What we're about

Join Cyber Skills Meetup! Promoted by QA, hear from industry experts focused on cyber skills and development. Our community speakers will share their knowledge on cyber skills innovations, resources, emerging technology, and key challenges in the Cyber skills space.

Check out our other free resources and activities CyberPulse Hub

Whether you’re embarking on a career in Cyber security or already have experience, the free Cyber Security Skills Meetup aims to empower you with the knowledge and insight you need to advance your career. By attending the QA Cyber Skills Meetup you will be eligible for ISC2 CPE's (1 per event).

Upcoming events (3)

Wireshark Masterclass

Link visible for attendees

Wireshark - Masterclass

Speaker: Paul Fennell

Wireshark is a popular network protocol analyser that can be used by security professionals to identify and analyse network traffic in order to detect and defend potential security threats.

1. Network monitoring:
Wireshark can be used to monitor network traffic in real-time. This helps security professionals to detect and analyse any unusual network behaviour, such as traffic patterns, unusual protocols, or unusual port usage, and play back captured packets in real-time.

2. Traffic analysis:
Wireshark can be used to analyse network traffic to identify potential security threats. Security professionals can use the tool to examine network packets and look for anomalies, such as malicious payloads or unexpected network traffic.

3. Forensic analysis:
Wireshark can be used to capture and store network traffic for later analysis. This allows security professionals to examine network traffic and identify potential security incidents that may have occurred in the past.

4. Vulnerability scanning:
Wireshark can be used to identify vulnerabilities in network protocols and applications. Security professionals can use the tool to examine network traffic and identify weaknesses that could be exploited by attackers.

5. Intrusion detection:
Wireshark can be used to identify and detect intrusion attempts by analysing network traffic. Security professionals can use the tool to look for specific signatures of known attacks.

About Paul:

Holding a MSc in Cybercrime forensics and MPhil in Information Security, Paul worked in the field as a cyber investigator as both a network and digital forensic examiner, with notable success in conducting and directing a broad range of criminal and civil investigations. With over 7 years’ experience in multi-platform digital forensics in serious and complex multi-region cyber-crime cases on behalf of the MPCCU (Metropolitan Police Cybercrime Unit) holding the rank of Detective Constable. Later in the private sector as a Critical Incident consultant and prior as Head of Digital forensics and Incident response (EMEA).

Specialist areas: Cyber Awareness, Cyber Intelligence, Secure Developer, Digital Forensics. Security+, CASP+, National Cybercrime programme.

https://info.qa.com/thecyberpulse

2
AWS Account Security

Link visible for attendees

AWS Account Security

Along with practical hands on demonstrations, in this meetup session we will help you learn about the following AWS Cloud Security topics, focused on AWS Account Security.

Topics:

  • Dealing with business requests
  • Principals and identities
  • Security policies
  • Managing multiple accounts

OWASP SAMM Threat Modeling: From Good to Great

Link visible for attendees

#### OWASP SAMM Threat Modeling: From Good to Great

Have you heard about Threat Modeling but are unsure of how to implement it effectively in your organization? As Threat Modeling becomes increasingly popular in organizations, it's crucial to understand the key elements and strategies you can leverage to build a successful program tailored to your environment.

This session will explore the OWASP SAMM maturity stream for threat modeling, which consists of three levels:

  • Level 1: Perform best-effort, risk-based threat modeling using brainstorming and existing diagrams with simple threat checklists.
  • Level 2: Standardize threat modeling training, processes, and tools to scale across the organization.
  • Level 3: Continuously optimize and automate your threat modeling methodology.

During this session, we will explore the various indicators within your organization that can shape your Threat Modeling program and help you envision what it may entail. We'll also cover the essential data you'll need to collect to effectively measure and improve its impact and efficacy.

You'll gain insights into whether you should handle the program in-house or consider bringing in external help, as well as who should lead it - the Security Team or developers. We'll also delve into whether all teams should follow the same approach or if you should have dedicated Security Champions.

We will introduce a Threat Modeling maturity model and an OWASP threat modeling playbook that can guide you in building a successful program. Through this talk, you'll leave with ideas for your next steps, equipped with ways to succeed and fail fast if necessary.

Join us in this session to learn how to implement Threat Modeling effectively and build a program that works for your organization.

About your speaker

Sebastien Deleersnyder (Seba) is the CTO, co-founder of Toreon and COO of Data Protection Institute. With a strong background in development and extensive experience in cybersecurity, Seba has trained numerous developers on how to create more secure software. He is also the founder of the Belgian OWASP chapter and a former member of the OWASP Foundation Board. Through his work leading OWASP projects like OWASP SAMM, Seba has made a significant impact in improving the overall security of the world. Currently, he is focused on adapting application security models to the rapidly changing landscape of DevOps and promoting the importance of threat modeling to a broader audience.

Past events (28)

The Art of Google Dorking

This event has passed

Find us also at