<html><head><meta http-equiv="content-type" content="text/html; charset=utf-8"></head><body dir="auto"><div><span></span></div><div><meta http-equiv="content-type" content="text/html; charset=utf-8"><div><span></span></div><div><meta http-equiv="content-type" content="text/html; charset=utf-8"><div class="s2" style="margin-top: 0px; margin-bottom: 0px;"><div class="s2" style="margin-top: 0px; margin-bottom: 0px; border: 1px solid transparent;">Last Reminder for tomorrow’s chapter meeting....</div><div class="s2" style="margin-top: 0px; margin-bottom: 0px; border: 1px solid transparent;"><br></div></div><p class="s8" style="text-align: start; margin-top: 0px; margin-bottom: 12px;"><span style="-webkit-text-size-adjust: auto; background-color: rgba(255, 255, 255, 0);"><span class="s5" style="font-weight: bold; text-decoration: underline;"></span><span class="s6" style="font-weight: bold; text-decoration: underline;"><span class="bumpedFont15">OWASP Cambridge Chapter Meeting -</span></span><span class="s6" style="font-weight: bold; text-decoration: underline;"><span class="bumpedFont15">Tue</span></span><span class="s6" style="font-weight: bold; text-decoration: underline;"><span class="bumpedFont15">sday </span></span><span class="s6" style="font-weight: bold; text-decoration: underline;"><span class="bumpedFont15">5</span></span><span class="s7" style="font-weight: bold; vertical-align: super; text-decoration: underline;"><span class="bumpedFont15">th</span></span><span class="s6" style="font-weight: bold; text-decoration: underline;"><span class="bumpedFont15"> Dec</span></span><span class="s6" style="font-weight: bold; text-decoration: underline;"><span class="bumpedFont15">ember</span></span><span class="s6" style="font-weight: bold; text-decoration: underline;"><span class="bumpedFont15"> </span></span><span class="s6" style="font-weight: bold; text-decoration: underline;"><span class="bumpedFont15">201</span></span><span class="s6" style="font-weight: bold; text-decoration: underline;"><span class="bumpedFont15">7</span></span> </span></p><p class="s11" style="text-align: start; margin-top: 0px; margin-bottom: 12px;"><span style="-webkit-text-size-adjust: auto; background-color: rgba(255, 255, 255, 0);"><span class="s9">Tues</span><span class="s9">day </span><span class="s9">5</span><span class="s10" style="vertical-align: super;">th</span><span class="s9"> December 2017 17</span><span class="s9">:15 </span><span class="s9">–</span><span class="s9"> 20:30</span><span class="s9">, Lord Ashcroft Building (LAB003/LAB006</span><span class="s9">), Anglia Ruskin University, Cambridge.</span></span></p><p class="s11" style="text-align: start; margin-top: 0px; margin-bottom: 12px;"><span class="s9" style="-webkit-text-size-adjust: auto; background-color: rgba(255, 255, 255, 0);">Hosted by the Cyber Security & Networking Research Group, Anglia Ruskin University, and OWASP (Open Web Application Security Project) Cambridge Chapter</span></p><p class="s11" style="text-align: start; margin-top: 0px; margin-bottom: 12px;"><span style="-webkit-text-size-adjust: auto; background-color: rgba(255, 255, 255, 0);"><span class="s9">This evening is </span><span class="s9">part of a</span><span class="s9"> </span><span class="s9">series of </span><span class="s9">evening events </span><span class="s9">on raising awareness for </span><span class="s9">local  businesses</span><span class="s9"> & organisations on the iss</span><span class="s9">ues of cyber security and cyber</span><span class="s9">crime, what regulations and legislation do organisations need to be aware to protect themselves and what is considered best practice in these challenging times</span><span class="s9">.</span></span></p><p class="s11" style="text-align: start; margin-top: 0px; margin-bottom: 12px;"><span class="s12" style="font-weight: bold; text-decoration: underline; -webkit-text-size-adjust: auto; background-color: rgba(255, 255, 255, 0);">Background</span></p><p class="s11" style="text-align: start; margin-top: 0px; margin-bottom: 12px;"><span class="s9" style="-webkit-text-size-adjust: auto; background-color: rgba(255, 255, 255, 0);">OWASP (Open Web Application Security Project is a 501(c)(3) not-for-profit worldwide charitable organization focused on improving the security of application software. Their mission is to make application security visible, so that people and organizations can make informed decisions about true application security risks.