{"id":3703,"date":"2023-10-19T15:15:43","date_gmt":"2023-10-19T19:15:43","guid":{"rendered":"https:\/\/community.mis.temple.edu\/itacs\/?p=3703"},"modified":"2023-10-19T15:15:43","modified_gmt":"2023-10-19T19:15:43","slug":"community-montgomery-college-cybersecurity-awareness-month-discussion","status":"publish","type":"post","link":"https:\/\/community.mis.temple.edu\/itacs\/2023\/10\/19\/community-montgomery-college-cybersecurity-awareness-month-discussion\/","title":{"rendered":"Community- Montgomery College Cybersecurity Awareness Month Discussion"},"content":{"rendered":"<div>\n<h2 class=\"x_MsoNormal\">Montgomery College Cybersecurity Awareness Month Discussion<\/h2>\n<p class=\"x_MsoNormal\">You are invited to the online talk: <strong>Blue Team Uses of Attack Frameworks <\/strong>By <strong>Prof.\u00a0<span class=\"markby1ulhd5w\" data-markjs=\"true\" data-ogac=\"\" data-ogab=\"\" data-ogsc=\"\" data-ogsb=\"\">David<\/span>\u00a0Vargas<\/strong>, Cybersecurity Professor, Montgomery College Center of Academic Excellence in Cyber<\/p>\n<\/div>\n<p><strong>Description<\/strong>: Organizations are constantly under attack. Attack frameworks are used by cybersecurity professionals to identify and describe intrusions so that they can be more easily identified and\/or prevented. They also provide a common language that makes it possible to better understand the nature of today\u2019s attacks. In this presentation, Prof. <span class=\"markby1ulhd5w\" data-markjs=\"true\" data-ogac=\"\" data-ogab=\"\" data-ogsc=\"\" data-ogsb=\"\">David<\/span>\u00a0Vargas will discuss the two most common attack frameworks used by industry today \u2014 the Lockheed Martin Cyber Kill Chain and MITRE ATT&amp;CK.<\/p>\n<p><strong>Venue<\/strong>: Cyber Lab, HT230, Germantown campus<\/p>\n<p><strong>Date<\/strong>: Thursday, October 19<sup>th<\/sup>, 2023\u00a0 at 12:00-1:00 PM EST,<\/p>\n<p><span lang=\"ES-GT\"><strong>Online<\/strong>: Via <a href=\"https:\/\/montgomerycollege.zoom.us\/j\/96183907006\">Zoom<\/a>\u00a0<\/span><\/p>\n<p><a title=\"Original URL: https:\/\/mcas-proxyweb.mcas-gov.ms\/certificate-checker?login=false&amp;originalUrl=http%3A%2F%2Fwww.montgomerycollege.edu.mcas-gov.ms%2Fmccyberlab&amp;McasCSRF=1f9133f1b22a2858e34e8ed61e57819de2e9310b838f7dc6f0e06496edb3219b. Click or tap if you trust this link.\" href=\"https:\/\/nam10.safelinks.protection.outlook.com\/?url=https%3A%2F%2Fmcas-proxyweb.mcas-gov.ms%2Fcertificate-checker%3Flogin%3Dfalse%26originalUrl%3Dhttp%253A%252F%252Fwww.montgomerycollege.edu.mcas-gov.ms%252Fmccyberlab%26McasCSRF%3D1f9133f1b22a2858e34e8ed61e57819de2e9310b838f7dc6f0e06496edb3219b&amp;data=05%7C01%7Cooreofeoluwa.koyejo%40temple.edu%7Cb98c83e6072441975fd708dbd032962f%7C716e81efb52244738e3110bd02ccf6e5%7C0%7C0%7C638332687945483646%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&amp;sdata=TyrQNR2n7aV16X7RDU6bgqwQZmzjs01DzZvTQkeydvA%3D&amp;reserved=0\" target=\"_blank\" rel=\"noopener noreferrer\" data-auth=\"Verified\" data-linkindex=\"1\">www.montgomerycollege.edu\/mccyberlab<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Montgomery College Cybersecurity Awareness Month Discussion You are invited to the online talk: Blue Team Uses of Attack Frameworks By Prof.\u00a0David\u00a0Vargas, Cybersecurity Professor, Montgomery College Center of Academic Excellence in Cyber Description: Organizations are constantly under attack. Attack frameworks are used by cybersecurity professionals to identify and describe intrusions so that they can be more [&hellip;]<\/p>\n","protected":false},"author":29750,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","enabled":false},"version":2}},"categories":[747805,91],"tags":[],"class_list":{"0":"post-3703","1":"post","2":"type-post","3":"status-publish","4":"format-standard","6":"category-community-2","7":"category-news","8":"entry"},"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack_sharing_enabled":false,"jetpack_shortlink":"https:\/\/wp.me\/p2CTMC-XJ","_links":{"self":[{"href":"https:\/\/community.mis.temple.edu\/itacs\/wp-json\/wp\/v2\/posts\/3703","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/community.mis.temple.edu\/itacs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/community.mis.temple.edu\/itacs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/community.mis.temple.edu\/itacs\/wp-json\/wp\/v2\/users\/29750"}],"replies":[{"embeddable":true,"href":"https:\/\/community.mis.temple.edu\/itacs\/wp-json\/wp\/v2\/comments?post=3703"}],"version-history":[{"count":1,"href":"https:\/\/community.mis.temple.edu\/itacs\/wp-json\/wp\/v2\/posts\/3703\/revisions"}],"predecessor-version":[{"id":3704,"href":"https:\/\/community.mis.temple.edu\/itacs\/wp-json\/wp\/v2\/posts\/3703\/revisions\/3704"}],"wp:attachment":[{"href":"https:\/\/community.mis.temple.edu\/itacs\/wp-json\/wp\/v2\/media?parent=3703"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/community.mis.temple.edu\/itacs\/wp-json\/wp\/v2\/categories?post=3703"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/community.mis.temple.edu\/itacs\/wp-json\/wp\/v2\/tags?post=3703"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}