Friday, November 13, 2020 2pm to 4pm

Fri, Oct. 9, 2020 2:00pm — 4:00pm

DATE:November 13th, 2020
TIME:2:00pm to 4:00pm (PST)
VENUE:Zoom Online meeting
Please obtain passcode to enter meeting from email confirmation

RSVP Required – register at Zoom
TOPIC(S):Cyberwarfare: The New “Colder” War
PRESENTER(S):  Kevin Murphy
Agenda:

2:00 pm – 2:15 pm  Welcome and announcements
2:15 pm – 2:45 pm  Featured Presentation
2:45 pm – 3:15 pm  Break
3:15 pm – 3:45 pm  Featured Presentation
3:45 pm – 4:00 pm  Q&A 

Abstract:  Is Cyberwarfare actually the next World War?  Modern cybersecurity threats have evolved into very effective disinformation campaigns and destructive ransomware. What can we collectively do to protect ourselves, our business, and our democratic institutions? Hint: the solution is more than just technology.

Biography:
Kevin was the VP of Cybersecurity Operations and Governance at IOActive.com, a retired US Air Force intelligence officer, and the former Director of Windows Security Architecture at Microsoft with over 25 years of experience in threat intelligence and information security. Kevin holds the CISM, CISSP, and CGEIT security certifications.

October 9th, 2020 meeting

Fri, Oct. 9, 2020 2:00pm — 4:00pm

DATE:October 9th, 2020
TIME:2:00pm to 4:00pm (PDT)
VENUE:Zoom Online meeting
Please obtain passcode to enter meeting from email confirmation

RSVP Required – register at Zoom
TOPIC(S):Threat landscape 2020: A deep dive on the threats we face and how we can successfully combat cybercrime
PRESENTER(S):  Chester Wisniewski (Principal Research Scientist, Sophos)

 A portion of this meeting will be dedicated to the AGM. Where possible we will use Zoom polls.

ABSTRACT

Part 1 – Know thy enemy.
There is no point in defending against attackers that aren’t there. The inverse could be worse, being unprepared for what is out there. The pace of change by cybercriminals is driven by money, which means it never stands still for long.


Part 2 – How we can use COVID-19 to our advantage.
Most security minded people are in a constant struggle to modernize and justify budgets to effectively train their staff and make modern efficient tools available. COVID-19 not only changed the threatscape, it has presented opportunities to IT security teams to up their game.


Part 3 – Targeted ransom deep dive.
These attacks have achieved unbelievable success and profit for the skilled criminals behind them. I will walk you through a typical attack and demonstrate the TTPs and cleverness that goes into hamstringing their victims.


Part 4 –  Parting defensive thoughts.
How we view our networks and the people who defend them is evolving with the threats. Many organizations who make headlines after being victimized have not evolved and sometimes even been culled from the herd. I will wrap up providing my advice on how to modernize your approach to protecting your data.

BIOGRAPHY

Chester Wisniewski is a principal research scientist at Sophos. With more than 25 years of professional experience, his interest in security and privacy first peaked while learning to hack from bulletin board text files in the 1980s, and has since been a lifelong pursuit.


Chester analyzes the massive amounts of attack data gathered by SophosLabs to distill and share relevant information in an effort to improve the industry’s understanding of evolving threats, attacker behaviors and effective security defenses. He’s helped organizations design enterprise-scale defense strategies, served as the primary technical lead on architecting Sophos’ first email security appliance, and consulted on security planning with some of the largest global brands.


As a former President of the Vancouver SecSIG he is grateful for no longer being responsible for the meetings, but excited to continue to share and contribute to the security knowledge of our community. You may recognize me from my appearances on Global News, CBC and CTV if you are old enough to still watch news on a TV.

Friday, September 11, 2020 2pm to 4pm, GM Meeting Notice (Virtual)

DATE:September 11th, 2020
TIME:2:00pm to 4:00pm (PST)
VENUE:Zoom Online meeting
Please obtain passcode to enter meeting from email confirmation

RSVP Required – register at Zoom
TOPIC(S):Homomorphic Encryption
PRESENTER(S):  Rob Slade
No Eventbrite registration required – register using the Zoom link. Please check your email for the Zoom password after you register. 

A portion of this meeting will be dedicated to the AGM. To confirm executive positions and any other decisions we will be using Zoom polls where possible.

Abstract:  Recently security operations have become very excited about homomorphic encryption. It seems to be the latest “magic” security technology that will solve all our problems, but I don’t think we’ve really provided a good outline of what it is, and, particularly, what it can’t do.

This presentation will outline the basic concepts, note some specific forms and applications, and point out the various factors for use or consideration.

