Past Meetings

RSA Mixer 2019

Tuesday, March 5, 2019 - 4:00pm

What: Catch up with colleagues & meet new ones from San Francisco, Silicon Valley
ISSA & OWASP chapters
Reception: Top shelf appetizers and drinks
Venue: Trou Normand @ the Historic Pacific Telephone & Telegraph building; Reserved space for 30: booths
and standing areas

Exfiltrating data through the Internet of Things (IoT)

Tuesday, January 15, 2019 - 6:00pm

“Exfiltrating data through the Internet of Things (IoT)” provides insights based on research/analysis of data exfiltration vulnerabilities found in IoT protocols (i.e. SSDP, P25, Zigbee, Z-Wave, Wi-Fi, uPnP). With an eye toward mitigating weaknesses in current protocols, this talk addresses future protocol designs to eliminate those weaknesses.  This discussion will delve into the details and demo data exfiltration using IoT protocols.

This month’s meeting is a CISO Panel moderated by Patrick Heim

Tuesday, November 20, 2018 - 6:00pm

This month’s meeting is a CISO Panel moderated by Patrick Heim, ex-Salesforce and Kaiser CISO and current operating partner and CISO at ClearSky venture partners along with Sherry Ryan, CISO at Juniper, Richard Seirersen, CISO at LendingClub, and Eddie Borrero, Chief Information Security Officer Robert Half International.

Security is Easy - How I've Mapped All Legitimate OS Behavior - Evening Meeting

Tuesday, October 16, 2018 - 6:30pm

The “enumeration of badness” approach to security has failed for two major reasons. First, the amount of “badness” is practically infinite. Second, it’s unrealistic to detect all future “badness” based on the past. Yet, the majority of products are still based on this method. Spectre and Meltdown vulnerabilities are just one example of the unpredictability of future “badness”. However, “goodness” is actually finite. So, is it possible to create a map of all legitimate OS behavior? The answer is yes.

Pages