This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

Difference between revisions of "Cambridge"

From OWASP
Jump to: navigation, search
(Past Events)
 
(54 intermediate revisions by 2 users not shown)
Line 1: Line 1:
 
{{Chapter Template|chaptername=Cambridge|extra=The chapter leaders are [mailto:[email protected] Adrian Winckles ]  and [mailto:[email protected] Steven van der Baan].|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-Cambridge|emailarchives=http://lists.owasp.org/pipermail/owasp-Cambridge}}
 
{{Chapter Template|chaptername=Cambridge|extra=The chapter leaders are [mailto:[email protected] Adrian Winckles ]  and [mailto:[email protected] Steven van der Baan].|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-Cambridge|emailarchives=http://lists.owasp.org/pipermail/owasp-Cambridge}}
  
<paypal>Cambridge</paypal>
+
<b>Join our [https://www.meetup.com/OWASP-Cambridge-Meetup/ MeetUp]!<br>  
<!-- first tab -->
 
= Local News =
 
==='''Local News'''===
 
'''Cambridge OWASP Chapter Meeting
 
  
Thursday 19th January 2017 9:30– 17:00, Lord Ashcroft Building (LAB003), Anglia Ruskin University, Cambridge.
+
Follow us on  [http://twitter.com/#!/owaspcambs Twitter]<br>
  
Hosted by the Department of Computing & Technology, Anglia Ruskin University, British Computer Society (BCS) Cybercrime Forensics Special Internet Group and OWASP (Open Web Application Security Project) Cambridge Chapter.
+
Talk to us on [https://owasp.slack.com/app_redirect?channel=chapter-cambridge Slack]<br>
  
It looks increasingly likely that 2016 is going to be “Year of the Data Breach” with more and more organisation’s than ever before becoming part of the self-fulfilling prophecy, “there are two types of organization, those who know they’ve been breached and those who don’t”....
+
</b>
  
So what happens if despite your best efforts your defenses are ineffective and you suffer a data breach. Your organization needs to know how to handle the breach either internally and externally, who to inform and who to call.
+
For updates, events, membership; please visit our meet up page: http://www.meetup.com/OWASP-Cambridge-Meetup/<br>
  
What is needed is “incident response”, an organized approach to addressing and managing the aftermath of a security breach or attack (also known as an incident). The goal is to handle the situation in a way that limits damage and reduces recovery time and costs.
+
<meetup group="OWASP-Cambridge-Meetup" />
  
Background
 
  
OWASP (Open Web Application Security Project is a 501(c)(3) not-for-profit worldwide charitable organization focused on improving the security of application software. Their mission is to make application security visible, so that people and organizations can make informed decisions about true application security risks.
 
 
The British Computer Society (BCS) Cybercrime Forensics Special Interest Group (SIG) promotes Cybercrime Forensics and the use of Cybercrime Forensics; of relevance to computing professionals, lawyers, law enforcement officers, academics and those interested in the use of Cybercrime Forensics and the need to address cybercrime for the benefit of those groups and of the wider public.
 
 
The Department of Computing & Technology at Anglia Ruskin University is enhancing its curricula and capabilities in information security following its successful BSc(Hons) Information Security and Forensic Computing pathway. Establishing a joint professional networking groupwith OWASP concentrating on aspects of computing and application security is a key part of this enhancement.
 
 
'''Guest speakers: Peter Yapp from NCSC, Steve Shepherd MBE from 7Safe/PA Consulting and Tony Drewitt from IT Governance'''
 
 
 
 
'''Guest Speaker: Steve Shepperd MBE – Senior Forensic Consultant – 7Safe/PA Consulting'''
 
 
'''Abstract:''' Malware Red Alert: the first 24 hours
 
 
It’s Friday at 19:30. You are the acting manager of your organisation’s Security Operations Centre.
 
You are working the graveyard shift with a colleague when ...
 
 
Your SIEM alerts you to what may be the presence of a Trojan in your system. But before you have a chance to respond, you receive an email from a hacker making demands.
 
 
The threat is that highly-confidential information has been stolen from your financial database. If the hacker does not receive £2 million by midnight on Sunday, they will put this data on the web just before your firm’s annual financial report, due for release on Monday, is published. Their motive: to cause panic among investors by undermining the credibility of your growth and profit forecasts with data that the hacker claims they have found in emails and report documents.
 
