Skip to content
View ch33r10's full-sized avatar
๐Ÿ’ฏ
That Ch33r10
๐Ÿ’ฏ
That Ch33r10
Block or Report

Block or report ch33r10

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this userโ€™s behavior. Learn more about reporting abuse.

Report abuse
ch33r10/README.md

Header

Hola | Hiya | Yo | Salut | ะŸั€ะธะฒะตั‚ | ์•ˆ๋…•ํ•˜์„ธ์š” | ไฝ ๅฅฝ | ุฃู‡ู„ุง

  • Doctoral Dissertation - Enterprise Purple Teaming - Link
  • Purple Team Exercise Idea Queue - Link
  • Small Business Owner CTI Resource - Link
  • Stalkerware IOCs, Threat Report, & Reverse Engineering APKs - Link

ADVISORY BOARDS & CFP REVIEW BOARDS

  • SANS EMEA CyberThreat Summit 2019, 2022, 2023 & 2024
  • CactusCon 2019, 2020, 2021, 2022 & 2023
  • SANS Pen Test HackFest 2021, 2022 & 2023
  • DEF CON Blue Team Village 2020 - 2022
  • SANS CTI Summit 2021
  • Purple Team Summit 2020
  • SANS Purple Team Summit 2019 & 2021
  • SANS Summit Steering Committee Member 2020
  • CircleCityCon 2020
  • Grayhat 2020 Blue Team Village

AFFILIATIONS, COMMITTEES & MEMBERSHIPS

  • Crimeware Member - 2019 to Present
  • Curated Intelligence Member - July 2021 to Present
  • Infragard Chicago Member 2019 to Present
  • YaraExchange Member - 2019 to Present
  • FS-ISAC Member - August 2023 to Present
  • H-ISAC Cyber Threat Intel Program Development Working Group Chair - January 2023 to June 2023
  • H-ISAC Threat Intelligence Committee Member - August 2022 to June 2023
  • ESET Women in Cybersecurity Scholarship Committee 2023
  • National Science Foundation SaTC (Secure and Trustworthy Cyberspace) Participant 2020-2021
  • CAPWIC Capital Region Celebration of Women in Computing Scholarship Committee 2020

CONTRIBUTIONS

  • Reviewer for SCYTHE's Purple Team Exercise Framework v1 (PTEF)
  • Field Classifications Contribution for Attack2Jira by Mauricio Velazco and Olindo Verrillo - Link
  • Contributing Author to an O'Reilly book: 97 Things Every Information Security Professional Should Know by Christina Morillo @divinetechygirl

INFOSEC COMMUNITY PARTICIPATION

  • SANS Holiday Hack Voice for an Elf at the end of the CTF - 12/2023
  • Blue Team Village DEF CON 29 - Malware Analysis Tournament 6th Place
  • Blue Team Village Lead (on sabbatical until June 2022) @BlueTeamVillage
  • Blue Team Village Team Lead in Organizing a 3-day Conference at GrayHat 10/2020 BTV YouTube Playlist
  • Founder of the Women in Information Security Study Group - Link
  • Circle City Con Social Media Marketing Specialist 2017-2020
  • Diana Initiative Volunteer 8/2018
  • DC602 Web Designer 2017
  • CCNA Cyber Ops Study Group Moderator 2016+

TALKS

    ๐Ÿ–๏ธ2024

    • ChiBrrCon - Building Your First Cybersecurity Program from Scratch - Panel with Michael Glatz, Daniel Sebit, Blake Nisius
    • Marymount University - Navigating the Journey of Earning a Doctorate in Cybersecurity - Panel with Dr. Fatou Sankare, Dr. Rudy Machuca, Dr. Shenita Freeman, Dr. Vito Nozza, and Dr. Kimberlee Ann Bronnock

    ๐Ÿ˜2023

    • H-ISAC Cyber Threat Intel Program Development Working Group - The Expanding Universe of Cyber Threats
    • BSidesSF - Keynote - The Expanding Universe of Cyber Threats
    • Highland Park High School - Cybercrime - 10/20/2023

    ๐Ÿ’„2022

    • H-ISAC October 2022 Monthly Threat Briefing - MFA/VPN Threats
    • H-ISAC Purple Team Working Group - Enterprise Purple Teaming
    • Marymount University - My Doctoral Dissertation Journey
    • H-ISAC Cyber Threat Intel Program Development Working Group - CTI Program Development Workshop
    • DEF CON 30 Blue Team Village Panel - The DFIR REPORT Homecoming Parade
    • RSAC Dark Arts Village - Let's Get Offensive: Building A Purple Culture
    • ISACA Madison - Adversary Detection Pipelines: Finally Making Your Threat Intel Useful
    • SunflowerCon - International Cybersecurity Incidents for In-House CTI Analysts (DONATE TO NOVA UKRAINE at novaukraine.org)
    • DEF CON SkyTalks New Year's Eve Twitch Stream

