BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//Central Maryland Chapter of ISSA - ECPv6.15.20//NONSGML v1.0//EN
CALSCALE:GREGORIAN
METHOD:PUBLISH
X-WR-CALNAME:Central Maryland Chapter of ISSA
X-ORIGINAL-URL:https://issa-centralmd.org
X-WR-CALDESC:Events for Central Maryland Chapter of ISSA
REFRESH-INTERVAL;VALUE=DURATION:PT1H
X-Robots-Tag:noindex
X-PUBLISHED-TTL:PT1H
BEGIN:VTIMEZONE
TZID:America/New_York
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20150308T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20151101T060000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20160313T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20161106T060000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20170312T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20171105T060000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20180311T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20181104T060000
END:STANDARD
END:VTIMEZONE
BEGIN:VTIMEZONE
TZID:UTC
BEGIN:STANDARD
TZOFFSETFROM:+0000
TZOFFSETTO:+0000
TZNAME:UTC
DTSTART:20150101T000000
END:STANDARD
END:VTIMEZONE
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20170726T170000
DTEND;TZID=America/New_York:20170726T190000
DTSTAMP:20260424T175234
CREATED:20161026T222343Z
LAST-MODIFIED:20170726T030532Z
UID:1117-1501088400-1501095600@issa-centralmd.org
SUMMARY:Membership Meeting 7/26/17
DESCRIPTION:ISSA Business Meeting Presentation slides: 2017-07-26-Meeting-Presentation.pdf \n\nSpeaker slides: Contemporary Challenges for Cloud Service Providers Seeking FedRAMP Compliance\n  \nTopic:Contemporary Challenges for Cloud Service Providers Seeking FedRAMP Compliance \n\nThe Federal Risk and Authorization Management Program\, FedRAMP\, is a government-wide assessment and compliance program providing a standardized approach for Cloud Service Providers (CSP) and other organizations delivering SaaS and related products and services to government clients. Although FedRAMP is a well thought out and structured framework\, CSPs and other providers will invariably face serious challenges when seeking an assessment\, potentially resulting in significant losses in time\, money\, and reputation if not prepared.  Engaging knowledgeable advisory services and experienced third-party assessors is essential to successful outcomes and greater business opportunity. \nSpeaker: Jeff Roth\, NCC Group Security Services\, Inc. \n\nJeff Roth is a Regional Director in NCC Group’s Risk Management and Governance organization. He has over 30 years as a global information assurance specialist and cybersecurity engineer delivering excellence in consulting to government\, commercial\, and non-profit organizations. Jeff’s achievements include: \n– Member of the NIST Cybersecurity Working Group that developed the National Initiative for Cybersecurity Education training course.\n– Contributor and SME for the 4th and 5th editions of COBIT and COBIT 5 for Security.\n– Co-author of the ISACA 26th Edition of the 2016 CISA Review Manual\n– 2006 recipient of the ISACA’s John Kuyers Best Speaker/Conference Contributor Award \nPrior to working at NCC Group Jeff served as a US Air Force Information Assurance Officer\, Special Operations Command Cybersecurity Engineer\, Director of Technology Risk Management Service at RSM McGladrey\, and Manager of Internal Audit and Government Relations for the United Space Alliance (Prime Contractor for the NASA Space Shuttle Program) where he was awarded the NASA Astronauts Achievement Award – “Silver Snoopy” \nHis professional credentials include CISSP-ISSEP\, CISA\, and CGEIT \n 
URL:https://issa-centralmd.org/calendar/membership-meeting-7/
CATEGORIES:Meetings
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20170628T170000
DTEND;TZID=America/New_York:20170628T190000
DTSTAMP:20260424T175234
CREATED:20161026T222244Z
LAST-MODIFIED:20170628T220519Z
UID:1115-1498669200-1498676400@issa-centralmd.org
SUMMARY:Membership Meeting 6/28/17
DESCRIPTION:  \n\n\nBusiness Meeting Slides: Click Here\n\nTopic: Cyber Innovation\nWhile invention can be defined as creating something new\, “innovation” is applying an invention or creative idea in a different way that adds value to the customer or user.  Innovative ideas are not limited to new technology\, but can occur in policy\, concept of operations\, process and other areas.  For example\, there is potential synergy between corporate IT/SOCs\, cyber R&D\, and the cyber security applied to critical mission systems.  However\, exploiting this synergy is not free\, and many organizations struggle in applying the tools they develop to the real-life problems their SOC operators encounter on a daily basis.  