National Information Security Group - Boston, Massachusetts Chapter
NAISG Boston
NAISG Global
NAISG Social
NAISG Global LinkedIn - Join more than 4,800 other NAISG members for networking, discussions and announcements. You can also join one of our chapter-specific subgroups.

NAISG Boston LinkedIn - Join the Boston-specific group for networking, discussions and announcements.

Facebook - Become a fan. Join other members to receive timely updates and help spread the word.

Meetup - Meeting announcements, discussions, reservations and more. Join other members to receive timely updates and help spread the word.

Twitter - Follow us on Twitter. Our handle is @naisg_org.

Presentation Archive
 
Date Topic(s) Other Information / Downloads

10/2014 "How Flashlight Apps Spy On You,"
Gary Miliefsky (SnoopWall)
-View the presentation slide show (PDF format, 1 MB)
-Watch the presentation (Windows Streaming Media)
 
  "The Art of Cyber Warfare,"
Steven Harper (Radware)
-View the presentation slide show (PDF format, 6 MB)
-Watch the presentation (Windows Streaming Media)

06/2014 "From Your Pocket, To Your Heart and Back: Cyber Security in the Financial and Healthcare Industries and How They Affect Homeland Security,"
Ian Amit (IOActive)
-View the presentation slide show (PDF format, 17 MB)

05/2014 "Hey, We've Solved These Problems Before,"
Jack Daniel (Tenable Network Security)
-View the presentation slide show (PDF format, 2.5 MB)

03/2014 "Imperiled in 100 Battles - Is This the ‘End?’"
Dr. Mark Arnold (PTC) and Eric Schulman
-View the presentation slide show (PDF format, 1.2 MB)
-Watch the presentation (Windows Streaming Media)

02/2014 "Bitcoin and Beyond,"
Dr. Darren Tapp (SnoopWall)
-View the presentation slide show (PDF format, 550 KB)
-Watch the presentation (Windows Streaming Media)

01/2014 "The Explosion of Cybercrime - Five Ways IT May Be an Accomplice,"
Mark Villinski (Kaspersky Lab)
 
-View the presentation slide show (PDF format, 5 MB)
-Watch the presentation (Windows Streaming Media)
  "The Hunt for Silk Road’s Masters – When Deep Web Turns to Murder,"
Paul Bowen (NAISG board member, emeritus)
-View the presentation slide show (PDF format, 16 MB)
-Watch the presentation (Windows Streaming Media)

11/2013 "Eliminating Data Security Threats for Unstructured & Semi-Structured Data,"
Dana Tannatt (Varonis)
-View the presentation slide show (PDF format, 3 MB)
-Watch the presentation (Windows Streaming Media)

10/2013 "The Anatomy of an Insider Attack: Exploiting Encrypted Networks,"
Sami Ahvenniemi (SSH Communications Security)
 
-Presentation not available
  "Sledgehammer: A Case Study in Sophisticated Digital Forgery,"
Mark Spencer (Arsenal Consulting)
-Presentation not available

09/2013 "Instructions for Resetting Unknown Windows Local Administrator Password,"
Lu Labrecque (Cyber-Ark)
 
-Watch the presentation (Windows Streaming Media)
  "Staying Out of Prison: A CyberLaw How-to Guide,"
Andrew Levchuk
-Watch the presentation (Windows Streaming Media)

06/2013 "Master the Mobile Security Landscape,"
Scott Behrens (Neohapsis)
-View the presentation slide show (PDF format, 784 KB)

05/2013 "BitCoin and Deep Web,"
Paul Bowen (NAISG board member, emeritus)
 
-View the presentation slide show
-Watch the presentation (Windows Streaming Media)
 
  "Security in the Connected Vehicle System,"
William Whyte (Security Innovation)
-View the presentation slide show (PDF format, 1.2 MB)
-Watch the presentation (Windows Streaming Media)

04/2013 "Bulletproof IT Security: Unclassified Secrets of the NSA,"
Gary Miliefsky (CyberDefense Magazine)
-View the presentation slide show (PDF format, 700 KB)
-Watch the presentation (Windows Streaming Media)

03/2013 "Incident Response and Malware Detection Using Traffic Analysis,"
Ed Ziots (Lifespan)
-View the presentation slide show (PDF format, 700 KB)
-Watch the presentation (Windows Streaming Media)

01/2013 "Smoking Guns in the Windows Registry,"
Mark Spencer (Arsenal Recon)
-Presentation not available online.  Email the presenter at mspencer@arsenalrecon.com for a copy.