</span></p><p class="s11" style="text-align: start; margin-top: 0px; margin-bottom: 12px;"><span style="-webkit-text-size-adjust: auto; background-color: rgba(255, 255, 255, 0);"><span class="s9">The </span><span class="s13" style="font-weight: bold;">Cyber Security and Networking </span><span class="s9">(</span><span class="s13" style="font-weight: bold;">CSN</span><span class="s9">) Research Group at Anglia Ruskin University has close working strategic relationships with industry, professional bodies, law enforcement, government agencies and academia in the delivery of operationally focused applied information and application security research.  We have strong international links with professional </span><span class="s9">organisations</span><span class="s9"> such as OWASP, BCS, ISC2, IISP & the UK Cyber Security Forum amongst others.  The primary aims of CSNRG are to help the UK and partner nations to tackle cybercrime, be more resilient to </span><span class="s9">cyber attacks</span><span class="s9"> and educate its users for a more secure cyberspace and operational business environment.  These will be achieved through the investigation of threats posed to information systems and understanding the impact of attacks and creation of cyber-based warning systems which gathering threat intelligence, automate threat detection, alert users and </span><span class="s9">neutralising</span><span class="s9"> attacks.  For network security we are researching securing the next generation of software defined infrastructures from the application API and control/data plane attacks. Other key work includes Computer forensic analysis, digital evidence crime scenes and evidence </span><span class="s9">visualisation</span><span class="s9"> as well as Cyber educational approaches such as developing Capture the Flag (CTF) resources and application security programs.</span></span></p><p class="s11" style="text-align: start; margin-top: 0px; margin-bottom: 12px;"><span style="-webkit-text-size-adjust: auto; background-color: rgba(255, 255, 255, 0);"> </span></p><p class="s11" style="text-align: start; margin-top: 0px; margin-bottom: 12px;"><span style="-webkit-text-size-adjust: auto; background-color: rgba(255, 255, 255, 0);"><span class="s13" style="font-weight: bold;">Speaker Biographies</span><span class="s13" style="font-weight: bold;"> & Abstracts</span></span></p><p class="s14" style="margin-top: 5px; margin-bottom: 5px;"><span style="-webkit-text-size-adjust: auto; background-color: rgba(255, 255, 255, 0);"><span class="s13" style="font-weight: bold;">Deepinder</span><span class="s13" style="font-weight: bold;"> Singh </span><span class="s13" style="font-weight: bold;">– </span><span class="s13" style="font-weight: bold;">Principal Consultant at Verizon Consulting and Advisory Services</span></span></p><p class="s11" style="text-align: start; margin-top: 0px; margin-bottom: 12px;"><span style="-webkit-text-size-adjust: auto; background-color: rgba(255, 255, 255, 0);"><span class="s9">Deepinder</span><span class="s9"> (Deep) works as a Principal Consultant at Verizon Consulting and Advisory Services. He challenges, educates and engages with his audiences on many keys issues of cybersecurity and digital transformation. He encourages innovative thinking to generate actionable strategies that help business thrive in a VUCA world. He believes that poor quality decision-making skills significantly contribute towards insecure systems resulting in security breaches and compromises. He has worked with many of the worlds’ largest organisations across numerous industries. In his twenty-year business career, he has held senior leadership positions in large and medium-sized organisations.</span></span></p><p class="s11" style="text-align: start; margin-top: 0px; margin-bottom: 12px;"><span class="s9" style="-webkit-text-size-adjust: auto; background-color: rgba(255, 255, 255, 0);">He has addressed several conferences and events on the wide-ranging topics of Cybersecurity, GRC, GDPR, Big Data Analytics and Artificial Intelligence.</span></p><p class="s11" style="text-align: start; margin-top: 0px; margin-bottom: 12px;"><span class="s9" style="-webkit-text-size-adjust: auto; background-color: rgba(255, 255, 255, 0);">Deep has attended Harvard Business School and holds a Post Graduate Diploma in Business Management along with various industry qualifications including ISO/IEC 27001 Lead Auditor, CISSP, CISM, CRISC and CGEIT. He is currently pursuing Professional Doctorate at the University of East London.  </span></p><p class="s11" style="text-align: start; margin-top: 0px; margin-bottom: 12px;"><span class="s9" style="-webkit-text-size-adjust: auto; background-color: rgba(255, 255, 255, 0);">Deep actively engages in voluntary work. He is the Vice-President of ISACA London Chapter and Secretary of Verizon Reading Toastmasters Club. In the past, he has served as Secretary for BCS-IRMA Specialist Group and a judge for SC Magazine (Europe) Awards.</span></p><p class="s11" style="text-align: start; margin-top: 0px; margin-bottom: 12px;"><span style="-webkit-text-size-adjust: auto; background-color: rgba(255, 255, 255, 0);"><span class="s13" style="font-weight: bold;">Abstract: </span><span class="s13" style="font-weight: bold;">“Verizon Data Breaches Investigation Report 2017</span><span class="s13" style="font-weight: bold;">"</span></span></p><p class="s11" style="text-align: start; margin-top: 0px; margin-bottom: 12px;"><span style="-webkit-text-size-adjust: auto; background-color: rgba(255, 255, 255, 0);"><span class="s9">Whether you’re a veteran reader who’s been with reading it since its initial publication back in 2008 or a newbie to Verizon’s annual report, you wil</span><span class="s9">l find it very useful. DBIR 2017</span><span class="s9">, provides insight as to how the threat landscape is changing, </span><span class="s9">In</span><span class="s9"> this session you will discover:</span></span></p><div class="s17" style="margin-top: 0px; margin-bottom: 12px; margin-left: 54px; text-align: justify;"><div class="s15" style="text-align: start; text-indent: 0px; margin-top: 0px; margin-bottom: 0px; position: absolute;"><span style="-webkit-text-size-adjust: auto; background-color: rgba(255, 255, 255, 0);">1.</span></div><span class="s16" style="-webkit-text-size-adjust: auto; background-color: rgba(255, 255, 255, 0);"><div style="text-align: start;">the changing threat landscape,</div></span></div><div class="s17" style="margin-top: 0px; margin-bottom: 12px; margin-left: 54px; text-align: justify;"><div class="s15" style="text-align: start; text-indent: 0px; margin-top: 0px; margin-bottom: 0px; position: absolute;"><span style="-webkit-text-size-adjust: auto; background-color: rgba(255, 255, 255, 0);">2.</span></div><span style="-webkit-text-size-adjust: auto; background-color: rgba(255, 255, 255, 0);"><span class="s16"><div style="text-align: start;"><span class="s16">who are the threat </span><span class="s16">actors,</span></div></span><span class="s16"></span></span></div><div class="s17" style="margin-top: 0px; margin-bottom: 12px; margin-left: 54px; text-align: justify;"><div class="s15" style="text-align: start; text-indent: 0px; margin-top: 0px; margin-bottom: 0px; position: absolute;"><span style="-webkit-text-size-adjust: auto; background-color: rgba(255, 255, 255, 0);">3.</span></div><span class="s16" style="-webkit-text-size-adjust: auto; background-color: rgba(255, 255, 255, 0);"><div style="text-align: start;">what actions they take,</div></span></div><div class="s17" style="margin-top: 0px; margin-bottom: 12px; margin-left: 54px; text-align: justify;"><div class="s15" style="text-align: start; text-indent: 0px; margin-top: 0px; margin-bottom: 0px; position: absolute;"><span style="-webkit-text-size-adjust: auto; background-color: rgba(255, 255, 255, 0);">4.</span></div><span class="s16" style="-webkit-text-size-adjust: auto; background-color: rgba(255, 255, 255, 0);"><div style="text-align: start;">what motivates them</div></span></div><div class="s17" style="margin-top: 0px; margin-bottom: 12px; margin-left: 54px; text-align: justify;"><div class="s15" style="text-align: start; text-indent: 0px; margin-top: 0px; margin-bottom: 0px; position: absolute;"><span style="-webkit-text-size-adjust: auto; background-color: rgba(255, 255, 255, 0);">5.</span></div><span class="s16" style="-webkit-text-size-adjust: auto; background-color: rgba(255, 255, 255, 0);"><div style="text-align: start;">what threat actions actors take</div></span></div><div class="s17" style="margin-top: 0px; margin-bottom: 12px; margin-left: 54px; text-align: justify;"><div class="s15" style="text-align: start; text-indent: 0px; margin-top: 0px; margin-bottom: 0px; position: absolute;"><span style="-webkit-text-size-adjust: auto; background-color: rgba(255, 255, 255, 0);">6.</span></div><span class="s16" style="-webkit-text-size-adjust: auto; background-color: rgba(255, 255, 255, 0);"><div style="text-align: start;">what assets they target</div></span></div><p class="s11" style="text-align: start; margin-top: 0px; margin-bottom: 12px;"><span class="s9" style="-webkit-text-size-adjust: auto; background-color: rgba(255, 255, 255, 0);">and more ....