• Exchange packets, frames, exploits, and/or conversation

    Online event

    We generally review security related happenings, share tips and tricks for configuring that shiny new technology, and chat about various topics such as security, privacy, exploitation, vulnerabilities, pen testing, web app security, CTFs, IoT security, mobile security and anything else members wish to discuss.

    Giving an upcoming talk at a security conference? This is your chance to practice! Want to reverse engineer today’s catch? Bring it along. Automate a task recently? Why not share?

  • Tech Alliance of SWFL: Hello 2022 Networking Party 🎉

    Collaboratory

    ✨ HELLO 2022 NETWORKING PARTY ✨

    Joins us to celebrate 2022 with our local tech friends and sister groups.

    This is the first event all sister groups are getting together to have a celebration and to present to the community our newly formed Tech Alliance of SWFL.

    This event is open to everyone who is curious to see what the local tech scene is all about. Please feel free to bring friends and family too.

    We will serve drinks and snacks provided by each of our groups, but you are welcome to bring anything if you wish.

    🎉 CO-HOSTING GROUPS:

    SWFL Coders:
    https://www.meetup.com/SWFL-Coders

    SWFL Sec:
    https://www.meetup.com/SWFLSec-Southwest-Florida-Infosec-Meetup

    SWFL Tech Nights:
    https://www.meetup.com/swfltechnights

    VR & AR of Southwest Florida:
    https://www.meetup.com/vrarswfl

    Tech Alliance of SWFL
    https://www.meetup.com/SWFLTechAlliance

    🎉 AGENDA:
    6:30 - Arrival /Networking
    6:45 - Introduction and announcements by all organizers
    7:00 - Networking

  • Suricata 101

    Online event

    Presentation Summary

    With the increasing reliance on the internet for all businesses and transactions, the importance of monitoring the network has never been greater. In order to detect or prevent such attacks, network monitoring is of the utmost importance. In this talk, we will introduce you to Suricata, which is a world-class network monitoring and security tool. Suricata is a robust engine for network detection, prevention, and security monitoring. This means that while Suricata can serve the purpose of detection and prevention, it can also provide you with a lot of network metadata with its engine that you can use to analyze the traffic and determine a course of action. Where does Suricata's power come from? Suricata is a high-performance network monitoring and security engine with active and passive monitoring, metadata logging and real-time file identification and extraction - this allows Suricata to quickly identify, stop, and assess the most sophisticated attacks. Suricata integrates seamlessly with your network and can be embedded within numerous respected commercial and open source solutions.

    Join us for an introduction to Suricata, where we shall show: how to install and use it on your network; how to build a simple system of detection on your home network; different ways Suricata ingests traffic; different logs of Suricata, and how to analyze them; and rule management with Suricata-update. We shall also work on a real-world malware example, see how to make Suricata detect it, and analyze logs to get a lot more information

    Bios:

    Shivani Bhardwaj

    Shivani is a Junior Developer at OISF. She has been involved in the development of Suricata and all its helper tools like Suricata-Verify (in-house QA project), Suricata-Update and suricatasc (Suricata Socket Control). She is found in India for most of the year.

    Juliana Fajardini Reichow

    Juliana started working with OISF through an internship with Outreachy and is now a Junior Developer working mainly with protocol implementation and writing documentation for Suricata. She strongly believes in the power of diversity and inclusion, communities, knowledge sharing, and giving back. Juliana currently lives in Portugal.

    1
  • Digital Forensics 101

    Online event

    Digital Forensics in Law Enforcement 101

    Digital Forensics defined

    According to NIST
    o The application of computer science and investigative procedures involving the examination of digital evidence - following proper search authority, chain of custody, validation with mathematics, use of validated tools, repeatability, reporting, and possibly expert testimony.

    According to EC Council
    o A branch of forensic science that focuses on the recovery and investigation of material found in digital devices related to cybercrime.

    What is digital forensics as it relates to law enforcement?

    Identification, collection, preservation, analysis, and reporting of evidence from digital sources (i.e. computer memory, hard drives, flash drives, mobile devices, memory cards, etc.)

