Software of any complexity always ships with bugs. Given our reliance on a staggeringly complex web of data and services, how do we, and how should we, deal with these security vulnerabilities when they are discovered? What are the social,…
Continue Reading→Whack-An-IoT by Vel Pavlov
Date of meeting: April 21, 2017 Assessing a moving target will focus on providing qualitative approach to quantify risk when working with IoT devices. We will step through performing contextual risk assessment, data flows, threat modeling, vulnerability analysis with emphasis…
Continue Reading→Interested In Attending?
March 17 Ransomware for the Non-Engineer Speaker: Nick Hyatt Ransomware for the Non-Engineer is a high-level overview of the history, capabilities, delivery methods, and current trends in ransomware as observed by Optiv’s EIM team. The examples in this presentation are…
Continue Reading→