This talk will cover innovative ideas stemming from this cyber-related synergy\, and where it has led to new approaches in malware analysis\, network architecture\, multi-organization collaboration\, visualization of the battle space\, and automated cyber response. \nSpeaker: Michael Misumi\, CIO\, Johns Hopkins University Applied Physics Lab (APL) \n\nMichael Misumi serves as the Chief Information Officer and Head of the Information Technology Service Department at the Applied Physics Laboratory (APL) at Johns Hopkins University. Prior to his current position he was at the RAND Corp. in Santa Monica\, Calif.\, where he was deputy CIO. He led the operational Cyber Strategy development at both organizations\, he is the APL Cyber Response Incident Lead\, and he led a Cyber Security review of all of Johns Hopkins (including the university\, medical center\, and hospitals). Misumi\, who has an MBA from the UCLA Anderson School of Management and a bachelor’s degree in English from UCLA\, has over 20 years experience developing information technology strategy\, security operations\, project portfolio management\, network operations\, data center operations\, desktop administration and personnel management. The 300-person Information Technology Service Department develops and maintains software for APL business applications; its experts also serve on the front lines of cyber-protection\, securing APL networks from hackers and other outside threats. Misumi leads the Navy UARC Cyber Security Task Force\, serves on the USSTRATCOM Strategic Advisory Group (SAG) IT Task Force and the Computer Advisory Committee for Oakridge National Laboratory\, and is a Board member for the Howard County School System Cyber Security program (ARL). \n 
URL:https://issa-centralmd.org/calendar/membership-meeting-6/
CATEGORIES:Meetings
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20170524T170000
DTEND;TZID=America/New_York:20170524T190000
DTSTAMP:20260424T175234
CREATED:20161026T222201Z
LAST-MODIFIED:20170609T132123Z
UID:1113-1495645200-1495652400@issa-centralmd.org
SUMMARY:Membership Meeting 5/24/17
DESCRIPTION:ISSA Business Meeting Presentation slides: 2017-05-24-Meeting-Presentation.pdf\nSpeaker slides: Advanced-Persistent-Threat.pdf\n\nTopic: Advanced Persistent Security: Learning from failure\nThis discussion will focus on how failure should not only be expected\, but welcomed.  Failures tell you how to improve protection and detection\, and can lead to the discovery of other breaches – all supported by case studies. Such failures can also be considered part of how to respond to a data breach. There is clearly the patching\, but the more important long-term issues are\, what are the actual lessons learned to take away and improve security?  Ira will share his Syrian Electronic Army experiences which proactively stopped attacks after learning from past attacks.  Additional lessons learned from the Snowden case and others will also be examined. \nSpeaker: Ira Winkler\, Secure Mentem\n\nIra Winkler\, CISSP is President of Secure Mentem\, author of Advanced Persistent Security\, and co-host of The Irari Report (www.irarireport.com).  He is considered one of the world’s most influential security professionals\, and has been named a “Modern Day James Bond” by the media.  He did this by performing espionage simulations\, where he physically and technically “broke into” some of the largest companies in the World and investigating crimes against them\, and telling them how to cost effectively protect their information and computer infrastructure.  He continues to perform these espionage simulations\, as well as assisting organizations in developing cost effective security programs.  Ira also won the Hall of Fame award from the Information Systems Security Association\, as well as several other prestigious industry awards. Most recently\, CSO Magazine named Ira a CSO Compass Award winner as The Awareness Crusader. \nMr. Winkler began his career at the National Security Agency\, where he served as an Intelligence and Computer Systems Analyst.  He moved onto support other US and overseas government military and intelligence agencies.  After leaving government service\, he went on to serve as President of the Internet Security Advisors Group\, Chief Security Strategist at HP Consulting\, and Director of Technology of the National Computer Security Association.  He was also on the Graduate and Undergraduate faculties of the Johns Hopkins University and the University of Maryland.  Mr. Winkler is a Past President of the Information Systems Security Association\, which is a 10\,000+ member professional association.