    ๐Ÿ’ฏ2021

    • DEF CON SkyTalks New Year's Eve Twitch Stream
    • KringleCon - The Abominable Snowman's Threat Hunting Adventure
    • BBC World Service Business Daily Interview 11/2021 - Stalkerware: Tech-enabled domestic abuse skyrocketing - Link
    • BlueSpace Ekoparty - Keynote - Paint It, Blue: Transitioning from CTI to HUNT
    • THOTCON - Adversary Detection Pipelines: Finally Making Your Threat Intel Useful
    • MindTheSec - Keynote - SuperCharge Your Purple Team Exercises with Threat Intelligence
    • BlueTeamVillage at DEF CON 29 - BTV Presents: Threat Report Roulette with Jorge Orchilles, Chris Russell, Danny D. Henderson Jr., Karan Aditya Ghoshal, Ricky Banda, Will Thomas, and Blind Hacker JoeB
    • BlueTeamVillage at DEF CON 29 - BTV Presents: Welcome to #IRLIFE. A live IR TableTop Panel with Plug, @ttheveii0x, @scsideath, @Paladin316, @innismir, Wayland & Bassem Helmy
    • ISACA Tucson - Adversary Detection Pipelines: Finally Making Your Threat Intel Useful
    • Temple University - Executive MBA Guest Lecture on Enterprise Cybersecurity
    • RSAC - Lessons Learned from Diverse Paths to Successful Cybersecurity Careers Panel with @hexplates & @InnoEroraha, Moderated by @John_Pescatore
    • RSAC - Jill and the BeenSTALKed Panel with @C_3PJoe, Moderated by @ChloeMessdaghi
    • SANS CTI Summit - The CTI Shadow Army: Tales from the Trenches - Small Business Owner/Solopreneur Edition
    • SANS CTI Summit - DAY 1 Wrap-Up Panel
    • SANS CTI Summit - Day 2 Wrap-Up Panel
    • SANS CTI Summit - Happy Hour: CTI Career Success

    ๐Ÿ”ฅ2020

    • United Nations World Food Programme - Digital Abuse: Linking Cybersecurity and Intimate Partner Violence
    • SANS BIPOC in Cybersecurity Forum: From Inclusion to Equity - Public Speaking: Feel the Fear and Do It Anyway
    • BlackHat Asia - Adversary Detection Pipelines: Finally Making Your Threat Intel Useful
    • Ekoparty - Every Breath You Take: A CTI Review of Stalkerware
    • HATHCon - Cultivate Your Human Network Like a Garden Panel with @InfosecSherpa @Djax_Alpha
    • CONFidence Conf - Super Charge Your Purple Team Exercises with Threat Intelligence
    • Diana Initiative - CTI Mindset as a Technique for Blue Teamers
    • ITSP Magazine Podcast - Purple Teaming and CTI
    • RedTeamVillage at DEF CON 28 - Indicators of Emulation: Extra Spicy Adversary Emulation with @haydnjohnson
    • BlueTeamVillage at DEF CON 28 - Indicators of Emulation
    • BSides Porto - Every Breath You Take: A CTI Review of Stalkerware
    • CircleCityCon - Every Breath You Take: A CTI Review of Stalkerware
    • WHackzCon - Adversary Detection Pipelines: Finally Making Your Threat Intel Useful-KPOP THEMED
    • Guest Chef on Hacker Kitchen (Unicorn Chef) - Cooking Turkey Fajitas
    • Celebration of Cyber Scholarship - Review of my work since 5/2019
    • GRIMMCon - Adversary Detection Pipelines: Finally Making Your Threat Intel Useful with @B00m_s1ang @Wookiee @_glitchXR
    • ShmooCon XVI - Adversary Detection Pipelines: Finally Making Your Threat Intel Useful
    • Department of Defense CyberDT Cross-Service Working Group (XSWG) - Adversary Detection Pipelines
    • SANS CTI Summit - Every Breath You Take: A CTI Review of Stalkerware

    โœจ2019

    • BSides Chicago - Threat Intel For The Win!
    • ISC2 Security Congress - CTI AfterDark
    • SANS Purple Team Summit - Guardians of the Purple Team Galaxy: The Purple Agenda with @BenGoerz
    • Texas Cyber Summit - Winning Everyday at Threat Intel
    • Digital Shadows #ShadowTalk Podcast - Threat Intel Time Management & Prioritization
    • ICMCP Annual Conference - CTI: TTPs vs. Attribution
    • DerbyCon IX - It Must Be Fancy Bear!
    • Mental Health Hackers Village at DerbyCon IX - Hacking the Autonomic Nervous System with Somatic Experiencing
    • SANS Women's Connect Event - My Infosec Journey
    • Breaking Badness Podcast - Summer Camp 2019 Mini-Series
    • Diana Initiative - CTI AfterDark
    • Diana Initiative - In The Wake of Advanced Persistent Threat...to Your Personal Safety with @hexplates
    • BlueTeamVillage at DEF CON 27 - The Cyber Threat Intelligence Mindset
    • SANS Webcast - ATT&CKing your Enterprise: Adversary Detection Pipelines & Adversary Simulation with @BenGoerz
    • Purple Squad Security Podcast - Episode 59: Business Processes in Infosec with Cheerio
    • CircleCityCon - F! Attribution
    • RSAC - IOT Security Panel
    • RSAC - Peer2Peer Session: Leveraging Tactical Threat Intelligence for Strategic Decision Making
    • RSAC - Birds of a Feather: Everyday Leadership for Women in Information Security
    • Art into Science: A Conference for Defense ACoD - CTI 24/7: Operationalizing Cyber Threat Intelligence
    • SANS CTI Summit - Lightning Talk
    • ShmooCon XV - CTI 24/7: Operationalizing Cyber Threat Intelligence
    • SANS Webcast - CTI 24/7: Operationalizing Cyber Threat Intelligence

