March 2011 Meeting

posted in: Meetings | 0

Talk Title: Decade of IT Security Assessments As vulnerabilities and threats continue to increase at a daunting pace, so does the demand for performing IT security assessments. This presentation covers the volume of various regulatory compliances associated with assessments and … Continued

February 2011 Meeting

posted in: Meetings | 0

Next Generation Network Security: A New Era of Application Control – Brandon Conley, VP  Enterprise Sales, SonicWALL, Inc

January 2011 Meeting

posted in: Meetings | 0

January meeting – How to Hack Large Companies and Make Millions – Chris Hadnagy, Operations Manager of Offensive Security

December 2010 Meeting

posted in: Meetings | 0

SHODAN: Resistance is Futile SHODAN (http://www.shodanhq.com) is dubbed at  “The Computer Search Engine”. SHODAN has garnered attention from the U.S. Industrial Control System Computer Emergency Response Team (ICS-CERT) because anyone can discover “sensitive” ICS systems. In this talk I will … Continued

November 2010 Meeting

posted in: Meetings | 0

Security Challenges Faced by Small to Medium Sized Companies Small to Midsize Businesses have invested time and money to bring their business to life. They buy insurance to protect their business, put locks on the doors and install fire alarms … Continued

October 2010 Meeting

posted in: Meetings | 0

Exploring Font Based Steganography With A Focus On Tool Development The world of steganography has become stale as the same exfiltration techniques become easier and easier to detect.  Once any major steganalysis tool can find the hidden payload, its game … Continued

September 2010 Meeting

posted in: Meetings | 0

The Privileged Challenge Up until the last few years, IT security managers have spent billions of dollars in securing the parameters of their organizations to keep out those who would bring harm to their internal networks. However in recent years, … Continued

August 2010 Meeting

posted in: Meetings | 0

War of the Worlds – Business vs. Security in the Social Web When it comes to the Social Web (Social Media, Social Networking, etc…), Business and Security can be on two totally different worlds. Business wants to open the social … Continued

April 2010 Meeting

posted in: Meetings | 0

Why Your Intrusion Prevention System is Susceptible to TCP Evasion This talk will discuss why any Intrusion Prevention System (IPS) is susceptible to evasion by any traffic carried over the TCP protocol, the majority of traffic into and out of … Continued

March 2010 Meeting

posted in: Meetings | 0

This presentation will discuss Advanced Persistent Threats trends we have observed from 2002-2010, and how we proactively identify them.  Samples of captured malicious code will be presented, and several case studies will be referenced. Stephen Windsor, Booz Allen Hamilton Stephen … Continued