A longer outline of this talk is available at https://community.isc2.org/t5/T/H/m-p/26922/highlight/true#M1683

Biography:
Ebo Fynqr znl or na vasbezngvba frphevgl naq znantrzrag pbafhygnag sebz Abegu Inapbhire, Oevgvfu Pbyhzovn, Pnanqn, be ur znl or na negvsvpvny vagryyvtrapr cebtenz tbar ubeevoyl jebat, naq ubbxrq hc gb inevbhf rznvy nqqerffrf.  Zber vasbezngvba guna nalbar jbhyq jnag gb xabj nobhg uvz vf ninvynoyr ng uggc://ra.jvxvcrqvn.bet/jvxv/Eboreg_Fynqr

https://cryptii.com/pipes/rot13

August 14th, 2020 Meeting

DATE:August 14th, 2020
TIME:2:00pm to 4:00pm (PST)
VENUE:Zoom Online meeting
Please obtain passcode to enter meeting from email confirmation

RSVP Required – register at Zoom
TOPIC(S):The Clutter that’s Choking AppSec
PRESENTER(S):  Rahul Raghavan (Co-Founder and Chief Evangelist, we45)

ABSTRACT

Increasingly shorter agile development sprints and mandatory security
assessments are putting pressure on product teams to deliver secure applications faster
than ever. Further, inorganic adoption of security tooling sometimes creates information
overload that does more harm than good.


What’s going wrong:
• Results from SAST, DAST and SCA tools create large vulnerability data sets that are
difficult to act upon.
• Automated scan results from security tools are replete with false positives and duplicate
entries that make remediation troublesome.
• Manual methods of triaging vulnerability data sets are inefficient and lower productivity.
• Improper vulnerability management increases friction between security and engineering
teams.

What the audience will glean from this talk:
• How automated methods of vulnerability correlation and de-duplication can significantly
reduce your AppSec testing time.
• How to effectively integrate vulnerability remediation with the engineering workflow.
• Understand the basic anatomy of a vulnerability to effectively prioritise and fix security bugs faster and better!


Why should they care:
• Without a change in approach, application security professionals and engineering teams
will continue to delay development schedules and product release dates, or risk releasing a
product that is not entirely secure.


Who should attend:
• Security professionals who face problems managing vulnerabilities.
• Engineering teams who find the current vulnerability remediation workflow problematic.
• CISO’s who want to lay down a mature and efficient AppSec Program.

BIOGRAPHY

Rahul is the Co-Founder and Chief Evangelist at we45.


The sheer pervasiveness of applications, their associated software engineering process and therefore the variance of application security quotient across software teams is what drives Rahul’s primary role as an AppSec Advocate at we45.


Having worked on both the building and breaking sides of product engineering, Rahul
appreciates both the constraints and the opportunities of imbibing security within the
software lifecycle. This understanding created a natural segue for we45’s custom security
solution engineering and enhanced AppSec service delivery models for its global customers.


As an active DevSecOps Marketer, Rahul works closely with the offices of CTOs and CIOs
in the setting up of cross functional skill building and collaboration models between
engineering, QA and security teams to build and manage software security maturity
frameworks.


Rahul is Certified Information Systems Auditor (CISA) and is a regular speaker at global
conferences, seminars and meetup groups on the following topic areas:
1. Application Security Automation and DevSecOps
2. AppSec Tooling
3. Threat Modeling in Agile Engineering
4. QA: Security Mapping
5. Automation ROI Modelling
6. AWS Security
7. Secure Software Maturity Models

 RSVP Required – register at Zoom

July 10th, 2020 Meeting

DATE:July 10th, 2020
TIME:2:00pm to 4:00pm (PST)
VENUE:Zoom Online meeting
Please obtain passcode to enter meeting from email confirmation

RSVP Required – register at Zoom
TOPIC(S):The business of measuring security
PRESENTER(S):  Gary Hinson

ABSTRACT

Although quantifying things is an essential part of rational management, measuring is particularly challenging in the arcane field of information risk and security. Gary will be sharing his Hinson tips on selecting security metrics that work, both for infosec pros like us and for the businesses we serve. Pull up a chair and put your brain in gear. Audience participation is not merely permitted: it’s encouraged.

BIOGRAPHY

Gary Hinson lives at the end of the world, not only down under in New Zealand, but so far off the beaten track that nobody can find him. (Talk about security by obscurity.) Despite this, he advises international companies on information risk and security matters, providing excellent policies, awareness materials and strategies. He is a long-time active member of the CISSPforum, a Certified Usual Suspect. He has a long-abiding interest in the ISO27k standards, running the ISO27k Forum supporting 4,000 fellow ISO addicts. He has written the book (well, a book, anyway) on security metrics which is very pragmatic. (All will become clear during the session.) (Well OK, maybe not all but he’ll do his best)

RSVP Required – register at Zoom