Next Meeting Thursday, October 10, 2019 from 5:30 PM to 8:00 PM (Eastern)
|First Presentation: Wanted: Bugs – Dead or Alive||Second Presentation: Reverse Engineering Malware|
First Presentation: Wanted: Bugs – Dead or Alive
Speaker: Curtis Brazzell, Principal Security Consultant, Pondurance
Abstract: Depending on the security maturity level of your organization, you have some options when it comes to squashing bugs. Maybe your security posture is hardened and you’re ready to participate in a bug bounty program or red team assessment. Perhaps you’re just getting started and need to begin with vulnerability scans or penetration testing first. Wherever you are, there are options you have to continue strengthening that posture and we’ll discuss the pros and cons of each. The end goal is the same either way, we want to exterminate these bugs before an adversary can use them against you!
Bio: Curtis is the Managing Consultant for the Penetration and Application Testing team at Pondurance. With a lifelong passion for anything IT related, he brings a well rounded skill set to the team and loves to stay technical, even as a manager. His IT career started with years of professional experience as a Database Administrator, Systems Administrator, Sr Security Analyst in a global SOC, and then a Lead Digital Forensics Investigator / Malware Analyst before coming to Pondurance to pursue his passion for Information Security.
Curtis holds a Bachelor of Science (BS) degree in Information Technology and is publicly acknowledged with CVE’s for critical vulnerabilities in both FireEye and Adobe products. He has created his own Intrusion Detection and Response platform in his free time and loves to tinker with new innovative ideas.
Second Presentation: Reverse Engineering Malware
Speaker: Rushahb “Rush” Vyas, Security Analyst, Pondurance
Abstract: This presentation will discuss the basics of malware analysis. Then we’ll discuss whether you always need it and if you do, how you can reduce the time spent doing it. We will also discuss the benefits of doing malware analysis (+ some OSINT) during an incident response scenario and how to use data obtained from the analysis to aid in your incident response efforts.
Bio: Rush is a security analyst working in the Pondurance SOC team. He started out focusing on offensive security but now he also assists in DFIR and other defensive activities. Currently, he does SOC and dev work at Pondurance. He loves to automate tasks to minimize the amount of work done by other analysts.
Dinner Sponsorship: Pondurance
5:30 – 6:00 pm > Networking and Food
6:00 – 6:15 pm > Central Indiana ISSA Introduction and Chapter Business
6:15 – 8:00 pm > Meeting Speaker(s)
8:00 pm > Optional Social Hour
Please note: This meeting will take place at the Pondurance office, Suite 500, located at 500, North Meridian Street, Indianapolis. Guest parking is available on the surface lot at the corner of Illinois and Michigan streets. Please enter the building from the west side (Illinois St.). If you made use of the guest parking, please sign in at the Security desk and note the make/model/color of your vehicle. Take the elevator to the fifth floor and sign in at the iPad kiosk in our lobby. This will alert our team of your arrival and one of our team members will greet you.