12/2012 "CSI - How Log Analysis Succeeds When Other Controls Fail,"
Sari Greene (Sage Data Security)
-Presentation not available

05/2012 "The Information Attack – How IT Can Be Used to Assault Your Business' Stock Price and Reputation and Manipulate Your Mind, - Part II"
Paul Bowen (NAISG board member, emeritus)
-View the presentation slide show (PDF format, 1 MB)
 
-Watch the presentation (Windows Streaming Media)

04/2012 "All Aboard the PWNIE Express!"
Dave Porcello (Pwnie Express)
 
-Watch the presentation (Windows Streaming Media)
  "Precursor to Information Attack – How IT Can Be Used to Assault Your Business’ Stock Price and Reputation and Manipulate Your Mind - Part I"
Paul Bowen (NAISG board member, emeritus)
-Watch the presentation (Windows Streaming Media)

03/2012 "Perspectives of RSA Conference 2012,"
Fred Pinkett (Security Innovation)
 
-View the presentation slide show (HTML format)
  "Cloud Computing Demystified,"
Jack Daniel (Tenable Network Security)
-View the presentation slide show (PDF format, 1 MB)

01/2012 "Increasing Profits with Security Analytics,"
Robert Fitzgerald (The Lorenzi Group)
 
-View the presentation slide show (HTML format)
  "Review of Antimalware Software Features and Integration with Corporate Networks",
Brad Dinerman (NAISG and Fieldbrook Solutions LLC)
-Presentation not available, discussion format only

11/2011 "Why Do You Need Application Control?"
Steve Butera (Watchguard)
 
-Presentation not available
  "Assessment of Changes to Social Networks and Implications for Corporate and Personal Security,"
Brad Dinerman (NAISG and Fieldbrook Solutions LLC)
-Presentation not available, discussion format only

10/2011 SMV/MVP Community Roadshow: "Secure Remote Access in a Connected SMB World - The Next Generation of Server Solutions,"
Amy Babinchak (Harbor Computer Services) and Dana Epp (Scorpion Software)
-Presentation not available

09/2011 "When QSAs Are The Problem,"
Ken Smith, Qualified Security Assessor
-View the presentation slide show (PDF format, 1.5 MB)
-Watch the presentation (Windows Streaming Media)

06/2011 "How They Stole Your P@55w0rd,"
Lucien Labrecque (Cyber-Ark)
-View the presentation slide show (HTML format)
-Watch the presentation (Windows Streaming Media)
 
  "FBI Efforts Against Cyber Crime,"
Special Agent Timothy Russell
-Presentation not available

04/2011 "Space Weather and Its Effect on Global Positioning Systems (GPS) and Other Critical IT Systems,"
Dr. Anthea Coster (MIT Haystack Observatory)
-View the presentation slide show (PDF format, 14 MB)
-Watch the presentation (Windows Streaming Media)
 
  "The OWASP Exams Project,"
Fred Pinkett (Security Innovation)
-View the presentation slide show (HTML format)
-Watch the presentation (Windows Streaming Media)

03/2011 "Cybercrime and Cyberwar Predictions for 2011,"
Gary Miliefsky (NetClarity)
-View the presentation slide show (HTML format)
-Watch the presentation (Windows Streaming Media)
 
  "Anti-Malware Product Expectations,"
Brad Dinerman (NAISG and Fieldbrook Solutions LLC)
- Presentation not available, discussion format only

01/2011 "Malware Capture through the Master File Table,"
Tim Mugherini (Momenta Pharmaceuticals)
-View the presentation slide show (HTML format)
-Watch the presentation (Windows Streaming Media)

12/2010 "Information Security Speed Debates: Solving Every Problem Facing Security In An Hour" -Watch the presentation (Windows Streaming Media)

10/2010 "Vulnerability Management Best Practices,"
Pia Flores and Ethan Goldstein (Rapid7)
-View the presentation slide show (PDF format, 2.2 MB)
-Watch the presentation (Windows Streaming Media)

