work big or small. Rob Key and David Baldwin work for 1E and will show the group a sample of things you can do in Tachyon and then let folks from the audience come up and use the product to do different things. We’ll supply you with one of three different environments depending on how badly you want to break things. 😊
After a break and if the crowd is interested, we can then spend a few minutes designing a sample architecture with a member of the audience on a whiteboard. We can then, of course, talk about pricing at a high-level for anyone interested.
No pressure! If you’re interested in finding a tool that can return results from all of your endpoints in seconds regardless of whether they’re on your network or not and need it to not cost an arm and a leg, this is the tool for you.
Speaker: Rob Key with 1E
The CiNPA Security SIG is the Cincinnati Networking Professionals Association Security Special Interest Group. We meet monthly on the third Thursday of each month starting at 6:30 p.m.
The CiNPA Security SIG's monthly meeting format typically consists of one or two main monthly meeting topics featuring live presentations or demonstrations promoting open and interactive group discussions. Our focus is primarily on the defensive side of information security, but we delve into all other areas of cyber-security as well. Information security news, announcements, and round-table discussions follow our main meeting topics.
• Attendance qualifies for 2 hours of CPE or CEU credit towards certification renewals
• Maintaining awareness of new vulnerabilities and exploits
• Learning about the latest security tools, utilities, products, services, solutions, strategies, techniques, frameworks, and best practices
• Sharing of information regarding trends concerning enterprise systems and technology
• Hearing announcements of upcoming area security conferences and events
• Networking with peers in the local Information Security (InfoSec) community