Past Meetings

What Does "Zero Trust" Mean in Today's Cybersecurity Solutions

Tuesday, July 16, 2019 - 6:00pm

With today's ever-increasing cyber threat environment, it's more important than ever to take a "Zero Trust" approach to prevention. Learn what common solution providers really do and don't do and why they continue to fail organizations from being breached. Discuss how stakeholders responsible for cybersecurity strategy can take a practical approach to "Zero Trust" prevention.

Cybersecurity & Agility with Network Security Policy Orchestration

Tuesday, June 18, 2019 - 6:00pm

The agility of DevOps and scalability of the cloud is an incredible combination for the business. New products are brought to market faster than ever before, with infrastructure spun up or down in seconds. However, with this agility and business-created urgency, security is seen as an impediment and often falls by the wayside.

Visibility as a buzzword: defining a strategy in a “Cloud” age.

Tuesday, April 16, 2019 - 6:30pm

Many mature and sophisticated security teams are taking a ‘back-to-basics’ approach to security. In this talk, we will discuss what visibility has meant in the past and how it has and will continue to evolve based on technology convergence in the future. As the recent explosion in technology, adoption has created a wave of new security hardware/software purchases many issues faced by security teams are still rooted in a lack of security fundamentals including the basic need to acquire visibility on the activities and assets you are trying to protect.

RSA Mixer 2019

Tuesday, March 5, 2019 - 4:00pm

What: Catch up with colleagues & meet new ones from San Francisco, Silicon Valley
ISSA & OWASP chapters
Reception: Top shelf appetizers and drinks
Venue: Trou Normand @ the Historic Pacific Telephone & Telegraph building; Reserved space for 30: booths
and standing areas

Exfiltrating data through the Internet of Things (IoT)

Tuesday, January 15, 2019 - 6:00pm

“Exfiltrating data through the Internet of Things (IoT)” provides insights based on research/analysis of data exfiltration vulnerabilities found in IoT protocols (i.e. SSDP, P25, Zigbee, Z-Wave, Wi-Fi, uPnP). With an eye toward mitigating weaknesses in current protocols, this talk addresses future protocol designs to eliminate those weaknesses.  This discussion will delve into the details and demo data exfiltration using IoT protocols.

This month’s meeting is a CISO Panel moderated by Patrick Heim

Tuesday, November 20, 2018 - 6:00pm

This month’s meeting is a CISO Panel moderated by Patrick Heim, ex-Salesforce and Kaiser CISO and current operating partner and CISO at ClearSky venture partners along with Sherry Ryan, CISO at Juniper, Richard Seirersen, CISO at LendingClub, and Eddie Borrero, Chief Information Security Officer Robert Half International.

Security is Easy - How I've Mapped All Legitimate OS Behavior - Evening Meeting

Tuesday, October 16, 2018 - 6:30pm

The “enumeration of badness” approach to security has failed for two major reasons. First, the amount of “badness” is practically infinite. Second, it’s unrealistic to detect all future “badness” based on the past. Yet, the majority of products are still based on this method. Spectre and Meltdown vulnerabilities are just one example of the unpredictability of future “badness”. However, “goodness” is actually finite. So, is it possible to create a map of all legitimate OS behavior? The answer is yes.

Pages