(ISC)2 Boulder Chapter logo

Videos

Catch up on previous meeting, cybersecurity discussions, and other recorded events.

AI: Risks, Benefits, and Best Practices 20 April, 2023

Live discussion of Artificial Intelligence and its impact on cybersecurity. Featured speakers include Ali Davachi, Scott Tisinger, and David Miller.

Shifting Left Without Blowing a Gasket 22 June, 2023

Live discussion on "Shift Left" and how to implement security earlier in the Software Development Lifecycle. Featured speakers include Ali Davachi, Scott Tisinger, David Miller, Joel Davidow, and Mike Reeves.

Your Digital Identity: How Cybercriminals Can Get Around Authentication Methods

Inadequate authentication measures leave your digital identity vulnerable to cybercriminals. Tools like multi-factor authentication, biometrics, passwords, PINs, and tokens are all more vulnerable to attacks and social engineering than you realize. And one wrong move leaves you and your organization powerless in the face of cyber threats.

API Security - 10 Best Practices for Strategically Applying AI

It is difficult to go anywhere in the security profession these days without the topics of artificial intelligence (AI) and API Security coming up.  Like many popular topics, there is quite a bit of buzz and hype which creates quite a bit of fog around the topics. In particular, it can be difficult to understand when AI can add value.  How can we know when AI is being leveraged in a useful way to creatively solve problems? AI works best when applied to specific problems and needs to be carefully, strategically, and methodically leveraged in order to tackle certain problems that suit it.  While there are many such problems, API security is one such problem that I’ve experienced AI producing good results for.

Securing Python and Open Source Ecosystems

Recent attacks targeting major open source repositories such as npm and PyPI have cast a spotlight on a critical issue: the software supply chain is increasingly vulnerable. Attackers are leveraging the trust and collaborative nature of open source ecosystems, deploying malicious versions of popular packages to exploit users and systems.

These incidents underscore the urgent need for enhanced security protocols and vigilant practices within the open source community, especially considering that 96% of today’s codebases contain some open source software.

Secure Your Frontline: Start Continuous DAST in Production

Understanding the complexities of production testing is essential for any robust security strategy. Although conducting dynamic application security testing (DAST) in live environments is challenging, it is vital for ensuring application safety. This webinar bridges the gap between the daunting nature of production testing and its benefits.

Newsletters

Our newsletters full of current topics and events.

Meeting Notes

Our chapter meeting slides.