    ๐Ÿ˜‰2018

    • THEIIA/ISACA/ISSA Chicago Chapter Annual Conference - A Day in the Life of a CTI Analyst with @medic642

ARTICLES

  • tl;dr sec Newsletter mention - Enterprise Purple Teaming - Link
  • Marymount University Spotlight - Dr. Xena Olsen - Link
  • LatinaStyle Article - Advocacy and Sponsorship are Vital by Dr. Xena Olsen, MBA - Link p. 48
  • CSO Online Article by Josh Fruhlinger - 8 top penetration testing certifications employers value - Link
  • International Women's Day 2021 SANS Blog by @SANSJen - Link
  • Splunk Staff Picks December 2020 by Ryan Kovar - Link
  • Secure Disruptions Mention by Grace Chi - Link
  • SANS Blog: Public Speaking: Feel the Fear and Do It Anyway by @SANSJen - Link
  • Dark Reading Article by Robert Lemos - Link
  • Dark Reading Article by Kelly Sheridan - Link
  • SANS Cyber Threat Intelligence Summit 2020: A Recap by Rick Holland - Link
  • TechTarget Article by Michael Heller - Link
  • Tanya Janca Blog Mention for Hacker Summer Camp 2019 - Link
  • Katie Nickels Blog Mention - Link

EDUCATION & CERTIFICATIONS

  • Cornell - Leadership Essential Certificate - December 2023 - July 2024
  • Cornell - Psychology of Leadership Certificate - January 2024 - July 2024
  • Oakton Community College - Leadership and Management Courses - Spring 2024
  • The Leadership Consortium - Leadership Training - September 2023 - November 2023
  • McKinsey Connected Leaders Academy - Management Accelerator Program - May 2023 - June 2023
  • D.Sc. Cybersecurity at Marymount University 2022 - Link
  • MBA IT Management 2019
  • BSIS Humanities and Science 2013

AWARDS & SCHOLARSHIPS

  • The Leadership Consortium Scholarship - August 2023
  • SANS FOR508 Capstone Challenge Coin Recipient - Team ChatGPT Ninja LLC - December 2022
  • SANS Women's Academy 2017 Graduate
  • ESET's 6th Annual Women in Cybersecurity Scholarship recipient 2021 - Link
  • Security Innovation DEF CON 27 Scholarship 2019
  • WISPDEFCON Scholarship DEF CON 26 - 2018
  • Women in Tech Scholarship 2017
  • Linux Security Summit and Open Source Summit Scholarship 2017
  • Executive Women's Forum (EWF) Future Female Leaders Scholarship Program to attend BlackHat USA 2017
  • CCNA Cyber Operations Scholarship Program 2016

FOR THE LAWYERS
"The opinions expressed in this Github repo are those of the individual account, in their individual capacity, and not necessarily those of the employers. Mention of any vendors, services, products, or otherwise does not endorse them as a vendor. This content and any related discussions are solely the views, opinions, and experiences of the participants and should not be presumed to reflect the opinion or the official position of any employers of the participants. Examples and views provided herein, including strategies, goals, targets, and indicators are for illustrative purposes only and should not be regarded as representative of the participants' employers or respective portfolios. To the extent that this participation, discussion, and interview outlines a general technology direction, the participants' employers have no obligation to pursue any such approach or to develop or use any functionality mentioned herein. Any suggested technology strategy or possible future developments are subject to change at the employers' sole discretion without notice. Content in this presentation is the intellectual property of the applicable creators and may be protected under the copyright laws of the United States and/or other countries. All trademarks are the property of their respective owners and are used for informational purposes only."

Pinned

  1. EnterprisePurpleTeaming EnterprisePurpleTeaming Public

    Purple Team Resources for Enterprise Purple Teaming: An Exploratory Qualitative Study by Xena Olsen.

    621 95

  2. Stalkerware Stalkerware Public

    YARA 25 4

  3. SANSCTISummit2021 SANSCTISummit2021 Public

    SANS CTI Summit 2021 Resources

    11 2

  4. BlackHatAsia2020 BlackHatAsia2020 Public

    Adversary Detection Pipelines: Finally Making Your Threat Intel Useful -- BlackHat Asia 2020 Resources and References

    7 3

  5. THOTCON0xB THOTCON0xB Public

    THOTCON 0xB Adversary Detection Pipelines Talk on 10/8/2021 in Chicago, IL.

    7 3

  6. BSidesSF2023 BSidesSF2023 Public

    BSidesSF Keynote 2023 - The Expanding Universe of Cyber Threats

    5 1