Member Post – Eddie Onsare – The Vulnerabilities of Two-Factor Authentication
Eddie Onsare, a student at East Carolina University, has written his term paper on ‘The Vulnerabilities of Two-Factor Authentication.’

Raleigh ISSA Chapter Meeting for December 14, 2017 | $11.54
Raleigh ISSA Chapter Meeting for December 14, 2017 Please support our sponsors, visit their table, and learn about their products and/or services Registration | Raleigh ISSA Chapter Meeting for December 14, 2017 | $11.54 Guests: If this is your first meeting use code 2017firstvisit upon checkout https://www.eventbrite.com/e/raleigh-issa-monthly-meeting-guest-tickets-30871733185 ISSA Members: Chapter Meeting Registration is…

Phishing Email or Fraud by Christy Long for the Beginner
A presentation on determining if an email is legit or if it is bad. Testimonials of Victims Phishing Defined Statistics Email Best Practices Useful Tools https://raleigh.issa.org/education/
The Human Exploitation Kill Chain by Ira Wrinkler
This presentation will use kill chain principles to detail how to determine the most effective holistic methods to mitigate attacks against users. Case studies will be presented.

The Internet of Things: Danger! Intrigue! Spies! Corporate Espionage! Blackmail! DDoS! by Kim Green
The Internet of Things (IoT) is the new-ish trend for convenient, networked, Internet accessible devices. These devices are limited in purpose, and limited in size and resources. As with most limited purpose/specialized devices, users are heavily reliant on the manufacturer for accessibility and security. If the device manufacturer is forward-thinking you will have an easy…
