Unveiling the Dynamics of Korean Cyber Warfare: Past, Present, and Future
May
7
11:30 AM11:30

Unveiling the Dynamics of Korean Cyber Warfare: Past, Present, and Future

Speaker - Dyonne Lindsay

Unveiling the Dynamics of Korean Cyber Warfare: Past, Present, and Future

In recent years, the realm of international conflict has expanded into the digital sphere, with cyber warfare emerging as a potent tool for state actors and non-state entities alike. Among the forefront players in this arena is the Korean Peninsula, a region marked by geopolitical tensions and technological prowess. This presentation delves deep into the multifaceted landscape of Korean cyber warfare, tracing its evolution from its nascent stages to its current state and forecasting its future trajectories.

Secure your seat here!

Registration is free, but space is limited! Please register here so we know how many people to prepare for

If you register, but are unable to attend, PLEASE refund your ticket. Having an accurate count helps us save money to do this more often.

View Event →
Apr
16
5:30 PM17:30

AI developed Cybersecurity Awareness Training

Speakers - Shoshana Sugerman, Sanya Joseph, Sari Lewis, Ishita Pandey, Dr. Brian Callahan

AI developed Cybersecurity Awareness Training

Generative AI sits at the precipice of new era in cybersecurity. Many tasks crucial to securing today's enterprises are made possible only through the use of AI systems. However, there may be other tasks where understanding the nuances and risks of AI are underresearched. In this talk, a team of students from RPI and their professor dive into the benefits and risks of using Generative AI to develop RPI's Cybersecurity Awareness Training. Far from a simple prompt and delivery, Generative AI on these human-facing tasks require some ethical considerations and a fair amount of testing and refinement before its full potential can be realized.

They will show how you can best use Generative AI for your own Cybersecurity Awareness Training campaign, what pitfalls to be aware of, and how to ensure your employees receive the best training by leveraging the best of what AI--and humans--bring to the table.

Secure your seat here!

Registration is free, but space is limited! Please register here so we know how many people to prepare for

If you register, but are unable to attend, PLEASE refund your ticket. Having an accurate count helps us save money to do this more often.

View Event →
Mar
13
5:30 PM17:30

OpenBSD: Developing the security you rely on since 1996

Speaker- Brian Callahan

OpenBSD: Developing the security you rely on since 1996

OpenBSD is the home of OpenSSH. Besides the primary ssh implementation the world depends on, OpenBSD has spearheaded a wide variety of security mitigations, techniques, and code that is baked into every device you own. OpenBSD's influence also allows it to push the world's security forward in powerful ways that most don't even realize, yet absolutely rely on.

In this talk, from an OpenBSD developer who earned his account in 2013, we will explore what makes OpenBSD special, why our track record on security is so important, and how you benefit from the work of the global team of OpenBSD developers. Even if you don't directly run OpenBSD (though you should!), you'll come away with a greater understanding of the work it takes to produce the world's most secure operating system and the ways in which OpenBSD has made the world a better--and more secure--place.

Secure your seat here!

Registration is free, but space is limited! Please register here so we know how many people to prepare for

If you register, but are unable to attend, PLEASE refund your ticket. Having an accurate count helps us save money to do this more often.

View Event →
Cybersecurity Risks of AI with Jonathan Easton
Feb
20
5:30 PM17:30

Cybersecurity Risks of AI with Jonathan Easton

Speaker- Jonathan Easton

Cybersecurity Risks of AI

A dive into the cybersecurity risks of AI to individuals and organizations, & provide some measure they can take to safe guard themselves. This talk would not focus on hacking or protecting AI tools that an organization develops, but on measures to take against adversarial AI.

Secure your seat here!

Registration is free, but space is limited! Please register here so we know how many people to prepare for

If you register, but are unable to attend, PLEASE refund your ticket. Having an accurate count helps us save money to do this more often.

View Event →
Filet-O-Phish: Exploring the state of phishing, and the defenses provided by phishing-resistant authentication.
Jan
17
5:30 PM17:30

Filet-O-Phish: Exploring the state of phishing, and the defenses provided by phishing-resistant authentication.

Speaker- Eric Woodruff

Filet-O-Phish: Exploring the state of phishing, and the defenses provided by phishing-resistant authentication

A glance at the impact of phishing and business email compromise, emerging and common trends within phishing campaigns, and exploring why phishing-resistant authentication is our best defense.

Secure your seat here!

Registration is free, but space is limited! Please register here so we know how many people to prepare for

If you register, but are unable to attend, PLEASE refund your ticket. Having an accurate count helps us save money to do this more often.

View Event →
Dec
13
5:30 PM17:30

Get Your Head in the Clouds (A look into Entra ID, formerly Azure AD)

Speaker- Zach Keenan

Some fun things that a regular user can discover in AzureAD (Entra). This includes attack techniques and tools. What you can do to spot them, and how to stop them.

Secure your seat here!

Registration is free, but space is limited! Please register here so we know how many people to prepare for

If you register, but are unable to attend, PLEASE refund your ticket. Having an accurate count helps us save money to do this more often.

View Event →
Nov
14
5:30 PM17:30

Artificial Intelligence in the SOC: Practical Techniques Security Analysts Can Leverage Today

Speaker- Jim Greene

Machine Learning and Artificial Intelligence have taken the world by storm in recent years, especially with the explosive growth of tools such as ChatGPT. This presentation will cover the current state of AI/ML in cybersecurity, what it can and cannot do, how big players such as Microsoft are using it, and what tools are freely available to security professionals. We will discuss how to use these tools for enhancing intelligence gathering, threat hunting and incident response.

