Membership Meeting, February 26, 2020

posted in: Blog, Meetings | 0

Chapter Business Meeting Slides: 2020-02-26 Meeting Slides Speaker Slides: Business Email Compromise (BEC) Topic: Business Email Compromise: More Sophistication, More Problems Business Email Compromise (BEC) is a major threat vector for the private sector. These attacks usually begin with a spear-phishing attempt, … Continued

Membership Meeting: January 22, 2020

posted in: Blog, Meetings, Uncategorized | 0

Chapter Business Meeting Slides: 2020-01-22-Meeting-Presentation.pdf Speaker Slides: The Next Gen of Vulnerability Management Topic: The Next Gen of Vulnerability Management Traditionally, Vulnerability Management has become entrenched in the CVSS scoring system which itself, has undergone some revision to more appropriately address … Continued

Membership Meeting: December 18, 2019

posted in: Blog, Meetings | 0

Topic: Risk Mitigation Strategies for Cybersecurity Service Providers Everyone is talking about “vendor risk” and “vendor management” on the client side, but who’s looking out for the risks that your cybersecurity product or service company faces when helping those same … Continued

Membership Meeting: November 20, 2019

posted in: Blog, Meetings | 0

Topic: Threat Informed Defense with MITRE ATT&CK™ Chapter Business Meeting Slides: 2019-11-20-Meeting-Presentation.pdf The MITRE ATT&CK framework has become a widely used knowledge base and model for real cyber adversary behavior. In use across governments, private sector, and security solutions providers, ATT&CK … Continued

Membership Meeting: October 16, 2019

posted in: Blog, Meetings, Uncategorized | 0

Chapter Business Meeting Slides: 2019-10-16-Meeting-Presentation.pdf Speaker Presentation: ISSA Central MD is hosting an event at the National Electronic Museum to celebrate National Cybersecurity Month. Topic: Taking a holistic approach to an insider threat program This presentation will provide insider threat mitigation … Continued

Membership Meeting: October 8, 2019

posted in: Blog, Meetings, Uncategorized | 0

Chapter Business Meeting Slides: 2019-10-08-Meeting-Presentation.pdf Topic: A Security Walkthrough of IAM in Light of Data Breaches in the Cloud Identity has become the new perimeter in the world of api-driven infrastructures (cloud computing).  Understanding the challenges and complexity of least … Continued

Membership Meeting: September 25, 2019

posted in: Blog, Meetings, Uncategorized | 0

Chapter Business Meeting Slides: 2019-09-25-Meeting-Presentation.pdf Speaker Presentation: .govCAR: Threat Based Cyber Capability Review The Cybersecurity and Infrastructure Security Agency (CISA) developed the .govCAR methodology to take a threat-based approach to cybersecurity risk management. .govCAR represents an evolution in managing cybersecurity … Continued

Membership Meeting: August 28, 2019

posted in: Blog, Meetings, Uncategorized | 0

Chapter Business Meeting Slides: 2019-08-28-Meeting-Presentation.pdf Speaker Presentation: Failing-at-Cybersecurity.pdf Topic: Fail Secure: 20 Ways to Undermine Your Security Program There’s policy, and then there’s reality. All too often, security teams find their efforts overridden or bypassed. Here’s some unconventional wisdom and tips … Continued

Membership Meeting: July 24, 2019

posted in: Blog, Meetings | 0

Chapter Business Meeting Slides: 2019-07-24-Meeting-Presentation.pdf Speaker Presentation: Attackers-Prey-on-Uncertainty_ISSA-Central-MD.pdf Topic: Attackers Prey on Uncertainty: How to Fail at Threat Detection It takes a lot of visibility and context to detect and respond to sophisticated threats. Attackers usually target data, where enterprises have … Continued

Membership Meeting, June 26, 2019

posted in: Blog, Meetings | 0

Membership Meeting June 26, 2019 Chapter Business Meeting Slides: 2019-06-26-Meeting-Presentation Speaker Presentation: Crafting A DLP Program Topic: Data Loss Prevention Essentials A how-to primer on overcoming organizational challenges to implement a successful Data Loss Prevention program. Advances in technology have prompted … Continued