Upcoming Meetings

October 2024 Event: Mobile Vulnerabilities - Exploiting Mobile Firmware and Apps

Date: 
Tuesday, October 15, 2024 - 5:30pm
Topic: 

With over 3 billion active devices this year, Android dominates the global mobile market with a 70.69% market share. But with this widespread usage comes an increasing number of vulnerabilities. In this event, we will dive deep into the world of Android app and firmware exploits and showcase live demonstrations of a few key exploits. Attendees will gain a clear understanding of how interprocess communication, privileged apps, and Android's interprocess communication models can lead to common exploit patterns resulting in data leakage or exposing personally identifiable information (PII).

​Join us for a hands-on session that not only highlights the risks but also provides practical insights into how these exploits work and how to mitigate them in your own apps and systems.

Key Topics Covered Will Include:

  • ​Common exploit patterns in Android apps and firmware

  • ​How interprocess communication creates vulnerabilities

  • ​Exploiting privileged apps for data leakage

  • ​A live demo of key Android exploits with step-by-step walkthroughs

  • ​Protecting data and minimizing personally identifiable information (PII) exposure

Why Attend?

  • Live Demonstrations: See real-world Android exploits in action with a guided walkthrough for each.

  • Practical Takeaways: Learn how to identify and mitigate mobile vulnerabilities in your own development and security operations.

  • Expert Insights: Gain knowledge from an industry expert with years of hands-on experience in mobile app testing and security.

  • Cutting-Edge Knowledge: Stay informed about the latest trends and threats in the rapidly evolving mobile security landscape.

  • Interactive Learning: Understand the technical aspects of Android exploits through live demos and actionable insights.

​​​Agenda:

  • ​​​5:30 - 6:00 | In-person Networking

  • ​​5:55 - 6:00 | Virtual Session Starts

  • ​​​6:00 - 6:15 | ISSA Chapter Business

  • ​​​6:15 - 7:00 | Presentation

  • ​​​7:00 - 8:00 | Food & Refreshments

Speaker: 

lya Quokka

Ilya Dreytser has been testing mobile apps for security, performance, and functionality for the past 7 years. A seasoned expert in mobile app security, Ilya has presented at DroidCon and other notable events. Known for his engaging speaking style, Ilya’s journey began as a developer before transitioning into security testing. He has a unique ability to break down complex mobile vulnerabilities into easy-to-understand concepts while providing real-world solutions. When he's not diving into mobile security, you might catch him enjoying the sunshine after years of basement coding! Ilya is currently at Quokka.

 

 

 

 


Location: 

Register to see address

November 2024 Event: What are configurations anyway? And the wild ways of doing them wrong

Date: 
Tuesday, November 19, 2024 - 5:30pm
Topic: 

Configuring software can be a complex and often misunderstood task. After working with numerous organizations and an array of technology stacks, one thing is clear: Configuring is hard—not only because server software is intricate, but also due to the various configuration formats and the often confusing locations where these configurations reside.

​Join us for this eye-opening session as we dive deep into configuration files and explore the most unintuitive ways configurations are applied. We’ll discuss how overlooked or poorly understood configurations can lead to security risks, with a focus on dangerous defaults that can open up vulnerabilities. Whether you’re a systems admin, a developer, or a security professional, this talk will help you avoid common configuration pitfalls and elevate your software’s security.

Key Topics Covered Will Include:

  • ​Why configuring software is more difficult than it seems
  • ​Common mistakes and pitfalls in software configuration
  • ​Understanding configuration formats and where they reside
  • ​The role of configurations in enforcing security controls
  • ​Dangerous default settings to watch out for

Why Attend?

  • Practical Insights: Learn about the most common configuration errors and how to avoid them.
  • Security Awareness: Discover how misconfigurations can expose your systems to vulnerabilities and what you can do to mitigate these risks.
  • Real-World Examples: Hear about the wildest and most unintuitive configuration practices that can serve as lessons for your own tech stack.
  • Actionable Takeaways: Walk away with concrete strategies to improve your configuration management and security posture.

This event promises to raise awareness on an often-overlooked topic: how to configure software correctly and securely. Don’t miss the opportunity to learn from real-world examples and ensure your systems are not at risk due to configuration issues.

Agenda:

  • 5:30 - 6:00 | In-person Networking
  • 5:55 - 6:00 | Virtual Session Starts
  • 6:00 - 6:15 | ISSA Chapter Business
  • 6:15 - 7:00 | Presentation
  • 7:00 - 8:00 | Food & Refreshments
Speaker: 

Dr. Albert Heinle

Dr. Albert Heinle is on a mission to combat the global rise in data breaches and misconfigurations. As the co-founder and Chief Technology Officer of CoGuard, a company dedicated to improving configuration security, Albert brings extensive knowledge to the topic of software configurations. He previously held development positions at FLIR Systems, Inc., Aeryon Labs, and Sortable. Dr. Heinle earned his Ph.D. in Computer Science from the University of Waterloo, specializing in Symbolic Computation.

 

 

 

 

Location: 

Register to See Address