December 2010 Meeting

posted in: Meetings | 0

SHODAN: Resistance is Futile SHODAN (http://www.shodanhq.com) is dubbed at  “The Computer Search Engine”. SHODAN has garnered attention from the U.S. Industrial Control System Computer Emergency Response Team (ICS-CERT) because anyone can discover “sensitive” ICS systems. In this talk I will … Continued

November 2010 Meeting

posted in: Meetings | 0

Security Challenges Faced by Small to Medium Sized Companies Small to Midsize Businesses have invested time and money to bring their business to life. They buy insurance to protect their business, put locks on the doors and install fire alarms … Continued

October 2010 Meeting

posted in: Meetings | 0

Exploring Font Based Steganography With A Focus On Tool Development The world of steganography has become stale as the same exfiltration techniques become easier and easier to detect.  Once any major steganalysis tool can find the hidden payload, its game … Continued

September 2010 Meeting

posted in: Meetings | 0

The Privileged Challenge Up until the last few years, IT security managers have spent billions of dollars in securing the parameters of their organizations to keep out those who would bring harm to their internal networks. However in recent years, … Continued

August 2010 Meeting

posted in: Meetings | 0

War of the Worlds – Business vs. Security in the Social Web When it comes to the Social Web (Social Media, Social Networking, etc…), Business and Security can be on two totally different worlds. Business wants to open the social … Continued

April 2010 Meeting

posted in: Meetings | 0

Why Your Intrusion Prevention System is Susceptible to TCP Evasion This talk will discuss why any Intrusion Prevention System (IPS) is susceptible to evasion by any traffic carried over the TCP protocol, the majority of traffic into and out of … Continued

March 2010 Meeting

posted in: Meetings | 0

This presentation will discuss Advanced Persistent Threats trends we have observed from 2002-2010, and how we proactively identify them.  Samples of captured malicious code will be presented, and several case studies will be referenced. Stephen Windsor, Booz Allen Hamilton Stephen … Continued

February 2010 Meeting

posted in: Meetings | 0

Overcoming the Limitations in Network Security Monitoring Ron Gula, CEO of Tenable Network Security, will discuss the current state of the information security industry and focus on how we tend to take our security tools at face value. Mr. Gula … Continued

January 2010 Meeting

posted in: Meetings | 0

Federal government key strategic information security initiatives update The federal government continues its risk management transformation by deploying key security standards and guidelines supporting a unified information security framework.  This presentation will provide an update on key strategic information security … Continued

ISSA Central Maryland Chapter Sponsors