Skip to content

Information Security

Meet other local people interested in Information Security: share experiences, inspire and encourage each other! Join a Information Security group.
pin icon
166
members
people1 icon
1
groups

Largest Information Security groups

Frequently Asked Questions

Yes! Check out information security events happening today here. These are in-person gatherings where you can meet fellow enthusiasts and participate in activities right now.

Discover all the information security events taking place this week here. Plan ahead and join exciting meetups throughout the week.

Absolutely! Find information security events near your location here. Connect with your local community and discover events within your area.

Information Security Events Near You

Connect with your local Information Security community

CBusData - Practical AI for Power BI Developers
CBusData - Practical AI for Power BI Developers
Practical AI for Power BI Developers A year ago, “agentic AI” was mostly hype for Power BI teams. Today, it deserves your undivided attention. For Power BI pros, there is now a real opportunity to reduce repetitive development work, accelerate delivery, and help developers do more, but only when strong DataOps practices are in place to make AI workflows effective. This session is a no-nonsense introduction to effective AI patterns for Power BI and Fabric development. Along the way, we will make sense of the growing pile of terminology, including skills, plugins, hooks, and MCP. You will see examples of how modern AI tooling can help with development tasks across Power BI and Fabric, along with the prerequisites, guardrails, and DataOps principles needed to use it responsibly. Whether you're burned out on AI hype or already using Copilot CLI daily, this session will show you the foundations that are finally making AI-assisted development genuinely useful.
Building Scalable Customer Identity Resolution Pipelines on AWS Using AI
Building Scalable Customer Identity Resolution Pipelines on AWS Using AI
Customer identity resolution becomes increasingly complex as organizations scale across multiple systems, regions, and data formats. Traditional rule-based approaches often fail to keep up with data variability, require constant manual tuning, and struggle with real-time processing needs. This session presents a practical approach to building a scalable identity resolution pipeline using AWS services and modern AI techniques. The architecture combines data ingestion through Amazon S3 and AWS Glue, transformation pipelines using Spark on EMR, and machine learning models deployed via SageMaker for entity matching and standardization. Graph-based relationship modeling is implemented using Amazon Neptune to improve resolution accuracy by incorporating household and shared attribute context. We will walk through how machine learning models can be used for name and address normalization, how intelligent blocking strategies improve matching efficiency, and how feedback loops can be introduced to continuously improve accuracy. The session also highlights how serverless components such as AWS Lambda can be used for orchestration and real-time processing. **SPEAKER BIO** Mosaic Syed is a Senior Data Engineering and Cloud Solutions Architect with over 20 years of experience designing and delivering scalable, secure, and high-performance data solutions across global enterprise environments. https://www.linkedin.com/in/mosaic-basha-syed-92300856 **CALL FOR SPEAKERS** Learn more: [https://www.awscolumbus.com/get-involved/](https://www.awscolumbus.com/get-involved/) **THANK YOU** *VEEAM* for hosting our meetup! To learn more about *Veeam*, please visit their website: [https://www.veeam.com/](https://www.veeam.com/) **DIRECTIONS** 8800 Lyra Dr #450 · Columbus, OH go to 4th floor. **Want to sponsor the pizza and/or bar tab?** Please contact me if you would like to sponsor this meetup's pizza and/or bar tab: angelo@mandato.com
OWASP Toronto May 2026: CMD+CTRL Cyber Range
OWASP Toronto May 2026: CMD+CTRL Cyber Range
Join us on Wednesday, May 13, 2026, from 6-8 PM EDT, for a unique and challenging event featuring the CMD+CTRL Cyber Range. OWASP Toronto is happy to host a Cyber Range event with CMD+CTRL! CMD+CTRL Cyber Ranges are intentionally vulnerable applications and websites that tempt players to steal money, view their boss’s salary, acquire expensive items for free, and conduct other nefarious acts. **Bring your laptop to participate in-person, or join virtually!** * In-person: In person: Security Compass, 325 Front Street West, Unit 103, Toronto, ON * Online: See registration below **You MUST register on the following site to participate:** https://web.cmdnctrlsecurity.com/owasp-toronto-register
