BEGIN:VCALENDAR
PRODID;X-RICAL-TZSOURCE=TZINFO:-//Calagator//EN
CALSCALE:GREGORIAN
X-WR-CALNAME:Calagator
METHOD:PUBLISH
VERSION:2.0
BEGIN:VTIMEZONE
TZID;X-RICAL-TZSOURCE=TZINFO:America/Los_Angeles
BEGIN:DAYLIGHT
DTSTART:20190310T020000
RDATE:20190310T020000
TZOFFSETFROM:-0800
TZOFFSETTO:-0700
TZNAME:PDT
END:DAYLIGHT
END:VTIMEZONE
BEGIN:VEVENT
CREATED;VALUE=DATE-TIME:20190315T220717Z
DTEND;TZID=America/Los_Angeles;VALUE=DATE-TIME:20190403T200000
DTSTART;TZID=America/Los_Angeles;VALUE=DATE-TIME:20190403T183000
DTSTAMP;VALUE=DATE-TIME:20190315T220717Z
LAST-MODIFIED;VALUE=DATE-TIME:20190315T220717Z
UID:http://calagator.org/events/1250475256
DESCRIPTION:Some Teams are Red\, Others are Blue\, I Play Defense\, and S
 o Can You! An endpoint security primer in three (?-ish) parts.Part 1: Ma
 cOSPart 2: WindowsPart 3: Linux Come learn about the other side of the c
 ybersecurity equation: how to raise the bar for attackers trying to pwn 
 your endpoints. This talk series will focus on sane\, sensible\, and usa
 ble defaults\; what each operating system can bring to the table\; secur
 ity through proper configuration\; and small/medium scale distribution a
 nd management. Part 1: We'll start with a broad overview of securing end
 points\, the classes of attacks that might be encountered depending on y
 our use cases\, and what it means to be &quot\;secure.&quot\; Then\, we'
 ll talk about configuring macOS for reasonable security\, beginning with
  the hardware chain of trust\, moving through the bootloader and touchin
 g on what Apple's hw/sw integration allows for: Activation Locks\, MDM/D
 EP\, and Software Recovery. Moving up the stack\, we'll discuss the tier
 s of built-in macOS software security\, and if time permits\, several th
 ird party options to strengthen endpoint options. Part 2: Let's kick off
  with quick refresher on previous topics\, and then dive right in to Win
 dows endpoint security. Because of the diversity of hardware\, there wil
 l be less low-level focus this session\, but BitLocker\, TPM\, and OPAL 
 will be in the mix. Then\, learn why Secure Boot is not a conspiracy\, h
 ow Hyper-V is bae\, why Windows 10 is actually the best thing since... e
 arlier Windows 10 releases!\, what Group Policy can do for you\, and whi
 ch version of Windows is the minimum necessary for any kind of sanity. P
 art 3: In the stolen words of Steve Ballmer\, compartmentalize compartme
 ntalize compartmentalize! We'll talk about mitigating inevitable comprom
 ise\, and then move to Linux security. Coreboot\, Heads\, and refreshers
  from PC hardware kick us off\, then it's into the wilderness! We'll try
  and nail down some best practices for the wide and varied world of Linu
 x distros\, the security benefits of containers\, why Flatpak is awesome
 \, and a quick touch on grsecurity (aka &quot\;why we can't have nice th
 ings&quot\;). If there's time\, we'll even try to talk about the securit
 y benefits of other *nix's like OpenBSD &amp\; Qubes. Part 4: This is un
 written\, unplanned and unscheduled\, but part 4 (and 5\, and beyond!) c
 ould include topics like:- hypervisors! and why trying to share memory h
 as yet to be a good idea\;- how to do your best to secure them anyway\;-
  how and why you should deploy hardened and/or minimum viable configurat
 ions automatically (ansible\, JAMF\, AD/SCCM...) This is intended as a h
 igh-level overview to get a baseline for each of the three operating sys
 tems\; content will change and grow based on feedback and requests. Come
  help me evolve my endpoint security game\, and steer the course for fut
 ure events! This series is brought to you by PASCAL Hackerspace\, and pr
 esented by Magneto (the hacker\, not the mutant...ok well\, he *could* b
 e a mutant for all we know...)Magneto is: prototyping the future. trying
  to kill sleep. Security analysis and automation for profit. Other secur
 ity-related things for fun. Obtuse prose. Dream job: Starship Captain. T
 here's a reason for the nickname.\n\nTags: meetup:event=fbkbrqyzgbfb\, m
 eetup:group=pascalhackerspace\, open source\, python\, electronics\, mic
 rocontrollers\, technology\, network security\, mobile technology\, comp
 uter programming\, open source hardware\, hackspaces\n\nImported from: h
 ttp://calagator.org/events/1250475256
URL:https://www.meetup.com/pascalhackerspace/events/258949675/
SUMMARY:PASCAL Hackerspace - Defensive Security: what can blue do for you
 ?
LOCATION:226 SE Madison St: 226 Southeast Madison Street\, Portland OR 97
 214 us
SEQUENCE:1
END:VEVENT
END:VCALENDAR
