Groups

There is a place for everyone within RITSEC.

RITSEC students collaborating in the Cyber Range

Partnerships

Partnerships are semi-autonomous organizations that work in direct collaboration with RITSEC.

WiCys

Leads: Emmalee, Anushka, Arshia, Lily, Ariana
When:
Monday 5:30 PM

The WiCyS RIT Student Chapter is an all-inclusive interest group within RITSEC dedicated to making RIT’s Computing Security program more equitable.


Competition Teams

Competition Teams represents RIT as the university’s official team for external cybersecurity competitions.

Collegiate Cyber Defense Competition

Leads: James Southcott

Our CCDC team trains throughout the year for competitions that focus on securing and managing a fictitious corporate network.

Collegiate Penetration Testing Competition

Leads: Kilroy

The Collegiate Penetration Testing Competition (CPTC) is a national collegiate competition that focuses on the offensive aspects of cybersecurity.


Interest Groups

Interest Groups are specialized groups within RITSEC that go into the weeds of the cybersecurity field.

Incident Response

Leads: Chloe, Eva
When:
Tuesday 5:30 PM

The incident response interest group focuses on all topics related to cyber incidents, and effective blue teaming.

Offensive Security

Leads: Camden, James
When:
Wednesday 8:15 PM

We develop robust red team tools, infrastructure, and implants to play the role of an effective adversary in a red vs blue competition setting.

Operations

Leads: John, Lukas
When:
Monday 6:30 PM

The operations interest group focuses on various topics related to RITSEC's infrastructure. These topics could be related to hardware, virtualization, networking, automation, cloud computing, and server management.

OT Security

Leads: Lucas, Lukas, Alex
When:
Wednesday 7:00 PM

Operational Technology (OT) Security protects the computers and machines that control real-world things like power plants, water treatment facilities, traffic lights, and factory machines.

Physical Security

Leads: Joey, Abigail
When:
Thursday 6:00 PM

You will learn to pick locks, alternative entry methods and many other things that computing security experts don't tend to think of when they are securing a system.

Reversing

Leads: Tanush, Thomas
When:
Monday 6:00 PM

Focusing on binary applications, such as assembly, executable formats, and malware tactics.

RVAPT

Leads: Rahel, Masaki
When:
Thursday 5:00 PM

At RVAPT, we learn how to find and exploit vulnerabilities in networks and associated services by hands on custom labs.

Team Contagion

Leads: Manav, Aidan
When:
Thursday 6:00 PM

Contagion represents RITSEC in a variety of Capture the Flag (CTF) competitions. We compete at different ranges of difficulty and on both the national and international levels.

Vulnerability Research

Leads: Aleksi, Tanush, Kam, Adam
When:
Monday 8:00 PM
Thursday 7:00 PM

To introduce members of the club to the concepts of vulnerability and security research. This includes concepts such as bug bounties, code analysis, and fuzzing.

Wireless

Leads: Raina
When:
Wednesday 4:00 PM

The Wireless Interest Group (aka Wiggles) focuses on all thing wireless. We explore all sorts of RF technologies and their associated security challenges.

Zero-to-Hero

Leads: Will

Learn a little bit of everything. Build the foundation you need to go above and beyond in cybersecurity. Discover what your passion is in cybersecurity.


Weekly Overview

These are the events that generally occur each week

Monday

5:30 PM – 6:30 PM
WiCys
GOL-1710
6:00 PM – 8:00 PM
Reversing
CYB-2750
6:30 PM – 7:30 PM
Operations
CYB-2780
8:00 PM – 10:00 PM
Vulnerability Research
CYB-2750

Tuesday

5:30 PM – 6:30 PM
Incident Response
CYB-2780

Wednesday

4:00 PM – 5:00 PM
Wireless
CYB-2780
7:00 PM – 8:00 PM
OT Security
CYB-2780
8:15 PM – 9:15 PM
Offensive Security
CYB-2750

Thursday

5:00 PM – 6:00 PM
RVAPT
CYB-2750
6:00 PM – 7:00 PM
Physical Security
CYB-2750
6:00 PM – 7:00 PM
Team Contagion
CYB-2780
7:00 PM – 10:00 PM
Vulnerability Research
CYB-2750

Friday

TODAY
12:00 – 14:30
General Education
GOL-1710/20/30
14:30 – 16:00
General Research
GOL-1710/20/30

Mentorships

RITSEC provides both group and one-on-one mentorship opportunities.

Each semester, mentees are connected with mentors, and learn together and build a collaborative project or work on more personalized learning.