URL:https://issa-centralmd.org/calendar/membership-meeting-5/
CATEGORIES:Meetings
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20170426T050000
DTEND;TZID=America/New_York:20170426T190000
DTSTAMP:20260424T175234
CREATED:20161026T222041Z
LAST-MODIFIED:20170426T222730Z
UID:1111-1493182800-1493233200@issa-centralmd.org
SUMMARY:Membership Meeting 4/26/17
DESCRIPTION:General Membership Meeting Slides: click Here\n\n\n\n\nTopic: Data Engine Security Management\nPlease Join Charles Sirois\, Chief Security and Strategy Officer and creator of DataLeakTest.com for a discussion on “Data Engine Security Management” In this presentation Charles will discuss the inner workings of the inside-out Data Engine model for data protection. We will discuss handling data protection in 3 major phases; Inbound Data handling controls\, Internal Data handling controls\, and Output Data handling controls. Time permitting Charles will discuss Data controls deployment methodology including; Data Security Deployment phases\, Data protection\, ROI matrix\, and 4 golden rules of deploying Data Security\n\nSpeaker: Chuck (Charles) Sirois\, Chief Security and Strategy Officer\, Assurance Data\nChuck has been a thought leader for Enterprise Security for nearly 20 years\, Chuck’s expertise stems from independent security software development and consulting for the largest Federal DoD/ civilian and fortune 500 firms. Chuck has demonstrable experience in how threat actors operate and how to defend the Enterprise against them. Further\, Chuck has proven his skills effective by successfully finding and preventing weaponized threats in hostile environments.Previously Chuck was founder of Contegrity Partners LLC and DataLeakTest.com\, as well as Security Engineer for Websense\, Novell\, NetIQ\, Tufts HC\, and Citigroup.
URL:https://issa-centralmd.org/calendar/membership-meeting-4/
CATEGORIES:Meetings
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20170328T170000
DTEND;TZID=America/New_York:20170328T210000
DTSTAMP:20260424T175234
CREATED:20161026T221937Z
LAST-MODIFIED:20170305T160851Z
UID:1109-1490720400-1490734800@issa-centralmd.org
SUMMARY:Membership Meeting 3/28/17
DESCRIPTION:Speaker: Ron Gula\, President Gula Tech Adventures Tenable Network Security \nRon Gula started his cyber security career as a network penetration tester for the NSA. At BBN\, he developed network honeypots to lure hackers and he ran US Internetworking’s team of penetration testers and incident responders. \n As CTO of Network Security Wizards\, Ron pioneered the art of network security monitoring and produced the Dragon Intrusion Detection System which was recognized as a market leader by Gartner in 2001. \n As CEO and co-founder of Tenable Network Security\, Ron led the company’s rapid growth and product vision from 2002 through 2016. He helped them scale to more than 20\,000 customers worldwide\, raise $300m in venture capital and achieve revenues in excess of $100m annually. \nPresentation – Building a Successful Tech Company \nRon Gula will share his perspectives on the cyber security market and give advice for growing and building tech companies including how to “pitch” and what sort of ideas are trendy and new.