    Demonstration of acquisition of data from small flash drive using FTK imager

    Brief discussion of necessity of write blockers (hardware or software) for this process

    Brief discussion of evidence of USB device connection to Windows computer in registry (HKEY_LOCAL_MACHINESYSTEMCurrentControlSetEnumUSBSTOR)

    Brief discussion of chain of custody (COC), physical device, image files
    o Image files are evidence
    o Disposition orders for physical devices and for image files

  • Panel: Securing Small and Medium Size Businesses

    Online event

    To celebrate National Cyber Security Awareness Month 2021, SWFLSec will be hosting a panel of industry experts to discuss quick wins SMBs can do now to secure their businesses. The panel will discuss free or low cost methods and tips to securing a business without breaking the bank. With some simple changes, some of the SMBs' security risks can be mitigated. Come listen to the experts as they're asked questions by Rachel and Will from The Coffee Table Talks! This promises to be an informative and fun event. Attendees will also be able to ask questions via our moderators too.

  • Password hash checking with DSinternals

    Online event

    We generally review security related happenings, share tips and tricks for configuring that shiny new technology, and chat about various topics such as security, privacy, exploitation, vulnerabilities, pen testing, web app security, CTFs, IoT security, mobile security and anything else members wish to discuss.

    Giving an upcoming talk at a security conference? This is your chance to practice! Want to reverse engineer today’s catch? Bring it along. Automate a task recently? Why not share?

  • Exchange packets, frames, exploits, and/or conversation

    Online event

    We generally review security related happenings, share tips and tricks for configuring that shiny new technology, and chat about various topics such as security, privacy, exploitation, vulnerabilities, pen testing, web app security, CTFs, IoT security, mobile security and anything else members wish to discuss.

    Giving an upcoming talk at a security conference? This is your chance to practice! Want to reverse engineer today’s catch? Bring it along. Automate a task recently? Why not share?

  • Exchange packets, frames, exploits, and/or conversation

    Online event

    We generally review security related happenings, share tips and tricks for configuring that shiny new technology, and chat about various topics such as security, privacy, exploitation, vulnerabilities, pen testing, web app security, CTFs, IoT security, mobile security and anything else members wish to discuss.

    Giving an upcoming talk at a security conference? This is your chance to practice! Want to reverse engineer today’s catch? Bring it along. Automate a task recently? Why not share?

  • SWFLSec Celebrates 2-Year Anniversary w/ Chris Hadnagy AMA

    Online event

    SWFLSec celebrates their 2-Year Anniversary with special guest Chris Hadnagy! This will be an AMA event; that's right, come celebrate with us and have the chance to ask Chris Hadnagy anything.

    Chris possesses over 17 years of experience as a practitioner and researcher in the security field. He is the author of 3 (soon to be 4) books as well as 3 different training courses taught around the globe. Chris has trained and taught various branches of the US Government in the art and science of social engineering, including the FBI, SOCOM and others. Chris has been invited to the Pentagon to debrief 30+ general officers and government officials on social engineering and its effect on the United States.

    Chris established the world’s first social engineering penetration testing framework at www.social-engineer.org, providing an invaluable repository of information for security professionals and enthusiasts. That site grew into a dynamic web resource including a podcast and newsletter, which have become staples in the security industry and are referenced by large organizations around the world.

    Chris specializes in understanding how malicious attackers exploit human communication and trust to obtain access to information and resources through manipulation and deceit. His goal is to secure companies by educating them on the methods used by attackers, identifying vulnerabilities, and mitigating issues through appropriate levels of awareness and security.

  • Mental Health Awareness Month

    Online event

    SWFLSec has agreed to host, along with SWFL Coders and Pyladies SWFL, a panel of several speakers from various industries to speak on topics related to mental health for Mental Health Awareness Month. Please join us for this raw talk.

    Our speakers will be brutally honest about their lives and living/experience with:

    Anxiety
    Autism
    Bullying
    Imposter syndrome
    Relationship stress

    They can talk about what they have lived through, the stereotypes that exist around their chosen fields and how when combined with their heritage and gender they have affected their jobs, and what it has taken to get where they are.

    4