09/2010 "Discussion of the 'No Safe Harbor' issue for Massachusetts data breach notification law 93H,"
Jack Daniel (Astaro Corporation)
 
-View the presentation slide show (HTML format)
-Watch the presentation (Windows Streaming Media)
 
  "How Safe Is Your Lock?"
Schuyler Towne (Open Locksport)
-View the presentation slide show (HTML format)
-Watch the presentation (Windows Streaming Media)
 

06/2010 "Good Backups = Good Security,"
Adam Frost (Computer Care and Learning)
-Watch the presentation (Windows Streaming Media)

05/2010 "Charting the Course for Secure Software,"
Ed Adams (Security Innovation)
 
-View the presentation slide show (HTML format)
-Watch the presentation (Windows Streaming Media)
 
  Webinar - "Team Bradley v. State Regulations: What You Need to Tell Your Clients,"
Bradley Dinerman (Fieldbrook Solutions LLC and NAISG) and Susan Bradley (The SBS Diva)
-View the Webinar slides (HTML format)
-Listen to the Webinar (recorded via
      LiveMeeting)

04/2010 "The Changing Landscape of Enterprise Information Security Architecture - How Does Virtualization and Cloud Computing Play a Role in It?,"
James Baker (OpenSky Professional Services)
 
-View the presentation slide show (HTML format)
-Watch the presentation (Windows Streaming Media)
  "A New Perspective on the World Security Landscape,"
Dror Shalita (Kaizen USA)
-View the presentation slide show (PDF format, 3.2 MB)
-Watch the presentation (Windows Streaming Media)

03/2010 "Unsafe at Any Speed: Seven Dirty Secrets of the Security Industry,"
-and-
"Rugged Software Development,"

Joshua Corman (The 451 Group)
-View the first presentation slide show (PDF format, 2.5 MB)
-Watch the presentation (Windows Streaming Media)
 
-View the second presentation slide show (PDF format, 5.5 MB)

02/2010 "Incident Management,"
Andy Ellis (Akamai Technologies)
-View the presentation slide show (HTML format)
-Watch the presentation (Windows Streaming Media)

01/2010 "Security Domination via Hard Drive Isolation,"
Gal Shpantzer
-Presentation not available

11/2009 "InfoGraphX,"
Serge Batchilo
-View the presentation slide show (HTML format)
-Watch the presentation (Windows Streaming Media)
 
  "Defending Against Cybercrime in 2010,"
Gary Miliefsky (NetClarity)
-View the presentation slide show (HTML format)
-Watch the presentation (Windows Streaming Media)
 
  "How to Conduct A Security Code Review,"
Jason Taylor (Security Innovation)
-View the presentation slide show (HTML format)
-Watch the presentation (Windows Streaming Media)

10/2009 "Secunia Personal Software Inspector,"
Bijan Bowen
 
-View the presentation slide show (HTML format)
-Watch the presentation (Windows Streaming Media)
  "The Pursuit of Security Happiness,"
Mike Rothman (eiQ Networks)
-Watch the presentation (Windows Streaming Media)

09/2009 "CISSP Primer,"
Paul Bowen
 
"Disclosure Samsara - The Endless Responsible Vulnerability Disclosure Debate,"
Zach Lanier (Midnight Research Labs Boston)
-(ISC)2 Resource Guide
 
 
-View the presentation slide show (HTML format)
-Watch the presentation (Windows Streaming Media)

06/2009 "The Evolution of Penetration Testing and the Threat Environment,"
Fred Pinkett (Core Security)
-View the presentation slide show (HTML format)
-Watch the presentation (Windows Streaming Media)

05/2009 "Security and Social Networking, a.k.a Slapped in the Facebook,"
Bill Brenner (CSO Magazine)
-View the presentation slide show (HTML format)
-Watch the presentation (Windows Streaming Media)

04/2009 "Encryption Refresher,"
Nick Howgrave-Graham (Ntru)
 
-View the presentation slide show (HTML format)
-Watch the presentation (Windows Streaming Media)
  "Full Disk Encryption,"
Henry Frith (PGP Corporation)
 
-View the presentation slide show (HTML format)
-Watch the presentation (Windows Streaming Media)
  "Document Encryption,"
Arny Epstein (Liquid Machines)
 
