BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//Central Maryland Chapter of ISSA - ECPv6.15.20//NONSGML v1.0//EN
CALSCALE:GREGORIAN
METHOD:PUBLISH
X-WR-CALNAME:Central Maryland Chapter of ISSA
X-ORIGINAL-URL:https://issa-centralmd.org
X-WR-CALDESC:Events for Central Maryland Chapter of ISSA
REFRESH-INTERVAL;VALUE=DURATION:PT1H
X-Robots-Tag:noindex
X-PUBLISHED-TTL:PT1H
BEGIN:VTIMEZONE
TZID:America/New_York
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20190310T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20191103T060000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20200308T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20201101T060000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20210314T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20211107T060000
END:STANDARD
END:VTIMEZONE
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20201118T170000
DTEND;TZID=America/New_York:20201118T193000
DTSTAMP:20260427T154538
CREATED:20191214T143303Z
LAST-MODIFIED:20201202T174304Z
UID:2984-1605718800-1605727800@issa-centralmd.org
SUMMARY:Membership Meeting 11/18/2020
DESCRIPTION:Chapter Business Meeting Slides: 2020-11-18 – Meeting Presentastion.pdf\n\n\n\nSpeaker Slides: Roles of Artificial Intelligence and Deep Learning in Detecting Data Exfiltration \nTopic: Roles of Artificial Intelligence and Deep Learning in Detecting Data Exfiltration \nEssential Internet services are vital for many aspects of modern living\, yet those services remain valuable to threat actors who use them for network intrusions and data exfiltration. Dr. Pena completed a quantitative research study analyzing the ability of a Convolutional Neural Network (CNN) to detect Domain Name System (DNS) covert communications generated by the DNSExfiltrator open source tool. The results showed the CNN model had100% accuracy when exfiltrated file sizes exceeded 2 Kilobytes (KB) using the default (maximum) transmission packet size\, but its performance fell dramatically for files below 1 KB in size. \nAs AI/ML solutions become more prevalent in cybersecurity tools\, professionals must understand where a model’s strengths and weaknesses lay in order to apply appropriate risk mitigations\, such as tuning complimentary detection systems. \nSpeaker: Dr. Tomas Pena\, L3 Harris Technologies \n\n\nDr. Tomas Pena is the Chief Technologist for Cyber Operations at L3Harris Technologies’ Space and Airborne Systems Segment. In that role\, he’s responsible for cyber innovation and improving the resiliency of company products spanning land\, sea\, air\, space\, and cyber domains. He’s been in cyber-related systems engineering and defense contracting positions since 2013. Prior to that time\, he completed 20 years of service in the United States Air Force as a Cyberspace Operations Officer where he organized\, planned\, executed full-spectrum cyberspace operations\, stood up the United States Cyber Command’s 24/7 Joint Operations Center\, and led Air Force Business Transformation Initiatives at the Pentagon. Dr. Pena has also filled roles such as managing the Global Positioning System satellite control systems\, managing theater communications during Operations IRAQI FREEDOM and ENDURING FREEDOM. He is also the Founder and President of Parallax Cyber LLC\, a small business focused on training and educating the workforce in Cybersecurity and Cyber Conflict\, and the current Editor-in-Chief of the Military Cyber Professional Associations’ Military Cyber Affairs Journal. \n\n\nClick Here to register for the November 18\, 2020 General Membership Meeting
URL:https://issa-centralmd.org/calendar/membership-meeting-11-18-2020/
LOCATION:Virtual via Zoom\, MD
CATEGORIES:Meetings
END:VEVENT
END:VCALENDAR