 
What do you do next to thwart the attack, contain the incident and prevent, or at least minimise, damage to your brand name and reputation in the markets?Security incidents, both potential and actual, occur on a frequent basis. It is therefore important to accurately categorize incidents and prioritise the most severe. Evaluation is based on the impact that the data breach may have on business operations, the potential reputational risk and the time and cost of resources engaged in recovery.
 
 
Of critical importance is the effective gathering of key information about the attack in real time. Focusing on quick fixes should be avoided. It is important to clearly document all information collected/actions performed for subsequent analysis in a post incident review/lessons learned session. A clear plan must be established, including timeframes and ownership, to implement any required changes that will mitigate future risk.
 
 
Steve Shepherd MBE describes for the business audience a series of real life scenarios that will serve as a warning to Board members and SOC managers alike, as he shares his thoughts on how to apply the CREST Three-Phase CSIR model and invites the audience to role play with him in responding to this incident.
 
 
If you think that you understand incident response procedures from a ‘people, process and technology’ standpoint, be prepared to challenge what you deem to be fact during Steve’s practical talk and demonstration. The emphasis will be on knowledge transfer - and why software tools are never the whole answer.
 
 
 
'''Guest Speaker: Tony Drewitt, Head of Consultancy – IT Governance'''
 
 
'''Abstract:''' Cyber resilience and Incident Response
 
 
Tony will introduce today’s cyber threat environment and what it means in terms of security incidents. Cyber assurance techniques will be examined from 4 different perspectives, the conventional theme’s:
 
 
- People,
 
 
- Processes and
 
 
- Technology
 
 
but also examining Digital versus Physical security dimensions.
 
 
The talk will conclude with a discussion on cyber resilience versus incident response and if incident response is a necessity, what structure should it take.
 
 
'''Guest speaker: Peter Yapp - Deputy Director Incident Management for the National Cyber Security Centre (NCSC)'''
 
 
'''Abstract:''' “The Thermostat, the Hacker, and the Malware"
 
 
 
 
'''Biography:''' Peter Yapp 
 
 
Before joining the NCSC, Peter was Deputy Director Operations for CERT-UK. Prior to CERT-UK, Peter was the Information Security Advisor for Brecon Group and before that the Managing Director for Accenture’s global Computer Incident Response Team (CIRT) running a team of 50 based at five locations around the world. While there, he set up a cyber threat intelligence team and inputted into technical, policy and training initiatives. He also contributed to the maintenance of the largest ISO27001 certification in the world.
 
 
Prior to Accenture, Peter was head of Forensics and information security consulting at Control Risks in London. Peter devised and delivered information security awareness training courses for Oil and Gas clients around the world, specialised briefings on the threat of state sponsored espionage and a computer forensics training course for CISSPs. Peter reviewed and revised information security policy documents. He carried out IS Security (and ISO27001) reviews and gap analyses (and risk assessments) for the finance and manufacturing sectors. Peter carried out numerous computer investigations into fraud, abuse and misuse.
 
 
Before joining Control Risks in 1998, Peter was a Senior Investigation officer in the National Investigation Service of H.M. Customs & Excise. During this time he represented H.M. Customs & Excise at national and international conferences and seminars, speaking at Interpol on computer crime. He was a member of the British Home Office delegation to the G8 sub group on High Tech crime. Peter trained overseas agencies around the world.
 
 
 
'''Biography:''' Steve Shepperd MBE
 
 
Steve leads the 7Safe Cyber Security Incident Response offering. Steve has extensive experience in conducting and directing forensic and hi-tech investigations having been involved in the discipline since the late the 1990’s. Steve has worked within the Civil Service, law enforcement and private industry, latterly employed as a cyber security specialist for a government intelligence agency prior to joining PA Consulting. Steve has been involved as a team member and team leader in myriad digital investigations ranging from civil to criminal and national security level incidents. Steve is also the lead developer and course manager for the Certified Malware Investigator course, the Certified Data Acquisition Technician course and is the author of our new cyber Network Investigations course.
 