-View the presentation slide show (HTML format)
-Watch the presentation (Windows Streaming Media)
  "Email Encryption,"
Shawn Bernard (Networks Unlimited)
-Presentation slide show not available
-Watch the presentation (Windows Streaming Media)

03/2009 "The Path of Destruction: What Digital Forensics and Data Security Can Do,"
Rob Fitzgerald (The Lorenzi Group)
-View the presentation slide show (HTML format)

01/2009 "Massachusetts Data Breach Regulations: Private Data, Public Issues,"
Brad MacDougall (Associated Industries of Massachusetts)
-View the presentation slide show (HTML format)

12/2008 "Acquisition and Analysis of Physical Memory,"
Michael Webber (BitSec Forensics)
-View the presentation slide show (PDF format, 2 MB)
-Watch the presentation (Windows Streaming Media)

11/2008 "Security Certifications,"
Charlie Brooks and Cynthia Phillips (Brandeis University Information Assurance Program);
Paul Bowen and Jeff Smyth
 
-View the presentation slide shows (HTML format):
   list item Certifications and Education in Information Security
   (Paul Bowen)
   list item Security+ and DoD Directive 8570
   (Jeff Smyth)
   list item Information Assurance Programs for
   Continuing Education
(Charlie Brooks and Cynthia Phillips)

-Watch the presentations (Windows Streaming Media)
 
  "Standards for the Protection of Personal Information of Residents of the Commonwealth of Massachusetts,"
Jack Daniel (Astaro)
- View the presentation slide show (HTML format)
- Watch the presentation (Windows Streaming Media)

10/2008 "Nessus,"
George (Tenable Network Security)
 
-Presentation not available
  "An Overview of Domestic Terrorism,"
United States FBI, Boston Office
-Presentation not available

09/2008 "The Use of Technology and Security in Jewelry Theft Investigation,"
Dennis Thomas (Zale Corporation)
-Presentation not available
-Watch the presentation introduction
  (Windows Streaming Media)

06/2008 "Encryption Strategies: Protecting Sensitive Data at Rest & in Motion,"
Ray Zamagni (PGP Corporation)
-View the presentation slide show (HTML format)
-Watch the presentation (Windows Streaming Media)

05/2008 "Internet Security Solutions,"
Jody Gibney (Symantec)
-Presentation not available

04/2008 "It's All About The Data,"
Steve Tassinari (Varonis)
-View the presentation

03/2008 "How Hackers Think and Work,"
Paul Bowen (FAS)
 
-Presentation not available
  "The Application Security Maturity Model,"
Ed Adams (Security Innovation)
-View the presentation (PDF format, 1 MB)
-View the supplement (PDF format, 160 KB)

02/2008 "Don't Tell Me What, Tell Me Whom: Correlating User Identity to Threat Information,"
(Q1 Labs)  
-Presentation not available

01/2008 "Deploying Trusted Computing Systems,"
Chris Cahalin (Papa Gino's / D'Angelo)
-View the presentation

11/2007 "Security Outsourcing: An IT Department Brain-Drain or The only Sane Way to Travel the Cyber-Frontier?"
Bill Brenner (TechTarget SearchSecurity)
 
-View the presentation
  "Writing For IT Pros - An Overview of the TechTarget Security Media Group"
Bill Brenner (TechTarget SearchSecurity)
-View the presentation

10/2007 "Free and Open Source Software Enterprise Security Solutions,"
Joseph Guarino, Evolutionary IT
-View the presentation (PDF format, 1 MB)

09/2007 "Seven Lies of Information Security,"
Jack Daniel (Mass Buying Power and NAISG New England Chair)
 
-View the presentation
  "Security and Exchange Server 2007,"
Lee Benjamin (ExchangeGuy)
-View the presentation (PDF format, 2 MB)

06/2007 "An Evening with the Pragmatic CSO,"
Mike Rothman (The Daily Incite)
-Presentation not available

05/2007 Birds of a Feather Discussions:
>Identity Theft and Protection
>The Job Market for Security Professionals
>Data Recovery and How to Smash a Disk to Smithereens
-No electronic presentations were given

04/2007 "The Top Web Application Hack Attacks,"
Danny Allan (WatchFire)
-View the presentation (PDF format, 6 MB)

03/2007 "Third Party Patching,"
Bill Brenner (TechTarget SearchSecurity)
-View the presentation

