CoderDojo Mentors
A group for those running or interested in running CoderDojo's. More information on CoderDojo can be found at www.CoderDojo.com
View ArticleStop Cyber Bullies
Cyber Bullying represents an all too real threat to children. In this group we discuss how this issue can be managed and dealt with.
View ArticleDublin Chapter - Cyber Security Roundtable
An ICTTF Security Roundtable Chapter is a chance for you to become involved in a community of professionals. Get involved with your local chapter and you will make valuable connections with peers,...
View ArticleCyber Security in Social Media
Unscrupulous Enterprises Are Using Social Media Especially Facebook To Spread Malware Via Links Being Spread By Fake Profiles and Paid Sponsored Ads
View ArticlePbxwall
Setting the standard in Phone Fraud protection. Innovative anti-fraud technology that blocks PBX Hacking and stops Toll Fraud.
View ArticleSystem Infiltration
A group to discuss conventional and nonconventional methods used by cyber criminals to infiltrate, disrupt or disable components of a technology based infrastructure. Ways to defend against such...
View ArticleHuman Side of the Insider Threat
This group will discuss causal factors and mitigations for minimizing the growth of insider threats within government agencies and commercial companies.
View ArticleETHiCAL HACKING
Some would argue that Ethical hacking and Penetration Testing is the same thing, Ummm Yes and No. This group will help with how to best understand the difference and to discuss the tools and techniques...
View ArticleInformation Security Awareness
INformation Security Awareness is sometimes a common category that is often times miss-understood. While there is an tremendous amount of awareness materials for individuals as well as organizations...
View ArticleDigital Forensics
Share digital forensics best practices, opinions, ideas and help on technical issues
View ArticleComputer Security Incident Response Team
A Computer Security Incident Response Team (CSIRT) is a service organization that is responsible for receiving, reviewing, and responding to computer security incident reports and activity. Their...
View ArticleMultidisciplinary Cyber Security Studies
Information Security, Penetration Testing, Incident Management, Perception Management, International Relations, Sociology, Psychology, Criminology, Identity Construction
View Article