##About Rootconf 2019:
The seventh edition of Rootconf is a two-track conference with:
- Security talks and tutorials in audi 1 and 2 on 21 June.
- Talks on DevOps, distributed systems and SRE in audi 1 and audi 2 on 22 June.
##Topics and schedule:
View full schedule here: https://hasgeek.com/rootconf/2019/schedule
Rootconf 2019 includes talks and Birds of Feather (BOF) sessions on:
- OSINT and its applications
- Key management, encryption and its costs
- Running a bug bounty programme in your organization
- PolarDB architecture as Cloud Native Architecture, developed by Alibaba Cloud
- SRE and running distributed teams
- Routing security
- Log analytics
- Enabling SRE via automated feedback loops
- TOR for DevOps
##Who should attend Rootconf?
- DevOps programmers
- DevOps leads
- Systems engineers
- Infrastructure security professionals and experts
- DevSecOps teams
- Cloud service providers
- Companies with heavy cloud usage
- Providers of the pieces on which an organization’s IT infrastructure runs -- monitoring, log management, alerting, etc
- Organizations dealing with large network systems where data must be protected
- VPs of engineering
- Engineering managers looking to optimize infrastructure and teams
For information about Rootconf and bulk ticket purchases, contact firstname.lastname@example.org or call 7676332020. Only community sponsorships available.
##Rootconf 2019 sponsors:
OSINT for Proactive Defense
In today’s age, when every organization has an online presence in multiple shape (eg. social media, code repositories, cloud infrastructure, etc.), it’s difficult to keep a track of the assets as well as the amount of sensitive information that goes out knowingly or unknowingly. Such assets or information can cause catastrophic damage to the organization, unless identified and remediated.
Examples of such data could be a legacy host running unauthenticated mysql, or a list of confidential subdomains leaking via Certificate Transparency, an anonymous read-only bucket serving images along with backup.tar, etc.
Since such issues can allow any attacker to compromise organization’s perimeter security, Security Teams should keep a very close eye on what information (about the organization) is being leaked out on the Surface as well as the Dark web.
This talk will discuss Open Source Intelligence (OSINT) Tools, Techniques and Procedures (TTP), that are highly useful and effective for Blue Teams in order to keep their perimeter security intact.
Below is an outline of the presentation:
- Overview of OSINT
- Why Security Teams should use OSINT
- Continuous Discovery and Monitoring of Assets
- Use OSINT Data for Periodic Attack Simulation
- Discovering Sensitive Information Leakage
- Monitoring Breached Passwords
- Proactively Identifying Security Incidents using SOCMint
- OSINT Countermeasures
Shubham Mittal is co-founder of @RedHuntLabs and is an active Information Security researcher with 7+ years of experience in Pentesting, OSINT and Perimeter Security. He has worked both in offensive as well as defensive security roles. He is a BlackHat Asia Review Board Member and has spoken/trained at multiple conferences including BlackHat, NullCon, HackMiami, c0c0n, etc. He is the author of OSINT Framework - DataSploit (listed in Top Ten Security Tools of 2016) and is co-founder of @Recon-Village which runs @DEFCON Vegas and China. He works from the command line, uses vi and loves beer.
- Previous Session (Example): https://www.slideshare.net/reconvillage/empowering-red-and-blue-teams-with-osint-c0c0n-2017 (This was for a mixture of Red and Blue team, but more focused towards Red Teams).