Welcome
Welcome
Hello and Welcome!
Be sure to attend our monthly meetings. Lots of good information there. Register for our Thursday June 26th Virtual Meeting on our site ISC2CT.org
Also come Join our (ISC)2 Connecticut Chapter Discord Server
Upcoming Training:
AmpcusCyber - Certified Payment Security Compliance Manager (CPSCM) Workshop Mon, Jun 16 | Virtual Event 4 Day Workshop 16 CPE Credits - Certified Payment Security Compliance Manager (CPSCM) Workshop Globally relevant, instructor-led program offering practical, in-depth training across the entire PCI DSS suite, including PCI DSS, PCI PIN, PCI 3DS, PCI SAQ, UPI, Mobile Wallets, and more. With payment security becoming a top priority across industries, this workshop is designed to help professionals build the critical expertise needed to navigate the evolving compliance landscape.. Fees: Regular Partcipants $130 Local ISC2 Chapter Memebers $100 Please verify time in the registration link ISC2CT is not responsible for time discrepancy More Information & Registration Link
NII Training Operational Technology (OT) Security June 26 2025 1 Day 4 hour Event. Operational Technology (OT) security protects industrial systems like power grids, factories, and transportation networks from cyber threats. These systems control physical processes and must run safely and reliably. Unlike IT security, which focuses on data, OT security prevents disruptions that could cause safety risks or financial losses. As cyberattacks on OT systems increase, organizations must strengthen security with network protection, access controls, and real-time monitoring. With IT and OT becoming more connected, securing these systems is more important than ever. Fees: $79 Please verify time in the registration link ISC2CT is not responsible for time discrepancy More Information & Registration Link
Upcoming events:
Hartford Cybersecurity Summit Jun 17, 2025, 7:30 AM – 6:00 PM Hartford Marriott Downtown, 200 Columbus Blvd, Hartford, CT Are you staying up to date on the latest strategies to protect your business from cyberattacks? If not, it's not too late to get started! You’ll get to take place in impactful networking with powerful peers from Yale New Haven Health, Cigna, and ESPN. You’ll also get to hear from leading experts from Fortinet, Semperis, and more! ISC2 CT has secured our members free admission! To claim your ticket, register with code CSS25-ISC2CT Registration link use code CSS25-ISC2CT
SANS Supply Chain Cybersecurity Forum | Free Online: Thursday, 26 Jun 2025 9:00AM 3 Hours Beyond the Perimeter: Securing What You Don’t Control - As software and hardware supply chains grow more complex and globally interconnected, they have also become prime targets for attackers. From deeply embedded vulnerabilities in third-party components to subtle software compromises and counterfeit hardware, today’s supply chain threats are stealthy, sophisticated, and increasingly difficult to detect. Agenda and Registration Link
Thank you to our Sponsors
Quinnipiac University is committed to helping advance the field of cybersecurity through its School of Computing & Engineering. To support the growth of professionals within cybersecurity and computing, Quinnipiac offers flexible online and on-campus opportunities that deliver practical skills you can immediately apply on the job. Both its MS in Cybersecurity and MS in Computer Science programs feature hands-on experience in lab settings that simulate real-world scenarios. To learn more about these exciting opportunities, Visit Quinnipiac University
Cyber News

CISA Issues SOAR, SIEM Implementation Guidance
The Cybersecurity and Infrastructure Security Agency (CISA) and Australian Cyber Security Centre (ACSC) released new guidance this week on procuring, implementing, and maintaining security information and event management (SIEM) and security orchestration, automation, and response (SOAR) platforms.

NIST proposes new metric to gauge exploited vulnerabilities
NIST proposes the Likely Exploited Vulnerabilities metric to estimate past exploitation and improve patch prioritization.

Microsoft Accounts Go Passwordless by Default
Microsoft is making a new push towards eliminating password-based authentication for its users, by prioritizing passwordless sign-in and sign-up methods.

CPU-level ransomware is possible, and terrifying
A security researcher says he's made ransomware that can be installed and run on a processor's microcode, which would be almost impossible to get rid of.

Supply-chain attack lies dormant for six years before striking hundreds of e-commerce sites
At least three vendors of e-commerce software tools were compromised in a coordinated supply chain attack dating back at least six years. According to security firm Sansec,...

The Crowded Battle: Key Insights from the 2025 State of Pentesting Report
Discover findings from Pentera's 2025 State of Pentesting Report, including breach rates, alert fatigue, budget trends & the rise of software testing.

Researchers Expose New Intel CPU Flaws Enabling Memory Leaks and Spectre v2 Attacks
Intel CPUs found vulnerable to multiple Spectre-style flaws, including BPI, leaking memory at 17 Kb/s.

Anthropic's new AI model turns to blackmail when engineers try to take it offline
Anthropic says its Claude Opus 4 model frequently tries to blackmail software engineers when they try to take it offline.

Linux malware can avoid syscall-based endpoint protection
A proof-of-concept program has been released to demonstrate a so-called monitoring "blind spot" in how some Linux antivirus and other endpoint protection tools use the kernel's io_uring interface.