It is completely free of cost and provides an unmatched opportunity to learn.

Join the Discord

Group Education

Mar 3
5:30 PM - 6:30 PM
Threat HuntingINCIDENT RESPONSE
CYB-2780
Chloe, Eva
Feb 24
5:30 PM - 6:30 PM
Career Fair PrepINCIDENT RESPONSE
CYB-2780
Chloe, Eva
Feb 20
12:00 PM - 2:00 PM
Intro to Red TeamingGENERAL
GOL-1710/20/30
RITSEC E-Board
Feb 13
12:00 PM - 2:00 PM
CSEC LawGENERAL
GOL-1710/20/30
RITSEC E-Board
Feb 10
5:30 PM - 6:30 PM
Careers in IRINCIDENT RESPONSE
CYB-2780
Chloe, Eva
Feb 9
6:00 PM - 8:00 PM
Loading ELFs, MicroarchREVERSING
CYB-2780
Thomas, Tanush
Feb 6
12:00 PM - 12:00 PM
OT SecurityGENERAL
GOL-1710/20/30
RITSEC E-Board
Feb 3
5:30 PM - 6:30 PM
Why Incidents HappenINCIDENT RESPONSE
CYB-2780
Chloe, Eva
Feb 2
6:00 PM - 8:00 PM
Extracting ELF checkpoint, DissassemblyREVERSING
CYB-2780
Thomas, Tanush
Jan 30
12:00 PM - 2:00 PM
Web3 SecurityGENERAL
GOL-1710/20/30
Arianna Schwartz
Jan 28
6:00 PM - 7:00 PM
Red Team SecretOFFENSIVE SECURITY
CYB-2750
James
Jan 27
5:30 PM - 6:30 PM
Data PrivacyINCIDENT RESPONSE
CYB-2780
Chloe, Eva
Jan 26
6:00 PM - 8:00 PM
Into to ARM/ELFREVERSING
CYB-2780
Tanush, Thomas
Jan 26
5:30 PM - 6:00 PM
Intro to WiCysWICYS
GOL-1710
Emmalee, Anushka, Arshia, Lily, Ariana
Jan 23
12:00 PM - 2:00 PM
Penetration TestingGENERAL
GOL-1710/20/30
Leah Kvares
Jan 22
7:00 PM - 10:00 PM
Intro to Memory AllocatorsVULNERABILITY RESEARCH
CYB-2750
Aleksi, Tanush, Kam
Jan 22
6:00 PM - 7:00 PM
Blockchain & EVM CTFsTEAM CONTAGION
CYB-1710
Aidan, Manav
Jan 22
5:30 PM - 6:30 PM
Intro to Physical SecurityPHYSICAL SECURITY
CYB-2780
Joey, Abigail
Jan 22
5:00 PM - 6:00 PM
Intro to RVAPTRVAPT
CYB-2780
Rahel
Jan 21
7:00 PM - 8:00 PM
Into to OT and PlanningOT SECURITY
CYB-2790
Lucas, Alex, Lukas
Jan 21
4:00 PM - 5:00 PM
First Wiggles WednesdayWIRELESS
CYB-2780
Raina
Jan 20
5:30 PM - 6:30 PM
IR WrappedINCIDENT RESPONSE
CYB-2780
Chloe, Eva
Jan 18
7:00 PM - 7:00 PM
Decompiler PrepREVERSING
Virtual
Tanush, Thomas
Jan 16
12:00 PM - 2:00 PM
Intro to OperationsGENERAL
GOL-1710/20/30
Lukas Peters
Jan 15
7:00 PM - 10:00 PM
Semester PlanningVULNERABILITY RESEARCH
CYB-2750
Aleksi, Tanush, Kam
Lucide License ISC License Copyright (c) for portions of Lucide are held by Cole Bemis 2013-2026 as part of Feather (MIT). All other copyright (c) for Lucide are held by Lucide Contributors 2026. Permission to use, copy, modify, and/or distribute this software for any purpose with or without fee is hereby granted, provided that the above copyright notice and this permission notice appear in all copies. THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. The MIT License (MIT) (for portions derived from Feather) Copyright (c) 2013-2026 Cole Bemis Permission is hereby granted, free of charge, to any person obtaining a copy of this software and associated documentation files (the "Software"), to deal in the Software without restriction, including without limitation the rights to use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies of the Software, and to permit persons to whom the Software is furnished to do so, subject to the following conditions: The above copyright notice and this permission notice shall be included in all copies or substantial portions of the Software. THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.