COhPy Monthly Meeting
COhPy Monthly Meeting
**Improving Office in Franklinton** Physical location: Improving Office 330 Rush Alley Suite #150 Columbus, OH 43215 Schedule: 6:00 p.m.: Socialize, eat, and drink. Improving will be providing pizza and beverages. 6:30 to 8:00 pm. Main meeting and presentation(s). Topic: This month John Lairson will share a notebook describing the Alpaca (Paper) Trading API and discuss different algorithms for evaluating stock trades. We meet on the last Monday of each Month. Presentations are given by members and friends of this group. If you would like to do a presentation (small or large) on a python topic, please contact Central OH Python at centralohpython@gmail.com
Inside the Modern Threat Landscape: How Attackers Weaponize Trust
Inside the Modern Threat Landscape: How Attackers Weaponize Trust
What does a trojan look like when it has over 900k+ combined installs and a Forbes write-up? Exactly like a legitimate Chrome extension. This session presents a technical dissection of two Chrome extensions, each with over one million active installations — that functioned as trojans in production environments, evading detection while operating through entirely legitimate browser APIs. These were not obscure tools. They were widely trusted, actively recommended, and covered by mainstream press before their malicious behavior was fully understood. We will walk through the actual source code of both extensions, showing precisely how the malicious functionality was constructed, concealed, and executed at scale. This analysis anchors a broader examination of how modern compromises actually succeed. Drawing on aggregated real-world incident data, we identify the technique categories currently delivering the highest adversary return, and why they keep working. Spoiler: it's rarely a zero-day. It's trust. The Chrome extension deep-dive will cover: * Line-by-line source analysis of how malicious functionality was embedded within working, useful software * Which browser permission scopes were abused, and why a million users — and their IT teams — didn't see it coming * The behavioral and structural indicators that distinguish a trojan extension from a legitimate one, and how to operationalize detection around them This session closes with a practical defensive prioritization framework built around observed attacker behavior: which mitigations are measurably reducing risk in production environments, which are consuming budget without impact, and a scoring methodology your team and leadership can apply immediately. **Source material:** Primary analysis of extension source code, corroborated by reporting from Forbes and other established outlets. **What this is not:** A vendor pitch, a speculative threat narrative, or a surface-level breach retrospective. **Who should attend:** Security architects, AppSec and cloud security practitioners, blue team leads, threat hunters, browser security practitioners, and security leaders responsible for prioritizing risk and investment decisions.
Central Ohio Radio Enthusiasts - Radio Signal Analysis Using SDRs and OpenWebRX+
Central Ohio Radio Enthusiasts - Radio Signal Analysis Using SDRs and OpenWebRX+
Central Ohio Radio Enthusiasts—CORE—is an informal community for anyone enthusiastic or curious about radio—whether you're new to radio and want to learn or you've been tinkering for years and want to share. Ham radio operators, GMRS users, Meshtastic fans, software-defined radio nerds, makers, and technical and non-technical folks are all welcome. No experience required or expected. This month we have **Radio Signal Analysis Using SDRs and OpenWebRX+** with **Scott McCrory**. Details are are [core.radio](https://core.radio/).
Columbus Code & Coffee 86 @ Improving
Columbus Code & Coffee 86 @ Improving
Columbus Code & Coffee is an inclusive, informal co-working session. People of all skill levels attend, and we love it that way. Many people (optionally) bring projects to work on, and many other people (optionally) socialize the entire time. It's entirely up to you! **What to Expect at the Intro Circle** \~\~\~\~\~\~\~\~\~\~\~\~\~ Near the beginning of the event (1:30 pm), we do a standup: * Organizer announcements, updates, and logistics Round 1 - (7 secs max): * Your name * What you're working on * What you can help others with Round 2: * Community events you wanna plug. If none, that's cool too. Round 3: * Job opportunities you're hiring for OR announce that you are looking for one. If none, that's cool. After the introduction circle, everything is self-organized! Feel free to work alone, pair up, attend one of our workshops/presentations, or mingle!