Archive for LimaCharlie

LimaCharlie Free Cybersecurity Workshop On 2/12/25 In Plano, TX

Posted in Commentary with tags on February 2, 2025 by itnerd

Join LimaCharlie at Legacy Food Hall in Plano, TX for an intensive, hands-on cybersecurity workshop tailored specifically for MSSPs, MDR providers, and incident response teams.

In this technical deep-dive, industry veterans Ken Westin and Matt Bromiley will guide you through practical implementations that directly address your operational challenges. 

Learn how to streamline your Okta security monitoring through purple team exercises, and master automated incident response workflows to dramatically improve your team’s efficiency. Discover how to leverage infrastructure as code and automation to scale your security operations while maintaining the high standards your clients expect.

These free workshops provide innovative ways to enhance your service capabilities and include a post-event happy hour for networking with your peers. Space is limited – reserve your spot today.

  • What: Free cybersecurity workshops featuring hands-on training with LimaCharlie and open-source adversary emulation tools 
  • When: February 12, 2025
  • Session 1: 1:00 PM – 3:00 PM – Purple Team Okta Security with Ken Westin – Identity Security Posture Management (ISPM) is a critical component to any organization’s security program, particularly in a highly distributed environment. In this hands-on workshop we will show attendees how to onboard Okta logs to the LimaCharlie Security Operations Platform, write detections for key events, and test detections using open source adversary emulation tools. The workshop will be run in an individual lab we will build using a combination of free and open source tools. A basic understanding of YAML and writing detections is helpful but not required.
  • Session 2: 3:00 PM – 5:00 PM – IR Automation with Matt Bromiley – Incident response is an art that requires speed and precision, oftentimes racing against adversaries and their actions. In this workshop, we will look at how to utilize LimaCharlie to automate incident response workflows from end-to-end. Attendees will learn how to utilize infrastructure as code to rapidly deploy IR-focused tenants, easily ingest various telemetry types, and deploy detections to automate the classification and prioritization of a client environment. Designed for incident responders, this hands-on session will highlight how LimaCharlie can streamline incident response efforts, giving your team the advantage it needs to quickly thwart attackers.
  • Happy Hour: 5:00 PM – 7:00 PM
  • Who: Security professionals, especially those from MSSP, MDR, and IR teams 
  • Why: To provide practical, hands-on experience with cutting-edge cybersecurity tools and techniques 

These workshops offer a unique opportunity for DFW-area security teams to enhance their skills in Okta security and incident response automation. Participants will work with real tools, including LimaCharlie, under the guidance of industry experts Ken Westin and Matt Bromiley.

2025 Cybersecurity Predictions From LimaCharlie

Posted in Commentary with tags on December 7, 2024 by itnerd

Here’s some forward-looking cybersecurity predictions for 2025 from Maxime Lamothe-Brassard, Founder & CEO of LimaCharlie. These insights delve into emerging trends poised to reshape the cybersecurity landscape in the coming year.

“There’s a significant trend unfolding in the cybersecurity landscape: a shift from the ‘Wild West’ of unrestricted ecosystems to highly gated environments. This isn’t about placing value judgments on whether this is good or bad, but recognizing the reality of our increasing reliance on technology in every facet of life—even in industries like hairdressing, where digital tools are essential for billing, scheduling, and more.

Historically, open ecosystems like early Windows PCs offered immense value, allowing users to run any code without restrictions. However, as platforms like iOS, Chrome OS, and even macOS evolve, the push toward more controlled and secure environments is becoming inevitable. The aim is to move away from the chaos of unregulated systems toward manageable, scalable cybersecurity practices.

In the next decade, we may see further convergence in operating systems — imagine macOS and iOS becoming indistinguishable. While the trajectory for other platforms remains uncertain, the overall direction is clear: tighter ecosystems designed to balance security and usability.”