Cork|Sec 95

Details
Running since June 2013, every month we have 2 talks focused on Security or Technology - followed by socialising with like minded people – and you can find out exactly what to expect on the About Us section of our Meetup page. Past talk details are on our wiki on http://corksec.com/. All people with any sort of an interest or level of knowledge in Security, Hacking and Emerging Technology are more than welcome to attend and feel free to bring like minded colleagues and friends.
Our talks come from our community so if you have an idea for a topic (anything for 10-60 minutes) please email us at DefconCork@gmail.com . Whether you are an experienced presenter, or presenting for your first time - CorkSec is a great venue for it - and we are happy to help you prepare and mentor you.
Teams room opens at 19:00 with talks starting at 19:05 on Microsoft Teams (Link to follow)
TALK 1 : Architecting for Resilience by Joel Aleburu
In application security vulnerability is “a hole or a weakness in the application, which can be a design flaw or an implementation bug, that allows an attacker to cause harm to the stakeholders of an application,” according to OWASP.
A flaw or weakness in system security procedures, design, implementation, or internal controls that could be exercised (accidentally triggered or intentionally exploited) and result in a security breach or a violation of the system's security policy.
Resilience is the ability of an organization to enable business acceleration by preparing for, responding to, and recovering from cyber threats. A cyber-resilient organization can adapt to known and unknown crises, threats, adversities, and challenges.
The ultimate goal of cyber resiliency is to help an organization thrive in the face of adverse conditions.
In this talk, Joel Aleburu will be talking about a key part of designing security resilience into applications primarily by identifying security flaws in solution architectures.
TALK 2 :
AWS - The Cloud Strikes Back!
or
AWS - Attack of the Clouds!
by Maurice Cronin
This is the second (hence the title puns) part in our on-going introduction to AWS and what you can do with it. This month we'll look a little deeper at the Shared Security model, run some commands using the AWS CLI, explore AWS documentation and if all goes well we will standup some infrastructure using a service called CloudFormation.

Cork|Sec 95