This is our main meeting. This meeting usually takes the form of 1 or usually more presentations. We try to keep a good balance of novice and advanced subjects so that nobody will be overwhelmed of bored. Just show up, and we hope you learn something.
If you would like some examples of what to expect at this meeting, check out some of the videos that have been made of our presentations.
Topics: Various topics ranging form beginner's to advanced, user to administrator.
When: Second Thursday of each month at 7:00PM
Where: Desert Breeze Substation: 251 North Desert Breeze Blvd, Chandler, AZ 85226
What to expect:
Sebastian Tuchband: Hiding From the Internet
An updated version of my Hiding From the Internet presentation to fit the changes to privacy, today.
It will include an explanation for where data brokers obtain data, how to prevent non-government officials from easily obtaining PII, and some tools to use to maintain privacy.
Gavin Klondike: Machine Learning for Security Analysts
Today, over a quarter of security products for detection have some form of machine learning built in. However, “machine learning” is nothing more than a mysterious buzzword for many security analysts. In order to properly deploy and manage these products, analysts will need to understand how the machine learning components operate to ensure they are working efficiently. In this talk, we will dive head first into building and training our own machine learning models using the 7-step machine learning process.
Gavin is a senior consultant and researcher who has a passion for network security, both attack and defense. Through that passion, he runs NetSec Explained; a blog and YouTube channel which covers intermediate and advanced level network security topics, in an easy to understand way. His work has given him the opportunity to be published in industry magazines and speak at conferences such as Defcon and CactusCon. Currently, he is researching into ways to address the cybersecurity skills gap, by utilizing machine learning to augment the capabilities of current security analysts.