Say

Top Drawer module

Publish up to six modules in this position with 6-columns layout. Choose from 6 module styles. Add icons and badges too using the Warp framework module settings!

What!

Top Drawer module

Publish up to six modules in this position with 6-columns layout. Choose from 6 module styles. Add icons and badges too using the Warp framework module settings!

Upcoming Events

  • Tue 9.
    Feb

    Sponsor:

     

    Gemalto is at the heart of our evolving digital society, enabling businesses and governments around the world to offer trusted and convenient digital services to billions of individuals.

    Speaker:

    Gregg Foss, LogRhythm’s head of Security Operations and a Senior Researcher with Labs

     

    Bio:

    Greg Foss is LogRhythm’s head of Security Operations and a Senior Researcher with Labs – tasked with leading both offensive and defensive aspects of corporate security. He has just under a decade of experience in the information security industry with an extensive background in ethical hacking and penetration testing, focusing on Web application security and red teaming. Greg holds multiple industry certifications including the OSCP, GAWN, GPEN, GWAPT, GCIH, and CEH, among others. He has presented at national information security conferences such as Black Hat, DerbyCon, AppSecUSA, BSidesLV, and is a very active member of the Denver security community.

    Topic:

    Deception Driven Defense

    Abstract:

    Traditionally, security analysts are focused on blocking attackers and keeping them out. This usually works, but it does not provide defenders much intelligence on who is attacking them and why, nor do such methods actually keep attackers out. Without such crucial data, it’s difficult to know whether or not an adversary has actually been removed from the environment as well. Let’s turn the tables and beat them at their own games. They use diversions to break in, so we can pull the same tricks on them. Let’s track their movements, better understand their tactics, and possibly even find out who they really are in the process. This talk will dive into various tools and techniques that can be used to deceive our attackers, track them, rapidly respond to incidents, and even help train your user base to better identify and inform you of potential attacks.

    Tuesday, February. 09. 2016 - 11:30 AM till 01:30 PM
    February Chapter Meeting (Boulder)
  • Wed 10.
    Feb

    Sponsor:


    Gemalto is at the heart of our evolving digital society, enabling businesses and governments around the world to offer trusted and convenient digital services to billions of individuals.

    Speaker:

    Gregg Foss, LogRhythm’s head of Security Operations and a Senior Researcher with Labs

     

    Bio:

    Greg Foss is LogRhythm’s head of Security Operations and a Senior Researcher with Labs – tasked with leading both offensive and defensive aspects of corporate security. He has just under a decade of experience in the information security industry with an extensive background in ethical hacking and penetration testing, focusing on Web application security and red teaming. Greg holds multiple industry certifications including the OSCP, GAWN, GPEN, GWAPT, GCIH, and CEH, among others. He has presented at national information security conferences such as Black Hat, DerbyCon, AppSecUSA, BSidesLV, and is a very active member of the Denver security community.

    Topic:

    Deception Driven Defense

    Abstract:

    Traditionally, security analysts are focused on blocking attackers and keeping them out. This usually works, but it does not provide defenders much intelligence on who is attacking them and why, nor do such methods actually keep attackers out. Without such crucial data, it’s difficult to know whether or not an adversary has actually been removed from the environment as well. Let’s turn the tables and beat them at their own games. They use diversions to break in, so we can pull the same tricks on them. Let’s track their movements, better understand their tactics, and possibly even find out who they really are in the process. This talk will dive into various tools and techniques that can be used to deceive our attackers, track them, rapidly respond to incidents, and even help train your user base to better identify and inform you of potential attacks.

    Wednesday, February. 10. 2016 - 11:30 AM till 01:30 PM
    February Chapter Meeting (Denver)
  • Tue 8.
    Mar

    Sponsor:

     

    See how Veracode's automated cloud-based service simplifies application security across web, mobile & 3rd-party apps! 

    Speaker:

    Yon Lew, COO ISRSEC International

     

    Bio:

    COO ISRSEC International. Strategic security for enterprise client base. FS2S - full spectrum full scope security - specialisation in cyber warfare/cyberwar/cyber security. Security architecture/systems/private public hybrid cloud, operations infrastructure/process/practice. Strategic security consulting and operations - cyber counter measures to security for soft/hard/firm/cloud operations to tactical cyber and physical ops TTPs.

    Topic:

    Security is Broken

    Abstract:

    Quick survey of conventional current security practice and process which is broken, ineffective and driven by panacea visions of "magic box solutions" which may be leading to the future for cyberwar/cyber warfare resulting in massive power/web/phone outages, failure of any and all systems - xDoS (extreme denial of service), eDos (enterprise denial of service) and what individuals and entities should be aware of in this operational business environment.

    In every area from everyday life to financial to critical infrastructure to government, there exists SSDD (‘same stuff different day’) conventional groupthink and practice. There is need to refocus on new thought models for advanced security to meet new and emerging trends and threats in cyber security - "thinking like the bad guys/OpFor" and breaking out of outdated security measures and practice that secure little against even current and old threats and that do nothing against near future and future threats.