02/2007 "Security TechTips - Issues of the Day."  Special presentation provided to the Cascade Lakes Computer Club, by
Brad Dinerman (Fieldbrook Solutions)
 
-View the presentation
  "Panel Discussion: Identity Theft and Protection - Corporate Responsibility and Consumer Options,"
Panelists:
>Ed Adams (Security Innovation)
>Steven Bearak (IdentityForce)
>Charles Kolodgy (IDC)
>William Straus (MA State Representative)
Moderator: Bradley Dinerman (NAISG)
-Download the MP3 recording of the panel discussion (44 MB)

01/2007 "The Seven Best Practices for Security in 2007,"
Gary Miliefsky (NetClarity)
 
-View the presentation
  "Windows Vista Security Overview,"
Tom Sullivan (Microsoft)
-View the presentation

11/2006 "Child Pornography and the Workplace: A Guide For System Administrators,"
Melissa Royer (Defender Data Recovery and Forensics Services)
 
-View the presentation
  "Employee Surveillance and Monitoring,"
Brad Dinerman (Fieldbrook Solutions)
-View the presentation

10/2006 "The World of Cyber Terrorism,"
Charles Kaplan (Mazu Networks)
 
-View the presentation
  "Identity Theft, Credit Card Transactions and PCI Compliance/Certification,"
Derek Kolakowski (Rapid7)
-View the presentation

09/2006 "Laptop Encryption and the Trusted Computing Platform,"
Steven Sprague (Wave Systems)
-View the presentation

06/2006 "Computer Intrusion and Internet Fraud," and "An Introduction to InfraGard,"
Special Agents Alison King and Douglas Domin (United States FBI, Boston Division)
 
-Presentation not available
  "Proactively Hardening Your Windows Network,"
Gary Miliefsky (NetClarity)
-View the presentation

05/2006 "PYVNC2SWF,"
Jack Daniel (Mass Buying Power)
 
-View the presentation
  "The State of Security in 2006,"
Andy Briney (Information Security Magazine)
-View the presentation

04/2006 "Patch Management and Real-World Security Measures,"
Jack Daniel (Mass Buying Power)
 
-View the presentation
  "Legal Implications of E-Mail,"
Craig Carpenter (Mirapoint)
-View the presentation

03/2006 "Helix,"
Melissa Royer (Defender Data Recovery and Forensic Services)
 
-No presentation to view.  Demo only.
  "Disk-Based Backups for Increased Information Security,"
Dave Therrien (ExaGrid Systems)
-View the presentation

02/2006 "Metasploit: What's In Your Security Tool Box?,"
Brad Loomis (Blue Lane Technologies)
 
-View the presentation
  "Steganography,"
Glenn Watt (Backbone Security)
-View the presentation (6.5 MB PDF)
-Download the presentation (2.0 MB ZIP)

01/2006 "Developing Security Patches - Whose Responsibility Is It And What Are The Implications?,"
Ed Adams (Security Innovation)
-View the presentation
-LiveMeeting recording of presentation (7.8 MB WMV)

12/2005 "Information Security in the Next Decade,"
Dr. Tanya Zlateva (RISCS, Boston University)
 
-View the presentation
  "Securing the Desktop,"
Todd Brennan (Bit9 Parity)
-View the presentation

11/2005 "Introduction to SQL Server 2005,"
Burt King (Acushnet Company)
 
-Presentation not available
  "Securing Active Directory Administration,"
Nick Cavalancia (ScriptLogic)
-View the presentation

10/2005 "Securing Voice Over IP (VoIP),"
Gary Miliefsky (NetClarity)
 
-View the presentation
-White Paper: Securing Your VoIP (128 KB PDF)

09/2005 "FBI Cyber Investigations and Computer Forensics,"
Jim Burrell (United States FBI)
 
-Presentation not available
  "The Death of Perimeter Defense - Secrets of Application Security,"
Ed Adams (Security Innovation)
-View the presentation
White Papers:
-Windows vs. Linux Web Server Role Security Research Study
-The Insider, Naivety and Hostility (934 KB PDF)
-Other White Papers

06/2005 "Federated Identity,"
Peter Kellis (RSA Security)
 
-Presentation not available
  "Securing Web Services,"
David Low (RSA Security)
 