</span></p><p class="s11" style="text-align: start; margin-top: 0px; margin-bottom: 12px;"><span style="-webkit-text-size-adjust: auto; background-color: rgba(255, 255, 255, 0);"><span class="s9">The ultimate goal is to provide you with an overview of DBIR so that you can leverage the actionable information within it to prepare, </span><span class="s9">recognise</span><span class="s9"> and defend against cyber threats.</span></span></p><p class="s11" style="text-align: start; margin-top: 0px; margin-bottom: 12px;"><span style="-webkit-text-size-adjust: auto; background-color: rgba(255, 255, 255, 0);"><span class="s13" style="font-weight: bold;">Guest Speaker: </span><span class="s13" style="font-weight: bold;">Leum</span><span class="s13" style="font-weight: bold;"> Dunn CISSP C|EH CISMP MBCS,</span></span></p><p class="s11" style="text-align: start; margin-top: 0px; margin-bottom: 12px;"><span style="-webkit-text-size-adjust: auto; background-color: rgba(255, 255, 255, 0);"><span class="s13" style="font-weight: bold;">Biography: </span><span class="s13" style="font-weight: bold;">Leum</span><span class="s13" style="font-weight: bold;"> Dunn</span></span></p><p class="s11" style="text-align: start; margin-top: 0px; margin-bottom: 12px;"><span style="-webkit-text-size-adjust: auto; background-color: rgba(255, 255, 255, 0);"><span class="s9">Leum</span><span class="s9"> </span><span class="s9">specialises</span><span class="s9"> in endpoint security and works in the East of England.</span></span></p><p class="s11" style="text-align: start; margin-top: 0px; margin-bottom: 12px;"><span style="-webkit-text-size-adjust: auto; background-color: rgba(255, 255, 255, 0);"><span class="s13" style="font-weight: bold;">Abstract: “</span><span class="s18" style="font-weight: bold; font-style: italic;">The top 100 things I’d do if ever I</span><span class="s19" style="text-decoration: line-through; font-weight: bold; font-style: italic;"> became an evil overlord</span><span class="s18" style="font-weight: bold; font-style: italic;"> found myself in charge of cyber security.</span><span class="s13" style="font-weight: bold;">”</span></span></p><p class="s2" style="margin-top: 0px; margin-bottom: 0px;"><span style="-webkit-text-size-adjust: auto; background-color: rgba(255, 255, 255, 0);"><span class="s13" style="font-weight: bold;">Provisional </span><span class="s13" style="font-weight: bold;">Agenda</span></span></p><p class="s2" style="margin-top: 0px; margin-bottom: 0px;"><span style="-webkit-text-size-adjust: auto; background-color: rgba(255, 255, 255, 0);"> </span></p><p class="s11" style="text-align: start; margin-top: 0px; margin-bottom: 12px;"><span style="-webkit-text-size-adjust: auto; background-color: rgba(255, 255, 255, 0);"><span class="s9">17:30  –</span><span class="s9"> 18:15</span><span class="s9"> Re</span><span class="s9">gistration & Refreshments (LAB00</span><span class="s9">6)</span></span></p><p class="s11" style="text-align: start; margin-top: 0px; margin-bottom: 12px;"><span style="-webkit-text-size-adjust: auto; background-color: rgba(255, 255, 255, 0);"><span class="s9">18:15 – 18:20</span><span class="s9"> </span><span class="s9">Welcome from the OWASP Cambridge Chapter Leader, Adrian Winckles, </span><span class="s9">Director of Cyber Security & Networking Research Group</span><span class="s9">, Anglia Ruskin University</span></span></p><p class="s14" style="margin-top: 5px; margin-bottom: 5px;"><span style="-webkit-text-size-adjust: auto; background-color: rgba(255, 255, 255, 0);"><span class="s20">18:20 – 19:05</span><span class="s20"> </span><span class="s20">“Verizon Data Breaches Investigation Report 2017" - </span><span class="s20">Deepinder</span><span class="s20"> Singh – Principal Consultant at Verizon Consulting and Advisory Services</span></span></p><p class="s11" style="text-align: start; margin-top: 0px; margin-bottom: 12px;"><span style="-webkit-text-size-adjust: auto; background-color: rgba(255, 255, 255, 0);"><span class="s9">19:05 – </span><span class="s9">19:50</span><span class="s9"> </span><span class="s9">:</span><span class="s9"> “</span><span class="s9">The top 100 things I’d do if ever I became an evil overlord found myself in charge of cyber security.