kat
DC612 – Thursday February 9th – 6pm @ Wild Roast
This February we welcome Josh More as he presents to us,
Captivating Security – Safety versus Passion
After decades of trying to get noticed, infosec has arrived in business. We have the attention of senior management and boards. We finally have budget. We finally have power. What are we going to do with it?
We stand at a fork in the road.One path is well trodden. Paved with best practices, metrics, and models, we can follow other industries. By restricting capabilities and focusing on compliance with regulations, standards, and monitoring efforts, we can merge with mature industries like banking, insurance, and the highly structured governmental/military ways of doing things. This path is safe.
The other path is rocky and overgrown. This is the path walked by those who must deal with complexity. Using nature conservation as a model, this path involves constant exploration and experimentation. Those on this path must use creativity and resilience to address the complexities involved in the overlap of economics and ecologies. This path is risky … but with risk comes reward.
Josh More is actively researching this second path, using the history of endangered species conservation and captive breeding as a model for where our industry could go. Though a harder path and less certain, the advantages of resisting the easy path could be tremendous. This is extremely early stage research and Josh would appreciate frank discussion around the ideas involved to help guide future research and maximize the utility of the eventual book.
Additionally we will be discussing the launch of DC612 Projects, reviewing the categories and announcing the SME’s.
See you all at the Wilde Roast!
***DC612 presents PROJECTS***
So what are you into these days?
Crypto? Reverse Engineering? Networking? Recon? Banana Phones?
DC612 wants everyone to turn their hobbies, tinkerings and musings into a DC612 Project.
Projects:
In the Month of February, DC612 will be opening a new program in which YOU are encouraged to sign up for and research a topic of your choosing.
Then, turn your Project into a 20 minute talk that you bring back to the group and present along with others in your category.
Talking in front of a group not your thing? We make it really easy. Share the Pain and Glory of public speaking with your fellow DC612ers. No single project will headline a meeting. Rather, you can present your project along with others researching similar topic
Also, we have a feedback mechanism baked into DC612 Projects. Prior to talking, specific folks who’ve volunteered their time will review your presentation notes and slides. These folks have a ton of experience speaking in front of groups and making slide decks. They are there to give you pointers on how to present your ideas effectively.
Project Categories:
We’ve organized possible projects into the following categories and assigned 1-3 SME’s to each category.
RECON – Presenting in June
WEB SECURITY – Presenting in July
CRYPTO – Presenting in September
DFIR – Presenting in October
NETWORK SECURITY – Presenting in November
MISC (encompassing all fruit related topics) – TBD
First, sign yourself up under a category before the March DC612 meeting (3/09), then put your feet up and relax. You’ve got time!
But you should probably pick a topic to start reading about, fiddling around with or building upon your ideas?
And then, Connect with the SME in your category. They are there to give you a sanity check should you ask them to look over some technical components of your research.
Also, if you need to be pointed in a good direction when beginning your project, ask your SME.
They have all graciously volunteered their time to help out projects in their area of expertise and will be announce at the upcoming February meeting (2/09).
To recap:
-Sign up under a category before March 9th. (Sign Up Here)
-Attend DC612, February 9th, for the SME announcements, and topic suggestions.
-Do the Project.
See you all on the 9th.
-Kat
DC612 – Thursday, January 12th – 6pm @ the Wilde Roast
Greetings Frozen Hackers, Makers and Tinkerers alike.
The weather is again threatening to numb our fingers and undermine our resolve.
Right on cue, comes the SANS Holiday Hack Challenge to warm our hearts if not our car.
Join DC612 (you!), Kat Traxler (gal on keys) and Suzie Juul, (actress of stage and screen) as we walk though this years
Holiday Hack Challenge.
You will experience the newly unveiled 16-bit world of the game and solutions to some of the stickiest challenges.
All accompanied by a dramatic reading of the Holiday Hack saga of Jessica and Josh and their quest to find Santa.
See you all at Wilde Roast!
DC612 – Monday, December 5th – 6pm @ the Wilde Roast
DC612 December Meeting – Evading Digital Surveillance
Subtitled: A Crypto for you a Crypto for me.
December 5th, 6pm-8pm @ Wilde Roast Cafe (65 SE Main St, Minneapolis, MN 55414)
In recent weeks, there has been a spike of interest around the issues of digital surveillance and what options exist to lead a more private life on the Internet.
Join DC612 for a series of short presentations on evasion technologies followed by a workshop in which you may try some of these techniques yourself.
Topics covered will include
– The use of Torbrowser for anonymous web browsing.
– The use of Tails Linux for privacy protection anywhere at any time
– The use of PGP and Protonmail for free encrypted email
– The use of OTR for free encrypted real-time communication
– Considerations for selecting a VPN/proxy service
– Considerations for creating and managing anonymizing online identities
– Considerations for making anonymous purchases online
If any of these topics interest you, please join us. If any of these topics interest your friends, please pass the word about this meeting.
Feel free to bring a laptop and additionally a flash drive if you wish to configure your own live TAILS OS with us.
DC612 – Tuesday, October 11th – 6pm @ the Wilde Roast
DC612 brings you:
“Many threat vectors have been assessed in the medical device world, but there is no available work on extortion as a threat vector. By mapping the extortion attack surface area of a given medical device, understanding the threat actors, and looking into how the exploits would happen, I made a tool to help understand the problem better. My hope is that a medical device company would use this information to roll extortion threat assessment into their existing safety evaluations.” – Judd Larson