-View the presentation
  "Mitigation: A Follow-up to 'Ways to Guarantee that Your Network Gets Compromised,'"
Paul Bowen (NEISG Board of Directors)
-View the presentation

05/2005 "Demonstration of Lavasoft AdAware Enterprise Edition,"
Brad Dinerman (Fieldbrook Solutions)
 
-View the presentation
  "PBX Hacking,"
Thomas Donovan (XO Communications)
Christopher Doggett (FireTower)
 
-View the presentation
  "Ways to Guarantee that Your Network Gets Compromised: An Interactive Discussion,"
Joshua Lutz (Goodwin & Procter)
-Discussion notes not available

04/2005 "Web Application Security,"
Jim Weiler, (OWASP - Boston Chapter)
 
-View the presentation
  "Network Access Protection,"
Gene Ferioli (Microsoft)
-Presentation not available

03/2005 "Information Warfare: Understanding the Threat,"
Dan Bezilla (Secure Elements)
 
-View the presentation
  "Administrative Passwords Management,"
Ron Zoran (Cyber-Ark)
 
-View the presentation
  Discussion on the threats to the privacy of your personal information,
by Tom Austin (Internet Business Group)
-View the ACLU video on the right to privacy(Flash movie format)

-View the MATRIX (Multi-State Anti-Terrorism Information Exchange) presentation


02/2005 "Crossing the Line: A Panel Discussion on Issues and Ethics in the Security Field." -Presentation not available
  The panelists were:

>James Burrell, United States FBI, Counterintelligence/Counterterrorism/Criminal Computer Intrusion, Cyber Crime, and Computer Analysis Response Team (CART) Programs
>Mark Minasi, author of Mastering Windows Server 2003, regular columnist for Windows and .NET Magazine and speaker in security road shows
>Sanford Sherizen, criminologist, president of Data Security Systems and member of ISSA Hall of Fame
>Stephen Heymann, Assistant U.S. Attorney and Chief of the U.S. Attorney's Appellate and Computer Crime Section


01/2005 "Top Ten Ways to Combat Spyware,"
Andrew Ostrom (InterMute)
 
-View the presentation
  "Blended Threats,"
Dmitri Alperovitch (CipherTrust)
-View the presentation

12/2004 "Virtual Servers, for Fun, Consolidation, Disaster Recovery and Security Testing"
Paul Bowen (NEISG Board of Directors)
 
-View the presentation
  "Building a Honeypot with VirtualPC"
Joe Kinsella (SilverBack Technologies)
-View the presentation

11/2004 "Intrusion Detection and Prevention"
Harold Belbin (SonicWall)
 
-View the presentation
  "Proactive Network Security Management: Lock The Doors Rather Than Listen For Burglars"
Gary Miliefsky (PredatorWatch) and Bob Martin (MITRE)
-View the PredatorWatch presentation
-View the MITRE presentation

10/2004 "Security Adviser"
Wayne Pierce (NEISG Board of Directors)
 
-View the presentation
  "Network Auditing: An Overview of NESSUS"
Ian Evans (Lockheed Martin)
-View the presentation
-Nessus for Windows Users (28 KB PDF)

09/2004 "Third Generation Firewalls"
John Amaral (Network Engines)
 
-View the presentation
  "Cognometrics: A New Class of Personal Authentication"
James Melonas (Real User)
-View the presentation
-Components and Functionality (136 KB PDF)
-Technology and Products (620 KB PDF)
 
  "The Insider Threat"
Justin Bingham (Intrusic)
-Presentation Not Available

06/2004 "HIPAA and Security"
Drew Williams (ConfigureSoft) and (SummitWatch)
 
-View the presentation
  "Secure Solutions for Healthcare"
Margie Cashwell (RSA Security)
-View the presentation

05/2004 "Social Psychology and Information Security"
Michel E. Kabay (University of Norwich)
 
-View the presentation given to NEISG
-View the full, narrated lecture on social psychology
  "Top 10 Best Practices for Identity and Access Management"
Andrey Agamov (Computer Associates)
 
-Presentation not available
  Humorous images shown during the meeting introduction
[Original source of images unknown]
-Hackers Can Turn Your Home Computer into a Bomb
-BlueTooth Device Tries to Configure An Airbus

