@ErikVaBu Profile picture

Erik Van Buggenhout

@ErikVaBu

Co-founder of NVISO, SANS Instructor & Author. Failed comedian. Red (purple) teaming & incident response.

Similar User
Stephen Sims photo

@Steph3nSims

John Hubbard photo

@SecHubb

NVISO photo

@NVISOsecurity

Beau Bullock photo

@dafthack

Jon Hencinski photo

@jhencinski

Sarah Edwards 👩🏻‍💻🐈‍⬛ photo

@iamevltwin

Ismael Valenzuela photo

@aboutsecurity

Ryan

@rj_chap

Roberto Rodriguez 🇵🇪 photo

@Cyb3rWard0g

Anuj Soni photo

@asoni

sigma photo

@sigma_hq

NVISO Labs photo

@NVISO_Labs

Heather Mahalik Barnhart photo

@HeatherMahalik

Xavier Mertens @xme@infosec.ecxhange 🇸🇬 photo

@xme

Jorge Orchilles photo

@jorgeorchilles

Erik Van Buggenhout Reposted

🔮 Ready to see the future of #DetectionEngineering? Join @Steph3nSims & @ErikVaBu TOMORROW to learn how to create an automated, always-on pipeline that integrates #SOC tech, SIEM/XDR, SOAR, & ChatGPT. ➡️ Register: sans.org/u/1xK8 #PurpleTeaming #Automation

Tweet Image 1

Erik Van Buggenhout Reposted

What if your #DetectionEngineering pipeline was always on? 😮 👉 Join @Steph3nSims and @ErikVaBu as they show how to automate your detection analytics with a CI/CD pipeline that continuously tests and deploys in real-time. ➡️ Register: sans.org/u/1xK8 #PurpleTeam

Tweet Image 1

Erik Van Buggenhout Reposted

The new 3-day course "SEC535: Offensive AI" is currently in development with "Foster Nethercott" @OSTact13, who just joined Twitter/X. I'm really looking forward to this one! It should be set to beta in a few months.


Erik Van Buggenhout Reposted

Learn how to build the always-on purple team through #GenAI automation merged with industry-leading SOC technologies. Speakers @Steph3nSims and @ErikVaBu share their methodology, backed by demo, in this recorded #RSAC 2024 presentation. spr.ly/601793i4H


Erik Van Buggenhout Reposted

Quick Hackfest Hollywood keynote announcement: Day One Keynote: David Weston (@dwizzzleMSFT) Day Two Keynote: Yarden Shafir (@yarden_shafir) October 28th & 29th in Los Angeles! Register for virtual (free) & in-person attendance here: sans.org/cyber-security…


Erik Van Buggenhout Reposted

⚠️ Session alert: Did you catch @ErikVaBu, SANS Instructor & Co-founder of @NVISOSecurity, in his compelling session 'From Chatbot to Destroyer of Endpoints: Can ChatGPT Automate EDR Bypasses?' Share key takeaways! @RSAConference | #Cybersecurity #TheArtOfPossible

Tweet Image 1

Erik Van Buggenhout Reposted

At RSA 2024 SF I'll be doing a co-talk with @ErikVaBu on "The Always On Purple Team: An Automated CI/CD for Detection Engineering" on May 5th at 10:50AM, as well as a Keynote Panel on "The Five Most Dangerous New Attack Techniques You Need to Know About" on May 7th at 4:15PM!


Erik Van Buggenhout Reposted

RSA CFP Results: 1 talk Accepted - The Always-On Purple Team: An Automated CI/CD for Detection Engineering with @ErikVaBu 1 talk Declined - The State of Binary Exploitation: How much time do we have left? I fought the urge to do an AI talk! 😈


Erik Van Buggenhout Reposted

Our Day 2 keynote speaker at Hackfest Hollywood in November is Lina Lau (@inversecos), delivering some cutting-edge cloud hacking content! The full agenda with all speakers to be announced very soon! sans.org/cyber-security… @SANSOffensive

We are thrilled to have @inversecos Keynote #SANSHackFest this November! Join us in Hollywood for 2 days of highly technical talks, a NEW #OffensiveOps CTF, and a chance to connect with legends in the #PenTest community. Learn More: buff.ly/43z0Rwq #RedTeam #Cloud

Tweet Image 1


Erik Van Buggenhout Reposted

How can we ensure purple teaming is not a stand-alone activity and integrate it into Continuous Security Operations efforts? Purple team experts @Steph3nSims & @ErikVaBu have an answer in this #RSAC 2023 Top-Rated Session. spr.ly/6011Pms73

Tweet Image 1

Erik Van Buggenhout Reposted

Quite the turnout for @Steph3nSims and @ErikVaBu of @NVISOsecurity speaking about Building The Always-On #PurpleTeam. #RSA2023 Think we might have to run this as a webcast. Let us know what you think!

Tweet Image 1
Tweet Image 2

Erik Van Buggenhout Reposted

🚨 BETA COURSE 🚨 New SANS course SEC598 #SecurityAutomation for Offense, Defense, & #Cloud is now open for registration. Special BETA PRICING applies to this run only! This course will sell out. View the syllabus and register here: sans.org/u/1pXX

Tweet Image 1

Come and join @Steph3nSims (@SANSInstitute) and myself for some thoughts on how purple teaming can be integrated in Security Operations!

We are thrilled to announce that @ErikVaBu's talk on "Always-on #PurpleTeaming" has been accepted at the @rsaconference! Join us as we explore the latest techniques in #SecurityAutomation and #AdversaryEmulation and learn how to "hack the hackers". lnkd.in/edHb_Ehb

Tweet Image 1


Erik Van Buggenhout Reposted
Tweet Image 1

Erik Van Buggenhout Reposted

New blog post! Title: Cortex XSOAR Tips & Tricks – Leveraging dynamic sections – number widgets | By Benjamin Danjoux Link: wp.me/p84lDr-3oo #infosec #XSOAR #soc #automation


Erik Van Buggenhout Reposted

I'll be giving a couple of talks at RSA this year. One on bug hunting and one on Purple Teaming with @ErikVaBu Hope to see you there.


Erik Van Buggenhout Reposted

10 years ago, we embarked on a journey to contribute to a safer society. Together, we made it a reality! This would not have been possible without the trust of our clients & partners and the dedication of every single NVISO bird over the last decade. Thank you all! #OneNVISO

Tweet Image 1

Erik Van Buggenhout Reposted

NVISO excels in first-ever @MITREattack Evaluations for Managed Security Services! Visit mitre.nviso.eu for more information about the evaluation results and our #MSSP offering. #OilRig #MITRE #cybersecurity

Tweet Image 1

Erik Van Buggenhout Reposted

We’re extremely proud to announce the official opening of a new home in #Greece for almost 30 NVISO birds. Right in the heart of #Athens! Our strengthened team of battle-hardened cyber security experts now spans across five offices in four countries! #OneNVISO

Tweet Image 1

Loading...

Something went wrong.


Something went wrong.