Secure your seat here!

Registration is free, but space is limited! Please register here so we know how many people to prepare for

If you register, but are unable to attend, PLEASE refund your ticket. Having an accurate count helps us save money to do this more often.

View Event →
Oct
17
5:30 PM17:30

Platform/Prompt Engineering, LLMs, and the Assessment of Their Inconsistency and Hallucination Capacity

Speakers- Mahsa Goodarzi, Krishnan Radhakrishnan, M. Abdullah Canbaz

In recent years, Language Model technologies have witnessed remarkable advancements, transforming the way we interact with AI and process natural language. One of the most influential developments in this domain is Large Language Models (LLMs), such as GPT-3 and its successors. These models demonstrate astonishing capabilities, but they also introduce complex challenges, particularly regarding their consistency and potential for generating hallucinations in responses.

This presentation delves into the fascinating world of Platform/Prompt Engineering, where we explore how the careful crafting of input prompts can significantly influence the output of LLMs. We will uncover the techniques used to harness the power of these models and guide them towards generating desired, reliable, and contextually relevant content.

However, with great power comes great responsibility. As LLMs grow in sophistication, they exhibit occasional inconsistencies and even hallucinations in their responses. We will address this critical concern, discussing methods for assessing the inconsistency and hallucination capacity of LLMs. By understanding the causes of these issues, we can develop strategies to mitigate their impact and improve the reliability of LLM-generated content..

Secure your seat here!

Registration is free, but space is limited! Please register here so we know how many people to prepare for

If you register, but are unable to attend, PLEASE refund your ticket. Having an accurate count helps us save money to do this more often.

View Event →
TRIVIA NIGHT!
Sep
26
5:30 PM17:30

TRIVIA NIGHT!

We invite you to the next #CyBeer event, which will be a Cyber Security Trivia! We hope to see you there.

Secure your seat here!

Registration is free, but space is limited! Please register here so we know how many people to prepare for

If you register, but are unable to attend, PLEASE refund your ticket. Having an accurate count helps us save money to do this more often.

View Event →
Aug
22
5:30 PM17:30

The Threat Landscape according to the DBIR (Data Breach Investigations Report)

Speaker - Philippe Langlois

Join Philippe Langlois, one of the Verizon Data Breach Investigations Report Authors, as he goes through the major findings of the report and how organizations can leverage the report to help drive their cybersecurity efforts.

Secure your seat here!

Registration is free, but space is limited! Please register here so we know how many people to prepare for

If you register, but are unable to attend, PLEASE refund your ticket. Having an accurate count helps us save money to do this more often.

View Event →
Jul
11
5:30 PM17:30

Countering International Terrorism Using Offensive Cyber Operations

Guest Speaker - Brian Nussbaum

Brian Nussbaum - of the University at Albany and its Open Source Intelligence Laboratory - will present on how publicly available (not leaked!) documents can provide insight into how offensive cyber operations have been used countering international terrorism.

Registration is free, but space is limited! Please register here so we know how many people to prepare for

If you register, but are unable to attend, PLEASE refund your ticket. Having an accurate count helps us save money to do this more often.

View Event →
Apr
26
6:30 PM18:30

OSINT and Ukraine

Be sure to come out to the REBOOT of Cybeer Security Meetups, where we'll be talking about some awesome stuff including:

  • An update on ANYCon

  • InfoSec Fails of the Month

  • Hacker Trivia

  • Guest Speaker

Guest Speaker Brian Nussbaum - Open-Source Intelligence and Russian Invasion of Ukraine

Brian Nussbaum, an assistant professor at the College of Emergency Preparedness, Homeland Security and Cybersecurity (CEHC) at the University at Albany, will discuss open-source intelligence developments tied to the Russian invasion of Ukraine. From commercial satellite imagery to crowd-sourced information on military deployment locations, the invasion has highlighted how emerging technologies and social media can help understand and shape a modern conflict.

Registration is free, but space is limited! Please register here so we know how many people to prepare for

Register here: https://cybeermeetupapril.eventbrite.com

If you register, but are unable to attend, PLEASE refund your ticket. Having an accurate count helps us save money to do this more often.

View Event →
Meet the Makers - Amass
Feb
27
6:00 PM18:00

Meet the Makers - Amass

The OWASP Amass Project has developed a tool to help information security professionals perform network mapping of attack surfaces and perform external asset discovery using open source information gathering and active reconnaissance techniques.

Since it's debut, Amass has become a hugely popular tool that is now widely used across the infosec community. You won't want to miss this talk!

Come out and check out a live demonstration of the tool by it's core developers, Jeff Foley and Anthony Rhodes

Pre-register at Eventbrite (https://cybeer-february2020.eventbrite.com)

View Event →
Dec
5
6:00 PM18:00

Hacker Trivia!

This month we will have two events going on!

Kali Linux Crash Course

Kali Linux is a hacker swiss army knife of toolkits and software. Want to learn about hacking? Interested in getting involved in CTFs? Can't remember your myspace account password?

Bring your laptop and a USB drive and learn how to install and use Kali!

Whether you've never installed Kali, or have used it before and want some tips and tricks, there's something for you.

Already use Kali all the time? Are you a wise sage of veteran hacking? Test your might with...

Hacker Trivia

Flex your mighty hacker brain in our first-ever CyBeer Hacker Trivia night! Come have some drinks and put your knowledge to the ultimate test!

Register to attend for free at:
https://cybeer-december2019.eventbrite.com

View Event →