    Every conventional security effort in enterprises today is focusing on obsolete and outdated thought models, mindsets, tactics and thinking. The current and near term future calls for strategic planning and unconventional force capability beyond ‘civil war cavalry and infantry tactical thinking, tactical focus, bandaid elements, training, and tools’ when facing motivated  and ever growing opponents with modern nation state level tools and training. 

    Tuesday, March. 08. 2016 - 11:30 AM till 01:30 PM
    March Chapter Meeting (Boulder)
  • Wed 9.
    Mar

    Sponsor:

     

    See how Veracode's automated cloud-based service simplifies application security across web, mobile & 3rd-party apps!

    Speaker:

    Yon Lew, COO ISRSEC International

     

    Bio:

    COO ISRSEC International. Strategic security for enterprise client base. FS2S - full spectrum full scope security - specialisation in cyber warfare/cyberwar/cyber security. Security architecture/systems/private public hybrid cloud, operations infrastructure/process/practice. Strategic security consulting and operations - cyber counter measures to security for soft/hard/firm/cloud operations to tactical cyber and physical ops TTPs.

    Topic:

    Security is Broken

    Abstract:

    Quick survey of conventional current security practice and process which is broken, ineffective and driven by panacea visions of "magic box solutions" which may be leading to the future for cyberwar/cyber warfare resulting in massive power/web/phone outages, failure of any and all systems - xDoS (extreme denial of service), eDos (enterprise denial of service) and what individuals and entities should be aware of in this operational business environment.

    In every area from everyday life to financial to critical infrastructure to government, there exists SSDD (‘same stuff different day’) conventional groupthink and practice. There is need to refocus on new thought models for advanced security to meet new and emerging trends and threats in cyber security - "thinking like the bad guys/OpFor" and breaking out of outdated security measures and practice that secure little against even current and old threats and that do nothing against near future and future threats.

    Every conventional security effort in enterprises today is focusing on obsolete and outdated thought models, mindsets, tactics and thinking. The current and near term future calls for strategic planning and unconventional force capability beyond ‘civil war cavalry and infantry tactical thinking, tactical focus, bandaid elements, training, and tools’ when facing motivated  and ever growing opponents with modern nation state level tools and training. 

    Wednesday, March. 09. 2016 - 11:30 AM till 01:30 PM
    March Chapter Meeting (Denver)
  • Tue 12.
    Apr

    Sponsor:

     

    Speaker:

    Mike Rothman, Analyst & President of Securosis

    Bio:

    Mike’s bold perspectives and irreverent style are invaluable as companies determine effective strategies to grapple with the dynamic security threatscape. Mike specializes in the sexy aspects of security, like protecting networks and endpoints, security management, and compliance. Mike is one of the most sought after speakers and commentators in the security business and brings a deep background in information security. After 20 years in and around security, he’s one of the guys who “knows where the bodies are buried” in the space. 

    Starting his career as a programmer and a networking consultant, Mike joined META Group in 1993 and spearheaded META’s initial foray into information security research. Mike left META in 1998 to found SHYM Technology, a pioneer in the PKI software market, and then held VP Marketing roles at CipherTrust and TruSecure – providing experience in marketing, business development, and channel operations for both product and services companies. After getting fed up with vendor life, he started Security Incite in 2006 to provide the voice of reason in an over-hyped yet underwhelming security industry. After taking a short detour as Senior VP, Strategy and CMO at eIQnetworks to chase shiny objects in security and compliance management, Mike joins Securosis with a rejuvenated cynicism about the state of security and what it takes to survive as a security professional.

    Mike published “The Pragmatic CSO” in 2007 to introduce technically oriented security professionals to the nuances of what is required to be a senior security professional. He also possesses a very expensive engineering degree in Operations Research and Industrial Engineering from Cornell University. His folks are overjoyed that he uses literally zero percent of his education on a daily basis. He can be reached at mrothman (at) securosis (dot) com.

    Topic:

    Inflection: Security's Next 10 Years

    Abstract:

    We are now deep in the initial wave of a major inflection point in security. Not one based merely on advanced threats or new compliance regimes, but a fundamental transformation of IT driven by cloud computing, DevOps, and mobility. These disruptive innovations promise to fundamentally change the way security will be done and your role as a security practitioner. Securosis' Mike Rothman will go through the trends and give you some perspective as to how you'll need to move through these changes to not just survive, but prosper in this new world order.

    Tuesday, April. 12. 2016 - 11:30 AM till 01:30 PM
    April Chapter Meeting (Boulder)
Page 1/2
Start - Back - 1 2 - Next - End
1-5/6

Subscribe

Sign up to receive news
about our upcoming events

 

Recent Posts

View recent blog posts about
industry trends and events

View Blog