 
 
'''Biography:''' Tony Drewitt
 
 
Tony leads IT Governance’s consultancy team. He works with clients to help them implement and comply with international standards such as ISO 27001 and ISO 22301 as well as other compliance frameworks such as the NHS Information Governance Toolkit and the UK Gambling Commission’s technical security standard.
 
 
He has helped one of the first companies in the UK to achieve full certification under BS25999-2 (now ISO22301) and is currently delivering a number of ISO27001 ISMS projects for companies in the UK and overseas. He is also a leading business continuity author of ITGP titles A Manager’s Guide to ISO22301; ISO 22301: A Pocket Guide, and Everything You want to Know about Business Continuity.
 
 
Tony is a full member of BCI and is a certified Lead Implementer and Lead Auditor for ISO 27001 and ISO 22301. He also holds CRISC, CISMP and ITIL Foundation certificates.
 
 
'''Agenda'''
 
 
09:30 – 10:00 Registration & Refreshments
 
 
10:00 – 10:15 Welcome from the OWASP Cambridge Chapter Leader, Adrian Winckles, Course Leader in Information Security & Forensic Computing, Anglia Ruskin University
 
 
10:15 – 11:00 “National Cyber Security Centre’s Incident Response Strategy” – Peter Yapp – Deputy Director – Incident Management – National Cyber Security Centre (NCSC)
 
 
11:00 – 11:45 “Malware Red Alert: the first 24 hours” - Steven Shepherd MBE, 7Safe/PA Consulting
 
 
11:45 – 12:30 “Cyber resilience and Incident Response” Tony Drewitt, Head of Consultancy, IT Governance
 
 
12:30 – 13:15 Lunch & Networking (LAB006)
 
 
13:15 – 14:15 Dr Jules Disso – Nettitude “Incident Analysis including Live Incident Analysis”
 
 
14:15 – 14:45 Refreshments (LAB006)
 
 
14:45 – 15:30 Benn Morris - 3B Data Security LLP "Hacking Incidents - Real Life Case Examples”
 
 
15:30 – 16:15 Canterbury Christchurch University Speaker TBD
 
 
16:15 - 16:30 Session Wrap Up & Close
 
 
----
 
 
'''Registration:'''
 
 
To register for this free event, please register online
 
[https://www.eventbrite.com/e/joint-owasp-bcs-cybercrime-forensics-sig-incident-response-day-2017-tickets-30549478312 here]
 
 
The conference will be held in the Lord Ashcroft Building, Room LAB002 (Breakout Room LAB006 for networking & refreshments).
 
 
Please enter through the Helmore Building and ask at reception.
 
 
----
 
 
'''Meeting Location'''
 
 
Anglia Ruskin University
 
 
Cambridge Campus
 
 
East Road
 
 
Cambridge
 
 
CB1 1PT
 
 
Get further information on travelling to the university.
 
 
http://www.anglia.ac.uk/ruskin/en/home/your_university/anglia_ruskin_campuses/cambridge_campus/find_cambridge.html
 
 
Everyone is welcome to join us at our chapter meetings.
 
 
----
 
'''Planned dates for upcoming events'''
 
 
 
Thursday 19th January 2017
 
 
Wednesday 25th January 2017
 
 
Tuesday 7th February 2017
 
 
Tuesday 7th March 2017
 
 
Tuesday 4th April 2017
 
<!-- second tab -->
 
  
 
= Past Events =
 
= Past Events =
{|class="wikitable" border="1" style="text-align:center;"|
+
{| class="wikitable" style="text-align:center;" border="1" |
 
