What we're about

This group is for all IT professionals, past, present, and future. We are a dedicated group of professionals who love to learn about anything in the broad IT field, and our group is for all skill levels. We host at least one meetup a month where we get together to learn about new technologies, fields, and opportunities. Our guest speakers are full-time professionals who work with cutting-edge technologies and want to share their passions.

Recruiters are always welcome at our events. Networking is a key to success when you are job hunting, so please reach out to any of the organizers with your resume if you would like us to give it to our recruiting partners.

Intellectual Point has been kind enough to host our meetup since its inception. If you would like to connect with Carrie at Intellectual Point please use carrie@intellectualpoint.com.

Upcoming events (3)

HANDS-ON THREAT HUNTING UTILIZING THE ELASTIC ELK STACK

Intellectual Point

The days of using excel to find malicious activity are over. Breaches are only expanding in size, so incident responders need their own way of growing out of the days of using excel to hunt through mountains of data. In this workshop, you will learn how to create your own enterprise-wide hunting platform using ELK with data enrichment feeds. Additionally, creating the means of retrieving the data from the various endpoints and data sources will also be introduced and explained throughout the course. Students will deploy PowerShell scripts across a customized network environment to gather critical data necessary to respond to an incident. Once the data has been collected students will then enrich the data from both a normalization perspective as well as using visualizations to assist in finding outliers and anomalies within the data sets. This course will teach you how to not only set up an ELK server specifically geared to facilitate powerful hunting, but will also show you how to collect data efficiently from every single endpoint on your network in a very short span of time, thereby enabling you to proactively hunt on a regular basis. Ben's bio: Ben brings a diverse background in cybersecurity, IT, law, and law enforcement to Polito. After earning his JD from William & Mary School of Law in 2010 and providing IT and e-discovery support to law firms, Ben joined Booz Allen Hamilton as a cyber security consultant in 2012. While a member of Advanced Persistent Threat (APT) hunt teams assigned to commercial and federal clients, Ben sharpened his network security monitoring, forensics, incident response, malware analysis, cyber threat intelligence, and security architecture skills. He has earned the CISSP, GIAC Certified Forensic Analyst (GCFA), GIAC Web Application Penetration Tester (GWAPT), and Splunk Certified Power User certifications. Ben is a member of the Maryland bar and volunteers at a pro bono legal clinic. Be sure to RSVP because seats are limited! For those who are unable to attend can join via Webex. Those who attend in person will only be the ones who get Certificate of Continuing Education + Gift Certificates. **We have recruiters attending the event, please bring your latest résumé**

Web App Penetration Testing with Burp Suite

Intellectual Point

What is Burp Suite you ask? Burp Suite is a Java-based Web Penetration Testing framework. It has become an industry standard suite of tools used by information security professionals. Burp Suite helps you identify vulnerabilities and verify attack vectors that are affecting web applications. This overview will utilize hands-on training with Burp Suite and OWASP Juice Shop to teach web application penetration testing (WAPT) fundamentals. We will demonstrate how to use Burp Suite to manually and automatically identify and validate common web app security issues, with a focus on covering the OWASP Top 10 application security risks (2017 list). By the end of the meetup, attendees will have a better idea of how to use Burp Suite and the importance of secure coding for web applications. Ben's bio: Ben brings a diverse background in cybersecurity, IT, law, and law enforcement to Polito. After earning his JD from William & Mary School of Law in 2010 and providing IT and e-discovery support to law firms, Ben joined Booz Allen Hamilton as a cybersecurity​ consultant in 2012. While a member of Advanced Persistent Threat (APT) hunt teams assigned to commercial and federal clients, Ben sharpened his network security monitoring, forensics, incident response, malware analysis, cyber threat intelligence, and security architecture skills. He has earned the CISSP, GIAC Certified Forensic Analyst (GCFA), GIAC Web Application Penetration Tester (GWAPT), and Splunk Certified Power User certifications. Ben is a member of the Maryland bar and volunteers at a pro bono legal clinic. Be sure to RSVP because seats are limited! For those who are unable to attend can join via Webex. Those who attend in person will only be the ones who get Certificate of Continuing Education + Gift Certificates. **We have recruiters attending the event, please bring your latest résumé**

Is Data Privacy a Fundamental Human Right

University of North America

Is Data Privacy a Fundamental Human Right: In the era of big data, how much privacy can we expect, and how much privacy do we need? In this presentation, Logical Operations’ Technology Education Jedi Jon O’Keefe will explore the history of privacy as he guides us to an understanding of how important privacy is (or isn’t) to the human experience. When placed within the context of the 4th Industrial Revolution, data privacy has never been more hotly debated. Does the need for privacy outweigh the incredible convenience of modern living? How are the big companies keeping your data safe, and what is happening when they don’t? What do regulations like GDPR and CCPA mean for modern businesses? Be sure to note the location. 12750 Fair Lakes Circle · Fairfax, VA (the University of North America has moved!) When you go in the front door go to the elevator on the right behind the front desk and go to floor 1. When you leave the elevator turn left then go straight back. The room number is 1015. ______________________________________________________________________________________ Get more information before this meetup at a Logical Operation Webinar​! July 24th, 2 pm​ EST. 2019 is the Year of Data: Understanding how data is impacting Cybersecurity, Privacy, and Business Intelligence. Link for Attendees: https://logicaloperations.webex.com/logicaloperations/onstage/g.php?MTID=ee0ef539ff80beef71992750e6e67fed4 ______________________________________________________________________________________ If you want to stay up-to-date​ on any changes fill out the form on this page and we will send you email updates. https://www.intellectualpoint.com/resources/digital-natives-meetup-events/

Past events (51)

What is AI, ML, and Deep Learning - Part 2

University of North America

Photos (114)