TakeDownCon 2016 (Rocket City)
Conferences (Cons) and training events where people from the same industry have become a great resource for people in the industry to networks, share research and give back. I submitted my call for papers and got picked up to participate in TakeDownCON by the EC Council founda...


Immersed in Rocket City
Conferences (cons) and training events where people from the same industry gather have become a great resource to network, share research, and give back. I submitted my call for papers and got picked up to participate in TakeDownCON by the EC-Council Foundation in Huntsville, AL. The event spanned two days and featured vendors, a capture the flag competition, and loads of opportunities to connect. The first day was the red team track and the second was the blue team track. This was my first information security presentation at a conference, and I definitely had a blast. I have been to about half a dozen conferences, but participating as a speaker is a slightly different experience—the best of both worlds. I attended all of the talks and placed 2nd in the Booz Allen Hamilton capture the flag competition.

Defending Against a Million “Attacks”
My talk was on Defending against 1,000,000 Cyber Attacks. The core idea was that every time you look around some company or government organization is spouting out a huge number of “cyber-attacks” to their network every day. Defending networks is never easy, but there is often a bit of exaggeration in how these encounters with intruders are counted. Misconceptions in reporting—and in understanding what constitutes an attack—tend to inflate the numbers. There are “attacks” like port scanning and brute forcing happening all across the internet at all hours of the day. Spreading awareness about them informs the public on just how “intense” these attacks truly are. To demonstrate this, I bought an attractive domain, paired it with a honeypot, and let the fun begin.

Slides and Resources
Here are the slides from my presentation: Download
Keep reading
View archiveHow I got started and my journey in Cybersecurity
Recently I was extended an opportunity to speak at an undergraduate class of computer science. The topic I was to speak on was how I got into cybersecurity and my experience of different roles within the public and private sector of cybersecurity. I thought I'd share my story...
What I Built From a LinkedIn Data Archive and One Focused AI Session
I turned a LinkedIn data archive into reusable AI context, a speaker sheet, a use-cases guide, and a downloadable skill for repeating the workflow.
Website and Blog Redesign
Today I’m launching a redesigned, integrated michaelbanks.org experience that brings my website and blog together into one platform.