! width="300" | Date
 
! width="300" | Date
 
! width="350" | Name / Title
 
! width="350" | Name / Title
 
! width="300" | Link
 
! width="300" | Link
 +
|-
 +
|5 November 2019
 +
|Andrea Scaduto
 +
|[[Media:RTF-OWASP-Cambridge.pdf|presentation]]
 +
|
 +
|-
 +
|8 October 2019
 +
|Dinis Cruz - Revolut
 +
|[https://www.slideshare.net/DinisCruz/using-owasp-security-bot-osbot-to-make-fact-based-security-decisions Presentation]
 +
|
 +
|-
 +
|8 October 2019
 +
|Jeff Williams - Contrast Security
 +
|[https://contrastsecurity.app.box.com/s/w2pv7cb46r3guyob6i1xf0igne9g281g Presentation]
 +
|
 +
|-
 +
|14 May 2019
 +
|Aleksander Gorkowienko - ICS/SCADA Security
 +
|[https://spirent1-my.sharepoint.com/:b:/g/personal/aleksander_gorkowienko_spirent_com/EfDeMof_rydPsGBCGioPuBAB-7VpkIB4jGVtNv2vm8uUhQ?e=dA7hha presentation]
 +
|
 +
|-
 +
|14 May 2019
 +
|Andrew Baldwin - Cyber PREVENT
 +
|[[Media:Cyber_Prevent_for_OWASP_May_2019.pdf|presentation]]
 +
|
 +
|-
 +
|10 April 2019
 +
|Matthew Lorentzen - Sheepl
 +
|[[Media:OWASP-Sheepl_Presentation_April19.pdf|presentation]]
 +
|
 +
|-
 +
|12 March 2019
 +
|Jamie Roderick
 +
|
 +
|-
 +
|12 March 2019
 +
|Nour Fateen
 +
|[[Media:Nour_-_OWASP-3.pdf|presentation]]
 +
|
 +
|-
 +
|12 March 2019
 +
|Matthew Whitcombe
 +
|[[Media:MWR_-_OWASP_v6.pdf|presentation]]
 +
|
 +
|-
 +
|24 January 2019
 +
|Adrian Winckles
 +
|[[Media:Botprobe_-_Reducing_Network_Threat_Intelligence_Big_Data_v0-1_.pdf|presentation]]
 +
|
 +
|-
 +
|24 January 2019
 +
|Simon Newman
 +
|[[Media:Cyber_Threat_Intelligence_Day_(Anglia_Ruskin_University).pdf|presentation]]
 +
|
 +
|-
 +
|4 December 2018
 +
|Matthew Lorentzen
 +
|[[Media:From_battlefield_to_bunker_v1-0.pdf|presentation]]
 +
|
 +
|-
 +
|4 December 2018
 +
|Etienne Greeff
 +
|[[Media:Seconds_out_2018_AI_&_ML_40_min_version.pdf|presentation]]
 +
|
 +
|-
 +
|6 November 2018
 +
|Adrian Winckles
 +
|[[Media:OWASP_Cambridge_Talk_-_Application_Honeypot_Threat_Intelligence_v1-0.pdf|presentation]]
 +
|
 +
|-
 +
|6 November 2018
 +
|Dr Grigorios Fragkos
 +
|[[Media:OWASP_Cambridge_-_6Nov2018_-_G.Fragkos.pdf|presentation]]
 +
|
 +
|-
 +
|17 May 2018
 +
|Goher Mohammad
 +
|[https://www.slideshare.net/GoherMohammad/joint-owasp-cambridge-bcs-cybercrime-forensics-sig-uk-cyber-security-forum-cambridge-cluster Presentation]
 +
|
 +
|-
 +
|13 March 2018
 +
|David Johannson
 +
|[[Media:Cambridge 13-Mar-2018 OWASP Top 10 2017.pdf|presentation]]
 +
|
 +
|-
 +
|13 March 2018
 +
|Rish Auckburally
 +
|[[Media:Intro to 3B RA V1.pdf|presentation]]
 +
|
 +
|-
 +
|18 January 2018
 +
|Deepinder Singh
 +
|[[Media:OWASP-AI-Cybersecurity Cambridge-Deep-180118.pdf|presentation]]
 +
|
 +
|-
 +
|18 January 2018
 +
|Chris Woods
 +
|[[Media:Deck OWASP event 17-01.pptx|presentation]]
 +
|
 +
|-
 +
|18 January 2018
 +
|Nikola Milosevic
 +
|[[Media:OWASPCambridge.pptx|presentation]] ‎
 +
|
 +
|-
 +
|18 January 2018
 +
|Dr Ali Dehghantanha
 +
|[[Media:OWASP Cambridge Myths and Truths Cyber Threat Hunting and Intelligence in IoT Environments.pptx|presentation]] ‎
 +
|
 +
|-
 +
|10 January 2018
 +
|Aleksander Gorkowienko
 +
|[[Media:A.Gorkowienko-Securing Oil and Gas Systems From Cyber-attack v1.1.pdf|presentation]]
 +
|
 +
|-
 +
|5 December 2017
 +
|Deepinder Singh
 +
|
 +
|-
 +
|5 December 2017
 +
|Leum Dunn
 +
|[[Media:100 things.pdf|presentation]]
 +
|
 +
|-
 +
|7 November 2017
 +
|Dr Reza Alavi
 +
|[[Media:GDPR.pptx|presentation]]
 +
|-
 +
|11 October 2017
 +
|Dr Char Sample
 +
|[[Media:FN-20171011_(compressed_image_version.pdf|presentation]]
 +
|-
 +
|11 October 2017
 +
|Dennis Ivory & Dr Diane Gan
 +
|[[Media:Anglia Ruskin F435.pptx|presentation]]
 +
|-
 +
|12 September 2017
 +
|John Fitzgerald - Secure Code Warrior
 +
|presentation
 +
|-
 +
| 4 April 2017
 +
| Leum Dunn - Redacted
 +
| [[Media:A day in the life of.pdf|presentation]]
 +
|--
 +
| 7 March 2017
 +
| Andrew Thompson - Checkmarx
 +
| [[Media:OWASP Cambridge - Checkmarx Software AppSec kit.pdf|presentation]]
 +
|--
 +
| 7 March 2017
 +
| John Haine IoT Security Foundation (Chair)
 +
| [[Media:Ambassador IoTSF Feb 2017 Intro jlh.pdf|presentation]]
 
