Welcome
Welcome
Hello and Welcome!
The Cybersecurity Practitioners Event (CPE) has been postponed to a future date later this year still being discussed.
Be sure to attend our meetings. Lots of good information there. Register for our March 27th meeting on our site ISC2CT.org
Join our (ISC)2 Connecticut Chapter Discord Server
Upcoming Training:
Certified Zero Trust Practitioner (CZTP) Training and Workshop on HITRUST By Network Intelligence (NI Training) The CZTP and HITRUST workshops provide participants with essential knowledge and practical skills in cybersecurity. The CZTP workshop covers Zero Trust Architecture 🔐, focusing on its core principles and technical components, while the HITRUST workshop emphasizes implementing information security and privacy controls based on the HITRUST CSF 🛡️, including alignment with standards like ISO 27001, NIST, HIPAA, and PCI DSS. Both workshops are ideal for IT professionals, compliance officers 📋, risk managers, and auditors 🕵️♂️ aiming to enhance security practices and prepare for certification.
Certified Zero Trust Practitioner (CZTP) | March 24-25th 2025 1:00 pm – 5:00 pm GMT | 8 hours of CPE Credits Fees: Regular participant $249 and $199 for ISC2 members Registration Link
HITRUST Workshop | March 27th 2025 1:00 pm – 5:00 pm GMT |4 hours of CPE Fees: $49 Registration Link
Upcoming events:
CISA has numerous Free to Attend Virtual/Online Training Events available in March Learn More Here and Register
SANS New2Cyber Summit - Virtual Live Online - Thursday, March 13, 2025| CPE Credits: 6 - Free to Attend Ready to Kickstart Your Cyber Journey? Whether you’re brand new to cybersecurity, looking to switch things up in your career, or just want to level up your skills, we’ve got you covered! Cybersecurity is one of the most exciting and well-paying fields out there, packed with career opportunities for people ready to take on the challenge. ** Agenda & Registration
2025 Spring Cyber Solutions Fest - Free Global Virtual Event: March 18th-20th Dynamic, all-encompassing cybersecurity event that brings together professionals from across the globe, offering expert led sessions, insights, and hands-on demos across 5 critical security tracks. Tailored for both practitioners looking to advance in their career and senior leaders shaping their organization's security posture. More Information & Free Registration
AI Cybersecurity Summit Virtual Live Online March 31st - Apr 1st | CPE Credits: 12 - Free to Attend The topic of Artificial Intelligence (AI) has been dominating most cybersecurity conferences lately, but with few opportunities for hands-on, actionable learning. The SANS AI Summit aims to change that. The Summit will feature interactive workshops and live demonstrations, offering practical approaches to incorporating AI and Machine Learning (ML) into your daily cybersecurity tasks, making them more efficient, accurate, and effective. You'll leave with real-world skills and techniques you can immediately apply in your work.**Agenda & Registration
Thank you to our Sponsors
Quinnipiac University is committed to helping advance the field of cybersecurity through its School of Computing & Engineering. To support the growth of professionals within cybersecurity and computing, Quinnipiac offers flexible online and on-campus opportunities that deliver practical skills you can immediately apply on the job. Both its MS in Cybersecurity and MS in Computer Science programs feature hands-on experience in lab settings that simulate real-world scenarios. To learn more about these exciting opportunities, Visit Quinnipiac University
Cyber News

4 Low-Cost Ways to Defend Your Organization Against Deepfakes
Every organization should be exploring a layered approach in which artificial and human intelligences come together to form a rich, dynamic, and multifaceted deepfake defense strategy tailored to its needs.

Trump 2.0 Brings Cuts to Cyber, Consumer Protections
One month into his second term, President Trump’s actions to shrink the government through mass layoffs, firings and withholding funds allocated by Congress have thrown federal cybersecurity and consumer protection programs into disarray

89% of Enterprise GenAI Usage Is Invisible to Organizations Exposing Critical Security Risks, New Report Reveals
90% of enterprise GenAI usage bypasses IT oversight, exposing organizations to data leaks and security risks.

A major cybersecurity law is expiring soon — and advocates are prepping to push Congress for renewal
The 2015 Cybersecurity Information Sharing Act provides vital legal protections for cyber threat sharing initiatives, they say.

Watch Two AIs Freakishly Talk In Their Own Language When Humans Aren't Around
Nothing to worry about here, just two AI agents switching from English to what sounds like gibberish that humans can't understand. What could go wrong?

Machine Unlearning: The Lobotomization of LLMs
In the end, the question isn't whether large language models will ever forget — it's how we'll develop the tools and systems to do so effectively and ethically.

The UK's Demands for Apple to Break Encryption Is an Emergency for Us All
The Washington Post reported that the United Kingdom is demanding that Apple create an encryption backdoor to give the government access to end-to-end encrypted data in iCloud. Encryption is one of the best ways we have to reclaim our privacy and security in a digital world filled with cyberattacks...

Analyst Burnout Is an Advanced Persistent Threat
For too long, we've treated our analysts as mere cogs in a machine, expecting them to conform to the limitations of our tools and processes. It's time to revolutionize security operations.

Researchers Find Elon Musk's New Grok AI Is Extremely Vulnerable to Hacking
Researchers at the AI security company Adversa AI have found that xAI's Grok 3 is a cybersecurity disaster waiting to happen.

Critical Microsoft Bing Vulnerability Let Attackers Execute Code Remotely
Microsoft has addressed a critical security flaw in its Bing search engine, tracked as CVE-2025-21355, which could have allowed unauthorized attackers to execute arbitrary code remotely.

Kunai: Open-source threat hunting tool for Linux
Kunai is an open-source tool that provides deep and precise event monitoring specifically for Linux environments.

Apple Patches Zero-Day Exploit Targeting Locked iPhones
Apple has patched a zero-day vulnerability affecting iPhones and iPads, allowing attackers to disable USB Restricted Mode on locked devices.

Microsoft Patch Tuesday, February 2025 Edition
February 11, 2025 Microsoft today issued security updates to fix at least 56 vulnerabilities in its Windows operating systems and supported software, including two zero-day flaws that are being actively exploited.

OpenAI Finds No Evidence of Breach After Hacker Offers to Sell 20 Million Credentials
Hacker recently offered to sell 20 million OpenAI credentials, but the data likely comes from infostealers, not the AI firm’s systems.