04/2004 "Intrusion Detection and Prevention Systems in the Small-Medium Enterprise Market"
Rick Hedeman (WatchGuard Technologies)
-View the presentation

03/2004 "Physical Security Risk Assessment"
Dan O'Neill (Applied Risk Management)
 
-Presentation not available
  "Top 10 Legal Pitfalls: From Piracy to Privacy"
Renee Inomata (Burns and Levinson, LLP)
 
-View the presentation
  Miscellaneous URLs from Brad Dinerman's discussion of anti-spyware tools and Google usage - "Spy vs. Spy: AdAware vs SpyBot S&D"
(Original article online at FlexBeta.net, or download PDFs part 1, part 2 and part 3.)
- "Googling Up Passwords"
(Original article online at SecurityFocus.com, or download PDF)

02/2004 "Security for the Small Business IT Administrator"
Brad Dinerman (Fieldbrook Solutions)
 
-View the presentation
  "Top 10: Remote Access Methods - Some That Are Useful and Some That Will Plague You"
Joshua Lutz (Goodwin-Procter)
-View the presentation

01/2004 "Moderated, Open Forum on Windows Patch Management"
Tom Sullivan (Microsoft Corporation)
 
-View the presentation
  "Top 10: Free Tools to Eliminate Spyware and Malware"
Paul Bowen (ESC CIO Office, Hanscom Air Force Base)
-View the presentation

12/2003 "Trojan Wars, or Whose Computer is it Anyway?"
Kevin Sullivan (Splitstream Technologies)
 
-View the presentation
  "Top 10: Ways to Avoid Identity Theft"
Wayne Pierce (Mishré Advisory Group)
-View the presentation

11/2003 "Network Penetration Testing: Understanding the Attacker's Perspective"
Maximiliano Cáceres (Core Security Technologies)
 
-View the presentation -Addendum to presentation (includes URLs for tools and sites discussed)
  "Top 10: Ways to Prevent a Virus"
Wayne Pierce (Mishré Advisory Group)
-View the presentation

10/2003 "Distro-Kit"
Kevin Sullivan (C3 Group)
 
-View the presentation
  "Stress Test Your Security Network"
Sanjay Raja (Spirent Communications)
 
-View the presentation
  "Network Forensics"
Simson Garfinkel
-Presentation not available

09/2003 "Anatomy of a Database Attack"
Steve Migliore (Application Security, Inc.)
-Presentation not available

08/2003 "How Hackers Launch Web Attacks"
Matthew Fisher (SPI Dynamics)
-View the presentation (PDF format, 2.1 MB)

05/2003 "Wireless Technology Overview and the SonicWall SOHO TZW"
Harold Belbin (SonicWall)
-View the presentation -"Wireless Site Survey and Placement Guide for SOHO TZW"
  "Electronic Fraud"
The United States Secret Service (New England Electronic Crimes Task Force)
-Presentation not available

04/2003 "Security Simplified"
Wayne Pierce (Mishré Group)
-View the presentation

03/2003 "Virus Issues on Linux/UNIX Systems"
Chris Wraight (Sophos, Inc.)
 
-View the presentation
  "Network Decoys"
Bill Stearns (SANS)
-View the presentation

02/2003 "Configuring Windows 2003 Server for Smart-Card Authentication"
Alex Voysest (Microsoft / Waltham)
 
-Presentation not available
  "Remote Access Solutions: IPSec vs SSL"
Glenn Fitzgerald (Netilla Networks)
-View the presentation

01/2003 "Security Certifications"
(Boston University Corporate Education Center)
 
-View the presentation
  "Biometric Authentication"
David Ting (Imprivata, Inc.)
-View the presentation

12/2002 "Wireless Security"
Gregory Thomas (AirDefense)
-View the presentation (PDF format, 8.3 MB)

11/2002 "'Time' for Security"
Scott Mustard (Symmetricom)
 
-View the presentation
  "Authentication and Authorization in IIS"
Patrick Hynds (Critical Sites)
-View the presentation

10/2002 "E-Mail Lockdown"
John Korsak (Ipswitch Software)
-View the presentation -Download agenda, spam sample and Whois info

09/2002 "Johnny Q. Hacker"
Mike Tippets (SonicWall)
 
-View the presentation

08/2002 "Firewall Technologies"
Anthony Alves (SonicWall)
-View the presentation