URL:https://issa-centralmd.org/calendar/membership-meeting-3/
CATEGORIES:Meetings
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20170310T080000
DTEND;TZID=America/New_York:20170310T170000
DTSTAMP:20260424T175234
CREATED:20160920T185914Z
LAST-MODIFIED:20170227T000633Z
UID:215-1489132800-1489165200@issa-centralmd.org
SUMMARY:Mid Atlantic Information Security Conference 2017
DESCRIPTION:ISSA Mid-Atlantic Information Security Conference\nFriday\, March 10\, 2017. Universities at Shady Grove Conference Center\, Rockville\, MD \nJoin us for a full day of training by industry leaders discussing some of the latest topics in tactics and techniques for preparing for cyber-attacks. This conference will feature a variety of presentations and cutting edge training opportunities\, including hands-on demonstrations and workshops. \nClick here for additional information and to register. \n 
URL:https://issa-centralmd.org/calendar/mid-atlantic-information-security-conference/
CATEGORIES:Meetings
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20170222T170000
DTEND;TZID=America/New_York:20170222T190000
DTSTAMP:20260424T175234
CREATED:20161026T221153Z
LAST-MODIFIED:20170227T012625Z
UID:1105-1487782800-1487790000@issa-centralmd.org
SUMMARY:Membership Meeting 2/22/17
DESCRIPTION:General Membership Meeting Slides: click Here\nLogical Operations Presentation: click Here\nRed Owl Presentation: Click Here\n\nSponsor Appreciation Night:\nThe February ISSA Central Maryland Chapter meeting will be a Sponsor Appreciation Night to show our thanks for their continued support throughout the year. Each sponsor will be given 10-15 minutes to give an introduction to their company and discuss some of their security technologies. Vendors that have confirmed include:\n\n\n\nParsons\nPhoenixTS\nLogRhythm\nClearswift\nRedOwl Analytics\nLogical Operations\n\n 
URL:https://issa-centralmd.org/calendar/membership-meeting-2/
CATEGORIES:Meetings
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20170125T170000
DTEND;TZID=America/New_York:20170125T190000
DTSTAMP:20260424T175234
CREATED:20161026T221746Z
LAST-MODIFIED:20170227T000936Z
UID:1107-1485363600-1485370800@issa-centralmd.org
SUMMARY:Membership Meeting 1/25/17
DESCRIPTION:Business Meeting Slides: Click Here\nSpeaker Presentation Slides: Click Here\n\nTopic: The DNA of Data Theft\n\nCharles will discuss; what\, where\, how\, when\, and why data is stolen and the fundamentals of Data Loss Prevention.\nWe will discuss the threat market and how to defend data. \n\nWhat Data is stolen\nWho produces and consumes Data\nWhy Data is stolen\nHow Data is stolen\nWhen Data is stolen\nHow to prevent Data theft\n\nTime permitting Charles will discuss deployment methodology including \n\nData Security Deployment phases\nData protection ROI matrix\n4 golden rules of deploying Data Security\n\n\nSpeaker: Chuck (Charles) Sirois\, Chief Security and Strategy Officer\, Assurance Data\n\nChuck has been a thought leader for Enterprise Security for nearly 20 years\, Chuck’s expertise stems from independent security software development and consulting for the largest Federal DoD/ civilian and fortune 500 firms. Chuck has demonstrable experience in how threat actors operate and how to defend the Enterprise against them. Further\, Chuck has proven his skills effective by successfully finding and preventing weaponized threats in hostile environments.Previously Chuck was founder of Contegrity Partners LLC and DataLeakTest.com\, as well as Security Engineer for Websense\, Novell\, NetIQ\, Tufts HC\, and Citigroup.\n 
URL:https://issa-centralmd.org/calendar/membership-meeting/
CATEGORIES:Meetings
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20161221T170000
DTEND;TZID=America/New_York:20161221T193000
DTSTAMP:20260424T175234
CREATED:20160927T094648Z
LAST-MODIFIED:20161221T225420Z
UID:441-1482339600-1482348600@issa-centralmd.org
SUMMARY:Membership Meeting
DESCRIPTION:December 21\, 2016 General Meeting\nMeeting Slides: Click Here \nPresentation: Successfully Empowering Employees in Security Awareness \nIt’s a well-known statistic that the majority of cyber security incidents originate from end users within an organization. The emails they click through\, their treatment of mobile devices with access to corporate data\, and the general lack of awareness or empowerment they feel relative to understanding IT security risks leave most organizations operating as though the front door to the building has been left open – it’s become increasingly common for outsiders to gain easy access to corporate data\, practically in broad daylight. \nTo better combat IT security challenges\, Logical Operations has authored an expert-facilitated training course and accompanying credential that helps an organization not only implement a successful security awareness program\, but build a process