|-
 
|-
 
| 25 Jan 2017
 
| 25 Jan 2017
Line 195: Line 198:
 
| 19 Jan 2017
 
| 19 Jan 2017
 
| Tony Drewitt / Head of Consultancy - IT Governance
 
| Tony Drewitt / Head of Consultancy - IT Governance
| [[Media:ITG_IncidentResponse_20170119.pdf|presentation]]
+
| [[Media:ITG IncidentResponse 20170119.pdf|presentation]]
 
|-
 
|-
 
| 19 Jan 2017
 
| 19 Jan 2017
Line 203: Line 206:
 
| 19 Jan 2017
 
| 19 Jan 2017
 
| Martin Cassey / Nascenta
 
| Martin Cassey / Nascenta
| [[Media:2017-01-25,GDPR Readiness-Handout.pdf|presentation]]
+
| [[Media:Nascenta-IM-handout.pdf|presentation]]
 
|-
 
|-
 
| 10 Nov 2016
 
| 10 Nov 2016
Line 215: Line 218:
 
| 12 05 2016
 
| 12 05 2016
 
| Phil Cobley / Modern Policing & the Fight Against Cyber Crime
 
| Phil Cobley / Modern Policing & the Fight Against Cyber Crime
| [[Media:Cyber_Threat_Presentation_-_ARU_Cyber_Resilience_-_May_2016.pdf|presentation]]
+
| [[Media:Cyber Threat Presentation - ARU Cyber Resilience - May 2016.pdf|presentation]]
 
|-
 
|-
 
| 12 05 2016
 
| 12 05 2016
 
| Jules Pagna Disso / Building a resilient ICS  
 
| Jules Pagna Disso / Building a resilient ICS  
| [[MEdia:Building_a_resilient_ICS.pdf|presentation]]
+
| [[MEdia:Building a resilient ICS.pdf|presentation]]
 
|-
 
|-
 
| 08 03 2016
 
| 08 03 2016
Line 247: Line 250:
 
| 21 October 2014
 
| 21 October 2014
 
| Eireann Leverett
 
| Eireann Leverett
| [[Media:20141021-Eireann_Leverett-SwitchesGetStitches.pdf|presentation]]
+
| [[Media:20141021-Eireann Leverett-SwitchesGetStitches.pdf|presentation]]
 
|-  
 
|-  
 
| 1st April 2014
 
| 1st April 2014
Line 267: Line 270:
 
| 12th November 2013
 
| 12th November 2013
 
| James Forshaw/ The Forger's Art: Exploiting XML Digital Signature Implementations
 
| James Forshaw/ The Forger's Art: Exploiting XML Digital Signature Implementations
| [[Media:20131112-James_Forshaw-the_forgers_art-james_forshaw-breakpoint2k13.pdf|presentation]]
+
| [[Media:20131112-James Forshaw-the forgers art-james forshaw-breakpoint2k13.pdf|presentation]]
 