</span><span class="s9">”</span><span class="s9">- </span><span class="s9">Leum</span><span class="s9">Dunn CISSP C|EH CISMP MBCS,</span><span class="s13" style="font-weight: bold;"></span><span class="s9"></span></span></p><p class="s11" style="text-align: start; margin-top: 0px; margin-bottom: 12px;"><span class="s9" style="-webkit-text-size-adjust: auto; background-color: rgba(255, 255, 255, 0);">19:50 – 20:00 Q & A & Close</span></p><p class="s11" style="text-align: start; margin-top: 0px; margin-bottom: 12px;"><span class="s13" style="font-weight: bold; -webkit-text-size-adjust: auto; background-color: rgba(255, 255, 255, 0);">Registration</span></p><p class="s11" style="text-align: start; margin-top: 0px; margin-bottom: 12px;"><span class="s9" style="-webkit-text-size-adjust: auto; background-color: rgba(255, 255, 255, 0);">To register for this free event, please register online at</span></p><p style="margin-top: 0px; margin-bottom: 0px;"><span class="s21" style="-webkit-text-size-adjust: auto; background-color: rgba(255, 255, 255, 0);"><font color="#000000"><a href="https://www.eventbrite.com/e/owasp-cambridge-chapter-christmas-evening-meeting-tuesday-5th-december-tickets-40732612340">https://www.eventbrite.com/e/owasp-cambridge-chapter-christmas-evening-meeting-tuesday-5th-december-tickets-40732612340</a></font></span></p><p style="margin-top: 0px; margin-bottom: 0px;"><span class="s21" style="-webkit-text-size-adjust: auto; background-color: rgba(255, 255, 255, 0);"><br></span></p><p class="s11" style="text-align: start; margin-top: 0px; margin-bottom: 12px;"><span style="-webkit-text-size-adjust: auto; background-color: rgba(255, 255, 255, 0);"><span class="s9">The </span><span class="s9">event </span><span class="s9">will be held in the Lor</span><span class="s9">d Ashcroft Building, Room LAB003</span><a name="_GoBack"></a><span class="s9"> (Breakout Room LAB006 for networking & refreshments).</span></span></p><p class="s11" style="text-align: start; margin-top: 0px; margin-bottom: 12px;"><span style="-webkit-text-size-adjust: auto; background-color: rgba(255, 255, 255, 0);"> </span></p><p class="s11" style="text-align: start; margin-top: 0px; margin-bottom: 12px;"><span style="-webkit-text-size-adjust: auto; background-color: rgba(255, 255, 255, 0);"><span class="s9">Please enter through the </span><span class="s9">Helmore</span><span class="s9"> Building and ask at reception.</span></span></p><p class="s11" style="text-align: start; margin-top: 0px; margin-bottom: 12px;"><span class="s9" style="-webkit-text-size-adjust: auto; background-color: rgba(255, 255, 255, 0);">Anglia Ruskin University</span></p><p class="s11" style="text-align: start; margin-top: 0px; margin-bottom: 12px;"><span style="-webkit-text-size-adjust: auto; background-color: rgba(255, 255, 255, 0);"><span class="s9">Cambridge Campus</span><span class="s22">
</span></span></p><p class="s11" style="text-align: start; margin-top: 0px; margin-bottom: 12px;"><span style="-webkit-text-size-adjust: auto; background-color: rgba(255, 255, 255, 0);"><span class="s9">East Road</span><span class="s22">
</span></span></p><p class="s11" style="text-align: start; margin-top: 0px; margin-bottom: 12px;"><span class="s9" style="-webkit-text-size-adjust: auto; background-color: rgba(255, 255, 255, 0);">Cambridge</span></p><p class="s11" style="text-align: start; margin-top: 0px; margin-bottom: 12px;"><span class="s9" style="-webkit-text-size-adjust: auto; background-color: rgba(255, 255, 255, 0);">CB1 1PT</span></p><p class="s11" style="text-align: start; margin-top: 0px; margin-bottom: 12px;"><span style="-webkit-text-size-adjust: auto; background-color: rgba(255, 255, 255, 0);"> </span></p><p class="s11" style="text-align: start; margin-top: 0px; margin-bottom: 12px;"><span style="-webkit-text-size-adjust: auto; background-color: rgba(255, 255, 255, 0);"><span class="s9">Please note that there is no parking on campus.</span><span class="s22">
</span><span class="s9">Get further information on travelling to the university.</span></span></p><p class="s11" style="text-align: start; margin-top: 0px; margin-bottom: 12px;"><span style="-webkit-text-size-adjust: auto; background-color: rgba(255, 255, 255, 0);"><span class="s9"><a href="http://www.anglia.ac.uk/ruskin/en/home/your_university/anglia_ruskin_campuses/ca">http://www.anglia.ac.uk/ruskin/en/home/your_university/anglia_ruskin_campuses/ca</a> </span><span class="s9">mb</span><span class="s9">ridge_campus</span><span class="s9">/find_cambridg</span></span><span class="s9" style="font-family: 'Times New Roman'; font-size: 18px; line-height: 21px; -webkit-text-size-adjust: none;">e.html</span></p><br></div></div></body></html>