January 2011 Meeting
January meeting – How to Hack Large Companies and Make Millions – Chris Hadnagy, Operations Manager of Offensive Security
January meeting – How to Hack Large Companies and Make Millions – Chris Hadnagy, Operations Manager of Offensive Security
SHODAN: Resistance is Futile SHODAN (http://www.shodanhq.com) is dubbed at “The Computer Search Engine”. SHODAN has garnered attention from the U.S. Industrial Control System Computer Emergency Response Team (ICS-CERT) because anyone can discover “sensitive” ICS systems. In this talk I will … Continued
Security Challenges Faced by Small to Medium Sized Companies Small to Midsize Businesses have invested time and money to bring their business to life. They buy insurance to protect their business, put locks on the doors and install fire alarms … Continued
Exploring Font Based Steganography With A Focus On Tool Development The world of steganography has become stale as the same exfiltration techniques become easier and easier to detect. Once any major steganalysis tool can find the hidden payload, its game … Continued
The Privileged Challenge Up until the last few years, IT security managers have spent billions of dollars in securing the parameters of their organizations to keep out those who would bring harm to their internal networks. However in recent years, … Continued
War of the Worlds – Business vs. Security in the Social Web When it comes to the Social Web (Social Media, Social Networking, etc…), Business and Security can be on two totally different worlds. Business wants to open the social … Continued
Why Your Intrusion Prevention System is Susceptible to TCP Evasion This talk will discuss why any Intrusion Prevention System (IPS) is susceptible to evasion by any traffic carried over the TCP protocol, the majority of traffic into and out of … Continued
This presentation will discuss Advanced Persistent Threats trends we have observed from 2002-2010, and how we proactively identify them. Samples of captured malicious code will be presented, and several case studies will be referenced. Stephen Windsor, Booz Allen Hamilton Stephen … Continued
Overcoming the Limitations in Network Security Monitoring Ron Gula, CEO of Tenable Network Security, will discuss the current state of the information security industry and focus on how we tend to take our security tools at face value. Mr. Gula … Continued
Federal government key strategic information security initiatives update The federal government continues its risk management transformation by deploying key security standards and guidelines supporting a unified information security framework. This presentation will provide an update on key strategic information security … Continued