What we're about

Meetup to talk IT Cybersecurity and related issues.

Currently we are slowly working through the HackThisSite.org missions, solving them as a group as lessons, NOT a watch me solve them presentation. We will group think and try several techniques to complete the mission together. I have not done any of these in advance.

These are casual sessions where everyone brings there own laptops, and we put our heads together to crack these missions. I'm running Kali, but so far any OS works, as long as you have a browser, cookie editor and some other basic tools at hand (decryptors and such) , most of which are available online.

We will, of course, also be talking about other security things as we do these, and if anyone wants to talk about a paticular topic, please bring it up.

Upcoming events (5+)

CyberSecurity monthly meeting

IDX

Risk Register – Who, what, where, and how As security professionals we work with risk every day. We face threat landscapes that change, new tools and technologies, new malware, and we have hundreds of tools, processes and procedures to choose from. How do you know what to prioritize and help focus your roadmap? Welcome to the Risk Register - a master list of all risks within an organization. These risks are often just focused on IT, but as a security professional your scope may be far outside IT. It could include other risks, in other parts of the business, and may include multiple vendors that you or others use. In this session we will discuss the best way to gather, document, track, and prioritize risks, not just within IT, but within your organization. Speakers: Sean Ventura VP & Chief Information Security Officer Atmosera Sean has over 30 years’ experience in the Information Technology field, with a focus on information security best practices and compliance. He was most recently the Director of Infrastructure and Security for ESCO a global Steel manufacturer operating in a dozen countries across six continents. He brings extensive experience in management of lean teams of infrastructure and security professionals providing a reliable and secure environment across a wide range of regulatory and legal frameworks. Previously, Sean has held progressively more senior roles within Gogo Air, providing security advisory and design for all the commercial wireless services, DDB/Omnicom, a worldwide marketing communications firm, as well as financial institutions, and national retail chains. Morgan Robinson Senior Account Executive Atmosera Morgan Robinson is a Senior Account Executive for Atmosera and has over 10 years' experience in the B2B solutions, client advocacy and account executive responsibilities. Her most recent endeavors include 2 years' in the technology space, with a focus on Microsoft products and solutions and yes she tries to keep her head in "the Cloud". Previously, Morgan has held account executive and client centric roles with two Fortune 500 companies within the financial and legal industry. She was awarded 8 times for her client advocacy within her career at US Bank. She brings a true passion for complex issues with high visibility and always keeping the customer best interest and the forefront of any business solution. Morgan's roots are the mid-west---go Buckeyes, but she loves to travel the world and has spent time in 14 countries and with 175 other countries to choose from, she will have lots of travel in her future.

CyberSecurity monthly meeting

Dickie Yo's Frozen Treats

ICE CREAM SOCIAL!!!!! @ Dickie Yo's

CyberSecurity monthly meeting

IDX

Several people have suggested something more in the 'How does it work' category, so this month I will be presenting my personal Certified Penetration Test exam process and methods using the Dev environment they gave me. I'll take through each of the steps so you can see an actual penetration of two Linux systems. I admit I am still trying to find my VMs used for this test, so there is a possiblity that we will have to do something else. Food: Snacks and such provided by TEK Systems, Inc.

CyberSecurity monthly meeting

IDX

Several people have suggested something more in the 'How does it work' category, so this month I will be presenting my personal Certified Penetration Test exam process and methods using the Dev environment they gave me. I'll take through each of the steps so you can see an actual penetration of two Linux systems. I admit I am still trying to find my VMs used for this test, so there is a possiblity that we will have to do something else. Food: Snacks and such provided by TEK Systems, Inc.

Past events (31)

CyberSecurity monthly meeting

IDX

Photos (14)

Related topics