Next Meetup

Finding the Needle in a Haystack & Mitigating your Risks
***NOTE*** In order to enter this office you must have an ID or a Driver License. Join us for an evening with ElasticSearch and Outpost24 and learn how they're combating cybercrime with advanced data analytics and mitigating risk exposure to cyber threats. 5:00PM - Social Hour (Food & Beverages will be provided) 6:00PM - Introduction from organizer and sponsors 6:05PM - Guest Speaker from Elastic Session Title: Cyber Security...a search problem Q&A + Short Break 7:00PM - Guest Speaker from Outpost24 Session Title: Full Stack Security and the Prevention of Hacker Pivot Q&A 8:00PM - Networking Speaker Bio: Neil Desai Neil has built SOC’s (Security Operations Centers), architected defensible, and monitorable infrastructures for Fortune 500 US financial institutions. He has over two decades of information security experience and is currently working for Elastic. Abstract: Analyzing terabytes of data with response times measured in seconds is something security analysts dream of. Fast search queries for large amounts of data has been commonplace in other areas of IT. By looking outside of the information security silo to other disciplines, we can learn from them to better our abilities to find threats in the sea of data. By leveraging tools geared towards search and analytics, we can gain insight into the data that we haven’t had before. By enriching the data, we can get even more insight. Speaker Bio: Bob Egner With a constant eye on the evolving threat landscape, Bob is the advocate of the customer in their terms of security, value, and experience. He has led marketing, product management, and business development functions for large and small security and e-business companies in all regions of the world. In addition to a special focus on digital marketing, Bob highlights innovative contributions as companies such as Episerver, Check Point Software, and Pointsec. Abstract: There’s a gap between the hacker’s view and the defender’s view of an attack. The defender strives to break down the complex whole to simple components that can be assessed individually while the hacker thrives on complexity and sees opportunities in the white space between assessments. In this session you will learn how to move beyond component assessment of devices, networks, applications, data, and users into full stack cyber security assessment.


222 Merchandise Mart Suite 875 · Chicago, IL

    Past Meetups (3)

    What we're about

    The Chicago CyberSecurity group (CCS) is for anyone interested in learning about latest Cyber Threats, Cyber Threat Intelligence, CyberSecurity opportunities, CyberSecurity start-ups, gaining knowledge in new and emerging CyberSecurity attacks and solutions, best practices, CyberSecurity education, etc. If you are looking for networking, security solutions, reliable CyberSecurity firms that can help with your security needs, or considering a career in CyberSecurity then, this is a group you want to be. All skill levels are welcome.

    Join us on our Slack Channel

    Members (489)

    Photos (15)