|-  
 
|-  
 
| 5th March 2013
 
| 5th March 2013
Line 277: Line 280:
 
| [http://www.slideshare.net/Roo7break/power-on-powershell presentation]
 
| [http://www.slideshare.net/Roo7break/power-on-powershell presentation]
 
|}
 
|}
 
 
<!-- Don't remove this tag -->
 
<!-- Don't remove this tag -->
 
__NOTOC__  
 
__NOTOC__  
<headertabs/>
+
<headertabs></headertabs>

Latest revision as of 21:30, 13 November 2019

OWASP Cambridge

Welcome to the Cambridge chapter homepage. The chapter leaders are Adrian Winckles and Steven van der Baan.


Participation

OWASP Foundation (Overview Slides) is a professional association of global members and is open to anyone interested in learning more about software security. Local chapters are run independently and guided by the Chapter_Leader_Handbook. As a 501(c)(3) non-profit professional association your support and sponsorship of any meeting venue and/or refreshments is tax-deductible. Financial contributions should only be made online using the authorized online chapter donation button. To be a SPEAKER at ANY OWASP Chapter in the world simply review the speaker agreement and then contact the local chapter leader with details of what OWASP PROJECT, independent research or related software security topic you would like to present on.

Sponsorship/Membership

Btn donate SM.gif to this chapter or become a local chapter supporter. Or consider the value of Individual, Corporate, or Academic Supporter membership. Ready to become a member? Join Now BlueIcon.JPG


Join our MeetUp!

Follow us on Twitter

Talk to us on Slack

For updates, events, membership; please visit our meet up page: http://www.meetup.com/OWASP-Cambridge-Meetup/

Chapter Meetings

Visit our group on meetup.com

Upcoming events

No events are scheduled at the moment.

Past events

  • Sep 26, 2023 (17:00): Adding SAST to CI/CD, Without Losing Any Friends, · , Hosted by the Cyber Security & Networking Research Group, Anglia Ruskin University, OWASP (Open Web Application Security Project) Cambridge Chapter, & BCS Cybercrime Forensics SG **Background** The **BCS – Chartered Institute for IT - Cybercrime Forensics Special Interest Group (SG)** promotes Cybercrime Forensics and the use of Cybercrime Forensics; of relevance to computing professiona (read more)
  • Jul 6, 2023 (17:00): Operation Poppins: An immersive Interactive case study driven approach, · , Hosted by the Cyber Security & Networking Research Group, Anglia Ruskin University, OWASP (Open Web Application Security Project) Cambridge Chapter, & BCS Cybercrime Forensics SG/BCS Women & BCS Hampshire/Dorset branches **Background** The BCS – Chartered Institute for IT - Cybercrime Forensics Special Interest Group (SG) promotes Cybercrime Forensics and the use of Cybercrime Forens (read more)
  • Jun 6, 2023 (17:00): OWASP ZAP - An Introduction and Deeper Dive, · , Hosted by the Cyber Security & Networking Research Group, Anglia Ruskin University, OWASP (Open Web Application Security Project) Cambridge Chapter, & BCS Cybercrime Forensics SG **Background** The **BCS – Chartered Institute for IT - Cybercrime Forensics Special Interest Group (SG)** promotes Cybercrime Forensics and the use of Cybercrime Forensics; of relevance to computing professiona (read more)
  • Apr 20, 2023 (17:00): What your Washing Machine says about you: Investigating unusual devices, · , Hosted by the Cyber Security & Networking Research Group, Anglia Ruskin University, OWASP (Open Web Application Security Project) Cambridge Chapter, & BCS Cybercrime Forensics SG/BCS Women & BCS Hampshire/Dorset branches **Background** The BCS – Chartered Institute for IT - Cybercrime Forensics Special Interest Group (SG) promotes Cybercrime Forensics and the use of Cybercrime Forens (read more)
  • Mar 23, 2023 (17:30): Can forensic processes thwart the use of portable programmable devices?, · , Hosted by the Cyber Security & Networking Research Group, Anglia Ruskin University, OWASP (Open Web Application Security Project) Cambridge Chapter, & BCS Cybercrime Forensics SG **Background** The BCS – Chartered Institute for IT - Cybercrime Forensics Special Interest Group (SG) promotes Cybercrime Forensics and the use of Cybercrime Forensics; of relevance to computing professionals, (read more)
See all past events on meetup.com