for ensuring their employees feel continuously empowered relative to IT security and their role in ensuring corporate data is left uncompromised. In this presentation\, Logical Operations will talk through their recommendations for successfully implementing such a program\, as well as the actions they’ve seen corporate clients take to better avoid data compromises \nSpeaker: Joe Mignano\, VP\, Channels\, Logical Operations \nJeanie Saunders\, Director\, Trainer Enablement \nJoe Mignano leads the Channels group at Logical Operations. In this role\, Joe is responsible for setting Logical Operations’ certification development strategy (which includes certifications in IT Security\, secure mobile application development\, vendor-neutral cloud computing\, and virtualization)\, initiating public relations and other awareness efforts relative to Logical Operations’ certification products\, and building partnerships aimed at developing a broader channel for Logical Operations’ certification products worldwide. \nJeanie Saunders is a Logical Operations Instructor with over 15 years of classroom experience. She is certified by Microsoft\, CompTIA\, and Epic\, and has taught classes on Microsoft Office\, Network Operating Systems\, Healthcare software and Trainer Development. In her current role\, she meets with trainers to share ideas and tackle the tough questions relating to the management of today’s computer training classroom using resources that help create the best possible learning environment for students. \n 
URL:https://issa-centralmd.org/calendar/december-meeting/
LOCATION:Parsons\, 110 Samuel Morse Drive\, Suite 200\, Columbia\, MD\, 21046\, United States
CATEGORIES:Meetings
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20161116T170000
DTEND;TZID=America/New_York:20161116T193000
DTSTAMP:20260424T175234
CREATED:20160927T034304Z
LAST-MODIFIED:20161117T124023Z
UID:411-1479315600-1479324600@issa-centralmd.org
SUMMARY:Membership Meeting
DESCRIPTION:November 16\, 2016 General Meeting \nMembership Meeting Slides: \nSpeaker Presentation Slides: \nSpeaker: Don Woodard\, Security Architect\, Attivo Networks \nDon Woodard is a versatile technical professional with over 20 years of experience working with market leading security companies and solid achievements in designing and implementing secure Internet-based solutions. \nDon joined Attivo Networks as the Senior Sales Engineer responsible for US Federal business development.  Don joined the company because he believes the traditional way of securing important assets and information is broken. The power of Deception is a unique solution to the new push to gain full visibility into all network activity. He focuses on the idea that CISO’s are in need of new approaches to fix the broken n architectures in place today. \nHe began his career in Information Technology in 1990\, transitioning into Network Security as a Senior Security Engineer at Guidance Software\, AccessData\, NetWitness\, and RSA. Don sold to and managed some of the largest agencies within the Federal Civilian Government throughout his career. \nDon attended Elon University where he received his B.S. Management Information Systems. \nPresentation: Cyber Attack Detection and Defense \nPrevention\, detection\, and response are the core pillars for any company’s cybersecurity infrastructure. Always prevent what you can\, but also have a solid plan for the real-time detection of an inside-the-network attacker and have the tools in place for post-compromise investigations and remediation. Deception is quickly becoming recognized as the most effective and efficient approach to detecting targeted\, stolen credential\, and ransomware attacks. Deception lures an attacker into revealing themselves and completes extensive attack analysis\, which can be used to improve incident response by automatically blocking and quarantining an attacker. In this session you will learn how deception technologies accelerate time-to-detection\, how attack analysis can be applied to expedite response actions\, and how threat intelligence can be leveraged to strengthen prevention security systems.
URL:https://issa-centralmd.org/calendar/2016-november-meeting/
LOCATION:Parsons\, 110 Samuel Morse Drive\, Suite 200\, Columbia\, MD\, 21046\, United States
CATEGORIES:Meetings
END:VEVENT
BEGIN:VEVENT
DTSTART;VALUE=DATE:20161102
DTEND;VALUE=DATE:20161104
DTSTAMP:20260424T175234
CREATED:20160601T202247Z
LAST-MODIFIED:20160927T040403Z
UID:44-1478044800-1478217599@issa-centralmd.org
SUMMARY:ISSA International Conference
DESCRIPTION:Join us at the 2016 ISSA International Conference!\nSurvival Strategies in a Cyber World\nNovember 2-3\, 2016\nHyatt Regency Dallas\nDallas\, TX\, USA\n#ISSAConf\nJoin us for solution oriented\, proactive and innovative sessions focused on security as a vital part of business.
