|Oct 15 at 07:00PMFree Software Stammtisch|
|Oct 17 at 07:00PMLinux Security|
|Oct 19 at 10:00AMInstallfest|
|Nov 02 at 10:00AMCANCELLED - Installfest|
|Nov 14 at 07:00PMPLUG East Meeting|
|Nov 16 at 10:00AMInstallfest|
|Nov 19 at 07:00PMFree Software Stammtisch|
|Nov 21 at 07:00PMLinux Security|
Sebastian Tuchband: Hiding From the Internet
An updated version of my Hiding From the Internet presentation to fit the changes to privacy, today.
It will include an explanation for where data brokers obtain data, how to prevent non-government officials from easily obtaining PII, and some tools to use to maintain privacy.
At this month's Security meeting we'll be treated to the second part for Donald McCarthy's passiveDNS talk.
Donald McCarthy: passiveDNS For fun and Profit (part2)
Part one of this presentation covered the architecture and theory of passive DNS (pDNS). This portion of the presentation will focus on the practical uses of pDNS data for red team, blue team, threat intelligence, and security research operations.
Mac is a 17 year veteran of the IT industry. He has experience worked for organization ranging in size from 10 to 200,000+ employees. Mac has been involved in information security for the past 9 years with organizations in the academic, healthcare and financial, and public sectors. Mac is a linux enthusiast with a passion for using large compute clusters to help solve the most challenging problems in security analytics. He has given presentations globally on business email compromise and credentials stuffing. Mac currently serves as the Director of Field Operations for Open Source Context.
Gavin Klondike: Machine Learning for Security Analysts
Today, over a quarter of security products for detection have some form of machine learning built in. However, “machine learning” is nothing more than a mysterious buzzword for many security analysts. In order to properly deploy and manage these products, analysts will need to understand how the machine learning components operate to ensure they are working efficiently. In this talk, we will dive head first into building and training our own machine learning models using the 7-step machine learning process.
Gavin is a senior consultant and researcher who has a passion for network security, both attack and defense. Through that passion, he runs NetSec Explained; a blog and YouTube channel which covers intermediate and advanced level network security topics, in an easy to understand way. His work has given him the opportunity to be published in industry magazines and speak at conferences such as Defcon and CactusCon. Currently, he is researching into ways to address the cybersecurity skills gap, by utilizing machine learning to augment the capabilities of current security analysts.