07-09-2016 Demonsaw

Demonsaw Demonsaw is a secure and anonymous information sharing application that makes security simple and gives you back control of your data. In the current data climate, privacy and security are the most important things to think about when communicating or exchanging data. Demonsaw aims to allow users to freely share data and communications while […]

06-25-2016 ADS-B Vulnerabilities in Aviation

ADS-B Vulnerabilities in Aviation  A discussion and presentation on current aviation navigation and spoofing vulnerabilities. Will will demonstrate how current aviation entities identify potentially sensitive information as well as how the information can be exploited. Presenter: Will Nett Broward Main Library – 2PM 100 S Andrews Ave, Fort Lauderdale, FL  (6th Floor)  

06-11-2016 NIST Cybersecurity Framework

NIST Cybersecurity Framework  Description:  In February of 2013, President Obama signed Executive Order #13636, directing NIST (National Institute of Standards and Technology) to develop a voluntary framework for cybersecurity.  After a year of meetings and work, NIST rolled out version 1.0 of the Cybersecurity Framework (CSF) in February of 2014. The Framework sets down a […]

05-28-2016 Hackmiami Conference Recap

We will be recapping the HackMiami conference, discussing talks, workshops, events, and feedback. We will also have an open discussion on Industry news, events, and the like. Bob will also take the group down to the first floor to showcase the upcoming Creation Station changes and revamp. *We will be meeting on the 6th floor […]

05-07-2016 Pentest 101

Penetration testing 101 This interactive workshop will provide attendants with basic information about researching vulnerabilities/exploits, identifying running services/ports/, exploit research, exploit validation. This workshop will give you an overview of Penetration testing and will also provide you information about training offerings available, magazines, toolz , websites, competitions, etc., so you can choose your own training […]

04-02-2016 – Social Engineering Countermeasures -Ace X0r

          Social Engineering countermeasures Acexor will go over concepts of Social Engineering and how to defend against people trying to get your information or gain access to your machines via Social Engineering. Time to break out those ‘useless’ degrees in psychology and see how the hackers use these techniques to glean […]