BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//Central Maryland Chapter of ISSA - ECPv6.15.20//NONSGML v1.0//EN
CALSCALE:GREGORIAN
METHOD:PUBLISH
X-ORIGINAL-URL:https://issa-centralmd.org
X-WR-CALDESC:Events for Central Maryland Chapter of ISSA
REFRESH-INTERVAL;VALUE=DURATION:PT1H
X-Robots-Tag:noindex
X-PUBLISHED-TTL:PT1H
BEGIN:VTIMEZONE
TZID:America/New_York
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20200308T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20201101T060000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20210314T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20211107T060000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20220313T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20221106T060000
END:STANDARD
END:VTIMEZONE
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20210113T080000
DTEND;TZID=America/New_York:20210113T093000
DTSTAMP:20260427T130241
CREATED:20201216T141121Z
LAST-MODIFIED:20210316T222818Z
UID:3580-1610524800-1610530200@issa-centralmd.org
SUMMARY:Morning Membership Meeting 01/13/2021
DESCRIPTION:Chapter Business Meeting Slides: 2021-01-13 Breakfast Meeting Presentation \n\n\n\nSpeaker Slides: 2021-01-13 Sepio HAC Solution for ISSA \nSepio Whitre Paper: 2021-01-13 Sepio CMMC White Paper \n\n\nTopic: Reducing The Risk of Unapproved and Rogue Devices \nMeeting Recording: Reducing The Risk of Unapproved and Rogue Devices \nSepio delivers a Hardware Access Control (HAC) platform that reduces the risk of unapproved and rogue devices by providing complete visibility\, control\, and mitigation of all hardware assets. Sepio’s hardware fingerprinting\, augmented by machine learning\, discovers all managed\, unmanaged\, and hidden devices that are invisible to all other security tools. Sepio’s solution supports CMMC hardware controls\, NNDA section 889 and also enhances zero trust\, insider threat\, BYOD\, IT\, OT\, and IoT security programs. \nSpeaker: Jay Smilyk\, Chief Revenue Officer\, Sepio \n\n\nJay Smilyk is the Chief Revenue Officer for Sepio.  He oversees the firm’s strategic operations including its growth\, recruitment and channel development efforts.   Previously\, Smilyk served as vice president of North American sales at Safend/Supercom and held similar sales leadership positions at Cynet\, RSA and Check Point Software Technologies.
URL:https://issa-centralmd.org/calendar/morning-membership-meeting-01-13-2021/
LOCATION:Virtual via Zoom\, MD
CATEGORIES:Meetings
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20210127T170000
DTEND;TZID=America/New_York:20210127T193000
DTSTAMP:20260427T130241
CREATED:20201215T232054Z
LAST-MODIFIED:20210128T202619Z
UID:3505-1611766800-1611775800@issa-centralmd.org
SUMMARY:Membership Meeting 1/27/2021
DESCRIPTION:Chapter Business Meeting Slides: 2021-01-27 Membership Meeting \n\n\n\nSpeaker Slides: 2021-01-27 Red Canary Threat Detection ReportTBD \n\n\nMITRE ATT&CK home page: https://attack.mitre.org/\nGithub repo of Atomic Red Team: https://github.com/redcanaryco/atomic-red-team\nGithub Repo for Atomic Red Team execution fraemwork\, Invoke-Atomic: https://github.com/redcanaryco/invoke-atomicredteam\nGithub repo for variation testing tool\, AtomicTestHarnesses: https://github.com/redcanaryco/AtomicTestHarnesses\nInstallation wiki for Invoke-Atomic: https://github.com/redcanaryco/invoke-atomicredteam/wiki\nInvoke-Atomic video tutorials: https://www.youtube.com/watch?v=-HEx-qfd54M&list=PL92eUXSF717W9TCfZzLca6DmlFXFIu8p6\nAbout Atomic Red Team: https://github.com/redcanaryco/atomic-red-team/wiki/About-Atomic-Red-Team\nAtomic Red Team microsite: https://atomicredteam.io/\nAtomic Red Team Slack: https://slack.atomicredteam.io/\nAtomic Test Harnesses Blog series:\nPt. 1: https://redcanary.com/blog/introducing-atomictestharnesses/\nPt. 2: ‌https://redcanary.com/blog/threat-research-questions/\n2020 Threat Detection Report: https://redcanary.com/threat-detection-report/introduction/\nPreviewing the 2021 Threat Detection Report: https://redcanary.com/blog/2021-threat-detection-report-preview/\nSomeone asked about the difference between Caldera and Atomic Red Team: https://redcanary.com/blog/comparing-red-team-platforms/\nHere’s some information on mapping to ATT&CK (both on the context of Atomic Red Team and in the context of behavioral analytics): https://redcanary.com/blog/mitre-sub-techniques/ \nTopic: Simulating Adversary Tradecraft with Atomic Red Team and the Red Canary Threat Detection Report \nWe plan to discuss two important resources that leading teams are using to improve their security: \n\n2020 Threat Detection Report: Red Canary’s annual in-depth analysis of of the top techniques for tens of thousands of threats seen in the wild. For each technique\, we include detection\, prevention\, and testing strategies.\n\n\n\n\nAtomic Red Team: An open-source tool mapped to ATT&CK techniques valuable for benignly simulating specific adversary behaviors\n\n\n\nSpeaker: Brian Donohue\, Red Canary \nBrian has been writing about and researching information security for the last decade. He started his career as a journalist covering security and privacy. He later consulted as a threat intelligence analyst\, researching adversaries and techniques for a variety of major banks\, retailers\, and manufacturers. At Red Canary\, Brian helps guide research publication and technical messaging efforts.
URL:https://issa-centralmd.org/calendar/membership-meeting-1-27-2021/
LOCATION:Md
CATEGORIES:Meetings
END:VEVENT
END:VCALENDAR