NOLASec is a collective of researchers, professionals, students, and hobbyists in the Computer Security and Digital Forensics and Incident Response (DFIR) space. Our purpose is to bring together members of all IT-related fields for a monthly meeting where a rotating list of speakers present on interesting topics in information security and members can then network in an informal environment. There is no membership process and there are no dues (but donations are always welcome).
We generally have 2 speakers per monthly meeting using the "fire talks" format where speakers present for about 20 minutes each. After, we all hang out and attendees can ask the speakers questions as well as meet the other attendees. We have attracted a wide range of talks from high-level to highly-technical from some of the area's top information security experts. Our growth is based largely on word of mouth so feel free to invite anyone who you think may enjoy the events. Also, we are always looking for new speakers to keep things fresh every month, so have your ideas ready!
The next meetup is scheduled and announced more than a two weeks ahead of time! Not sure how that happened but I'll take it.
Our first speaker for the evening will be Michele Bousquet ([masked]) with:
"The glorious simplicity of Elliptic Curve Cryptography"
ECC has been touted as superior to RSA for initiating secure connections. How does it work, and why is it better? Here, Michele will break down the math (no complicated formulas!) and explain why ECC is a good choice for some applications.
Our second speaker for the evening will be .... drum roll please ... me. That's what y'all get for not volunteering to speak:
"Spotlight on the macOS Spotlight Facility"
The macOS Spotlight desktop search system (built in since 10.4) facilitates fast file search on live systems by indexing a wealth of useful information from files, including extracted text and metadata across many different file types. In addition to the metadata, there are other parts to the Spotlight system of forensic interest, including cache files of text extracted from files on the volume – files that may have been deleted – and how to associate them to their source files. Configuration plists that contain data on how the overall Spotlight system is configured, as well as configuration per-volume on the machine. I’ll explain some of the most interesting metadata that only exists in the index, plus a wealth of other valuable information.
Also, I don't know if all of y'all are aware, but Lucy's does charge us for the room (your friendly neighborhood organizers pay out of pocket, and are happy to continue to). No pressure at all, but if you're feeling rich and charitable, please pitch in here: https://secure.meetup.com/NOLASEC-A-Computer-Security-and-Forensics-Meetup/contribute/
-- Vico / @vicomarziale