Blockchain Security
Meet other local people interested in Blockchain Security: share experiences, inspire and encourage each other! Join a Blockchain Security group.
168
members
1
groups
Frequently Asked Questions
Yes! Check out blockchain security events happening today here. These are in-person gatherings where you can meet fellow enthusiasts and participate in activities right now.
Discover all the blockchain security events taking place this week here. Plan ahead and join exciting meetups throughout the week.
Absolutely! Find blockchain security events near your location here. Connect with your local community and discover events within your area.
Blockchain Security Events Near You
Connect with your local Blockchain Security community
Building Momentum: From Ambiguity to Execution
**Building a great product is one thing—building momentum behind it is another.**
Join **Senior Product Manager Adam Solaiman** and **User Experience Manager Tyson Smith** for a behind-the-scenes look at what it takes to turn complex ideas into scalable products inside large organizations.
In this session, they’ll share how teams move from ambiguity to execution—navigating organizational complexity, aligning stakeholders, and continuously evolving products after launch.
You’ll walk away with insights on how to:
* Build and sustain momentum across teams
* Adapt to changing priorities without losing direction
* Scale products thoughtfully in complex environments
Whether you're driving a new initiative or growing an existing product, this conversation will give you practical strategies to keep things moving forward.
Come connect, learn, and swap stories with fellow product professionals.
\-\-\-
Food and drinks will be provided by Switchbox, our generous host.
Free parking will be available at the front and back sides of the Switchbox Office.
Building Scalable Customer Identity Resolution Pipelines on AWS Using AI
Customer identity resolution becomes increasingly complex as organizations scale across multiple systems, regions, and data formats. Traditional rule-based approaches often fail to keep up with data variability, require constant manual tuning, and struggle with real-time processing needs.
This session presents a practical approach to building a scalable identity resolution pipeline using AWS services and modern AI techniques. The architecture combines data ingestion through Amazon S3 and AWS Glue, transformation pipelines using Spark on EMR, and machine learning models deployed via SageMaker for entity matching and standardization. Graph-based relationship modeling is implemented using Amazon Neptune to improve resolution accuracy by incorporating household and shared attribute context.
We will walk through how machine learning models can be used for name and address normalization, how intelligent blocking strategies improve matching efficiency, and how feedback loops can be introduced to continuously improve accuracy. The session also highlights how serverless components such as AWS Lambda can be used for orchestration and real-time processing.
**SPEAKER BIO**
Mosaic Syed is a Senior Data Engineering and Cloud Solutions Architect with over 20 years of experience designing and delivering scalable, secure, and high-performance data solutions across global enterprise environments.
https://www.linkedin.com/in/mosaic-basha-syed-92300856
**CALL FOR SPEAKERS**
Learn more: [https://www.awscolumbus.com/get-involved/](https://www.awscolumbus.com/get-involved/)
**THANK YOU** *VEEAM* for hosting our meetup! To learn more about *Veeam*, please visit their website: [https://www.veeam.com/](https://www.veeam.com/)
**DIRECTIONS**
8800 Lyra Dr #450 · Columbus, OH
go to 4th floor.
**Want to sponsor the pizza and/or bar tab?**
Please contact me if you would like to sponsor this meetup's pizza and/or bar tab: angelo@mandato.com
OWASP Toronto May 2026: CMD+CTRL Cyber Range
Join us on Wednesday, May 13, 2026, from 6-8 PM EDT, for a unique and challenging event featuring the CMD+CTRL Cyber Range.
OWASP Toronto is happy to host a Cyber Range event with CMD+CTRL! CMD+CTRL Cyber Ranges are intentionally vulnerable applications and websites that tempt players to steal money, view their boss’s salary, acquire expensive items for free, and conduct other nefarious acts.
**Bring your laptop to participate in-person, or join virtually!**
* In-person: In person: Security Compass, 325 Front Street West, Unit 103, Toronto, ON
* Online: See registration below
**You MUST register on the following site to participate:**
https://web.cmdnctrlsecurity.com/owasp-toronto-register
NFT AI ART Columbus
NFT's are here to stay folks!