Past Events

Date Name / Title Link
5 November 2019 Andrea Scaduto presentation
8 October 2019 Dinis Cruz - Revolut Presentation
8 October 2019 Jeff Williams - Contrast Security Presentation
14 May 2019 Aleksander Gorkowienko - ICS/SCADA Security presentation
14 May 2019 Andrew Baldwin - Cyber PREVENT presentation
10 April 2019 Matthew Lorentzen - Sheepl presentation
12 March 2019 Jamie Roderick
12 March 2019 Nour Fateen presentation
12 March 2019 Matthew Whitcombe presentation
24 January 2019 Adrian Winckles presentation
24 January 2019 Simon Newman presentation
4 December 2018 Matthew Lorentzen presentation
4 December 2018 Etienne Greeff presentation
6 November 2018 Adrian Winckles presentation
6 November 2018 Dr Grigorios Fragkos presentation
17 May 2018 Goher Mohammad Presentation
13 March 2018 David Johannson presentation
13 March 2018 Rish Auckburally presentation
18 January 2018 Deepinder Singh presentation
18 January 2018 Chris Woods presentation
18 January 2018 Nikola Milosevic presentation
18 January 2018 Dr Ali Dehghantanha presentation
10 January 2018 Aleksander Gorkowienko presentation
5 December 2017 Deepinder Singh
5 December 2017 Leum Dunn presentation
7 November 2017 Dr Reza Alavi presentation
11 October 2017 Dr Char Sample presentation
11 October 2017 Dennis Ivory & Dr Diane Gan presentation
12 September 2017 John Fitzgerald - Secure Code Warrior presentation
4 April 2017 Leum Dunn - Redacted presentation
7 March 2017 Andrew Thompson - Checkmarx presentation
7 March 2017 John Haine IoT Security Foundation (Chair) presentation
25 Jan 2017 Nick Alston CBE / PIER Chair presentation
25 Jan 2017 Mark Pearce/ 7Safe/PA Consulting presentation
25 Jan 2017 Martin Cassey / Nascenta presentation
25 Jan 2017 Paul Rowley FBCS / Havebury Housing Association presentation
25 Jan 2017 Laurence Kaleman / Legal Director, Olswang presentation
25 Jan 2017 Tony Drewitt / Head of Consultancy - IT Governance presentation
19 Jan 2017 Tony Drewitt / Head of Consultancy - IT Governance presentation
19 Jan 2017 Peter Yapp / NCSC Deputy Director - Incident Response presentation
19 Jan 2017 Martin Cassey / Nascenta presentation
10 Nov 2016 Graham Rymer / University of Cambridge
10 Nov 2016 Mark Wickenden
12 05 2016 Phil Cobley / Modern Policing & the Fight Against Cyber Crime presentation
12 05 2016 Jules Pagna Disso / Building a resilient ICS presentation
08 03 2016 Andrew Lee-Thorp / So you want to use a WebView? Android WebView: Attack and Defence
10 11 2015 Steve Lord / Trying (and failing) to secure the Internet of Things
John Mersh / Software and System Security: a life vest in the IoT ocean
10 Oct 2015 Sumit "sid" Siddharth / Some neat, new and ridiculous hacks from our vault
10 Feb 2015 Steven van der Baan / Web Application Security Testing with Burp Suite
2 December 2014 Colin Watson / OWASP Cornucopia
21 October 2014 Eireann Leverett presentation
1st April 2014 Ian Glover (CREST) / Overview of the CREST activities to professionalise the industry.
Yiannis Chrysanthou (KPMG) / Modern Password Cracking
Damien King (KPMG) / Filename Enumeration with TildeTool
12th November 2013 Paul Cain / Tracking Data using Forensics
12th November 2013 James Forshaw/ The Forger's Art: Exploiting XML Digital Signature Implementations presentation
5th March 2013 Sarantis Makoudis / Android (in)Security presentation
5th March 2013 Nikhil Sreekumar / Power On, Powershell presentation