URL:https://issa-centralmd.org/calendar/2016-issa-international-conference-2/
LOCATION:Hyatt Regency Dallas\, Dallas\,\, TX\, United States
CATEGORIES:Meetings
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20161026T170000
DTEND;TZID=America/New_York:20161026T193000
DTSTAMP:20260424T175234
CREATED:20160601T202509Z
LAST-MODIFIED:20161025T221007Z
UID:45-1477501200-1477510200@issa-centralmd.org
SUMMARY:Membership Meeting
DESCRIPTION:October 26\, 2016 General Meeting: (Business Meeting Slides) \nSpeaker: Steven Grossman\, Bay Dynamics \nSteven has over 20 years of management consulting and industry experience working with technology\, security and business executives\, driving solutions to their most critical and complex problems. At Bay Dynamics\, Steven is responsible for ensuring our clients are successful in achieving their security and risk management goals. Prior to Bay Dynamics\, Steven held senior positions at top tier consultancies such as PriceWaterhouseCoopers and EMC\, where he architected and managed programs focused on security\, risk\, business intelligence\, big data analytics\, enterprise program management offices\, corporate legal operations\, data privacy\, cloud architecture and business continuity planning for global clients in the financial services and health care industries. Steven holds a BA in Economics and Computer Science from Queens College and has achieved his CISSP certification \nPresentation: Assets At Risk – A Risk Based Approach to Cyber Security \nMost organizations address cyber risk in silos\, addressing events in each threat and vulnerability tool in isolation\, without considering the bigger picture or the impact on their business.  The result is responders not focusing on the most important events and taking too much time to connect the dots that indicate what is really going on.  This session will present a risk based approach to cyber security\, that will explain how threats\, vulnerabilities\, business context and asset value come together to prioritize response and improve communication with decision makers\, to minimize impact on your business and to get the resources you need. \n 
URL:https://issa-centralmd.org/calendar/october-meeting/
CATEGORIES:Meetings
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=UTC:20160928T170000
DTEND;TZID=UTC:20160928T193000
DTSTAMP:20260424T175234
CREATED:20160601T202543Z
LAST-MODIFIED:20160928T222741Z
UID:46-1475082000-1475091000@issa-centralmd.org
SUMMARY:Membership Meeting
DESCRIPTION:Business Meeting Slides \nSpeaker: Chris Hauser\, Senior Security Engineer\, Imperva \nChris Hauser is a Senior Security Engineer with Imperva.  He has twenty years of experience creating\, delivering\, and advising customers on how to manage and secure their information.  He has worked for SAIC\, EMC\, and Leidos in a variety of leadership positions. \nTopic: A Flexible Response for APT Malware (Presentation Slides) \nOverview of Threat actors\, Ransomware\, BOT’s and other emerging APTs\, their attack platforms\, how they can be identified and mitigated utilizing Tools\, tips and techniques relevant to their security context. Controls and processes that identify and mitigate APT platforms buried in enterprise networks.
URL:https://issa-centralmd.org/calendar/september-meeting/
CATEGORIES:Meetings
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=UTC:20160622T080000
DTEND;TZID=UTC:20160622T150000
DTSTAMP:20260424T175234
CREATED:20160601T202802Z
LAST-MODIFIED:20161002T170844Z
UID:49-1466582400-1466607600@issa-centralmd.org
SUMMARY:June Meeting
DESCRIPTION:Speaker: Dawn M. Greenman\,  Acting Program Manager Cybersecurity\, JHU/APL \nDawn has over 20 years of IT\, project and program management experience with the last 4 years focused on Cybersecurity.  Dawn is currently tasked with compliance activities to meet new DFARS Cybersecurity requirements facing DoD contractors. \nTopic New DFARS Cybersecurity Requirements for Defense Contractors \nAfter the OPM breach last summer\, DoD contractors and their subs were hit\, practically overnight\, with new Cybersecurity requirements added to contracts through DFARS Clause 252.204-7012  “Safeguarding Covered Defense Information and Cyber Incident Reporting”.  Working through the obscure wording\, coming to consensus on the interpretation of these new cybersecurity controls and then planning and paying for deployment of multifactor authentication to be compliant by the December 31\, 2017 deadline is a challenge for any DoD contractor and subcontractor. \nIn this session\, you will learn a little about the new DFARS Cybersecurity requirements (and NIST 800-171) and hear some insight into the steps JHU/APL followed to work through the process. \nBusiness Meeting Slides
URL:https://issa-centralmd.org/calendar/june-meeting/
CATEGORIES:Meetings
END:VEVENT
END:VCALENDAR