This is a group for like minded people interested in understanding, leveraging, using, creating for, profiting from, trading too i suppose, NFT's.. everything around them, complexity, fear and exploits, best practices and more.
**PLUS**
This group will talk AI ART tools, techniques, artists, video, audio, prototypes and more in the AI assisted production space- ART specifically, but we can get into any aspect of some of the cooler things happening in AI in general.
Inside the Modern Threat Landscape: How Attackers Weaponize Trust
What does a trojan look like when it has over 900k+ combined installs and a Forbes write-up? Exactly like a legitimate Chrome extension.
This session presents a technical dissection of two Chrome extensions, each with over one million active installations — that functioned as trojans in production environments, evading detection while operating through entirely legitimate browser APIs. These were not obscure tools. They were widely trusted, actively recommended, and covered by mainstream press before their malicious behavior was fully understood. We will walk through the actual source code of both extensions, showing precisely how the malicious functionality was constructed, concealed, and executed at scale.
This analysis anchors a broader examination of how modern compromises actually succeed. Drawing on aggregated real-world incident data, we identify the technique categories currently delivering the highest adversary return, and why they keep working. Spoiler: it's rarely a zero-day. It's trust.
The Chrome extension deep-dive will cover:
* Line-by-line source analysis of how malicious functionality was embedded within working, useful software
* Which browser permission scopes were abused, and why a million users — and their IT teams — didn't see it coming
* The behavioral and structural indicators that distinguish a trojan extension from a legitimate one, and how to operationalize detection around them
This session closes with a practical defensive prioritization framework built around observed attacker behavior: which mitigations are measurably reducing risk in production environments, which are consuming budget without impact, and a scoring methodology your team and leadership can apply immediately.
**Source material:** Primary analysis of extension source code, corroborated by reporting from Forbes and other established outlets.
**What this is not:** A vendor pitch, a speculative threat narrative, or a surface-level breach retrospective.
**Who should attend:** Security architects, AppSec and cloud security practitioners, blue team leads, threat hunters, browser security practitioners, and security leaders responsible for prioritizing risk and investment decisions.
CBusData - Practical AI for Power BI Developers
Practical AI for Power BI Developers
A year ago, “agentic AI” was mostly hype for Power BI teams. Today, it deserves your undivided attention. For Power BI pros, there is now a real opportunity to reduce repetitive development work, accelerate delivery, and help developers do more, but only when strong DataOps practices are in place to make AI workflows effective.
This session is a no-nonsense introduction to effective AI patterns for Power BI and Fabric development. Along the way, we will make sense of the growing pile of terminology, including skills, plugins, hooks, and MCP. You will see examples of how modern AI tooling can help with development tasks across Power BI and Fabric, along with the prerequisites, guardrails, and DataOps principles needed to use it responsibly.
Whether you're burned out on AI hype or already using Copilot CLI daily, this session will show you the foundations that are finally making AI-assisted development genuinely useful.
Columbus Code & Coffee 86 @ Improving
Columbus Code & Coffee is an inclusive, informal co-working session. People of all skill levels attend, and we love it that way. Many people (optionally) bring projects to work on, and many other people (optionally) socialize the entire time. It's entirely up to you!
**What to Expect at the Intro Circle**
\~\~\~\~\~\~\~\~\~\~\~\~\~
Near the beginning of the event (1:30 pm), we do a standup:
* Organizer announcements, updates, and logistics
Round 1 - (7 secs max):
* Your name
* What you're working on
* What you can help others with
Round 2:
* Community events you wanna plug. If none, that's cool too.
Round 3:
* Job opportunities you're hiring for OR announce that you are looking for one. If none, that's cool.
After the introduction circle, everything is self-organized! Feel free to work alone, pair up, attend one of our workshops/presentations, or mingle!







