BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//Central Maryland Chapter of ISSA - ECPv6.15.20//NONSGML v1.0//EN
CALSCALE:GREGORIAN
METHOD:PUBLISH
X-WR-CALNAME:Central Maryland Chapter of ISSA
X-ORIGINAL-URL:https://issa-centralmd.org
X-WR-CALDESC:Events for Central Maryland Chapter of ISSA
REFRESH-INTERVAL;VALUE=DURATION:PT1H
X-Robots-Tag:noindex
X-PUBLISHED-TTL:PT1H
BEGIN:VTIMEZONE
TZID:America/New_York
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20150308T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20151101T060000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20160313T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20161106T060000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20170312T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20171105T060000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20180311T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20181104T060000
END:STANDARD
END:VTIMEZONE
BEGIN:VTIMEZONE
TZID:UTC
BEGIN:STANDARD
TZOFFSETFROM:+0000
TZOFFSETTO:+0000
TZNAME:UTC
DTSTART:20150101T000000
END:STANDARD
END:VTIMEZONE
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20170328T170000
DTEND;TZID=America/New_York:20170328T210000
DTSTAMP:20260424T192121
CREATED:20161026T221937Z
LAST-MODIFIED:20170305T160851Z
UID:1109-1490720400-1490734800@issa-centralmd.org
SUMMARY:Membership Meeting 3/28/17
DESCRIPTION:Speaker: Ron Gula\, President Gula Tech Adventures Tenable Network Security \nRon Gula started his cyber security career as a network penetration tester for the NSA. At BBN\, he developed network honeypots to lure hackers and he ran US Internetworking’s team of penetration testers and incident responders. \n As CTO of Network Security Wizards\, Ron pioneered the art of network security monitoring and produced the Dragon Intrusion Detection System which was recognized as a market leader by Gartner in 2001. \n As CEO and co-founder of Tenable Network Security\, Ron led the company’s rapid growth and product vision from 2002 through 2016. He helped them scale to more than 20\,000 customers worldwide\, raise $300m in venture capital and achieve revenues in excess of $100m annually. \nPresentation – Building a Successful Tech Company \nRon Gula will share his perspectives on the cyber security market and give advice for growing and building tech companies including how to “pitch” and what sort of ideas are trendy and new.
URL:https://issa-centralmd.org/calendar/membership-meeting-3/
LOCATION:MD
CATEGORIES:Meetings
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20170310T080000
DTEND;TZID=America/New_York:20170310T170000
DTSTAMP:20260424T192121
CREATED:20160920T185914Z
LAST-MODIFIED:20170227T000633Z
UID:215-1489132800-1489165200@issa-centralmd.org
SUMMARY:Mid Atlantic Information Security Conference 2017
DESCRIPTION:ISSA Mid-Atlantic Information Security Conference\nFriday\, March 10\, 2017. Universities at Shady Grove Conference Center\, Rockville\, MD \nJoin us for a full day of training by industry leaders discussing some of the latest topics in tactics and techniques for preparing for cyber-attacks. This conference will feature a variety of presentations and cutting edge training opportunities\, including hands-on demonstrations and workshops. \nClick here for additional information and to register. \n 
URL:https://issa-centralmd.org/calendar/mid-atlantic-information-security-conference/
LOCATION:MD
CATEGORIES:Meetings
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20170222T170000
DTEND;TZID=America/New_York:20170222T190000
DTSTAMP:20260424T192121
CREATED:20161026T221153Z
LAST-MODIFIED:20170227T012625Z
UID:1105-1487782800-1487790000@issa-centralmd.org
SUMMARY:Membership Meeting 2/22/17
DESCRIPTION:General Membership Meeting Slides: click Here\nLogical Operations Presentation: click Here\nRed Owl Presentation: Click Here\n\nSponsor Appreciation Night:\nThe February ISSA Central Maryland Chapter meeting will be a Sponsor Appreciation Night to show our thanks for their continued support throughout the year. Each sponsor will be given 10-15 minutes to give an introduction to their company and discuss some of their security technologies. Vendors that have confirmed include:\n\n\n\nParsons\nPhoenixTS\nLogRhythm\nClearswift\nRedOwl Analytics\nLogical Operations\n\n 
URL:https://issa-centralmd.org/calendar/membership-meeting-2/
LOCATION:MD
CATEGORIES:Meetings
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20170125T170000
DTEND;TZID=America/New_York:20170125T190000
DTSTAMP:20260424T192121
CREATED:20161026T221746Z
LAST-MODIFIED:20170227T000936Z
UID:1107-1485363600-1485370800@issa-centralmd.org
SUMMARY:Membership Meeting 1/25/17
DESCRIPTION:Business Meeting Slides: Click Here\nSpeaker Presentation Slides: Click Here\n\nTopic: The DNA of Data Theft\n\nCharles will discuss; what\, where\, how\, when\, and why data is stolen and the fundamentals of Data Loss Prevention.\nWe will discuss the threat market and how to defend data. \n\nWhat Data is stolen\nWho produces and consumes Data\nWhy Data is stolen\nHow Data is stolen\nWhen Data is stolen\nHow to prevent Data theft\n\nTime permitting Charles will discuss deployment methodology including \n\nData Security Deployment phases\nData protection ROI matrix\n4 golden rules of deploying Data Security\n\n\nSpeaker: Chuck (Charles) Sirois\, Chief Security and Strategy Officer\, Assurance Data\n\nChuck has been a thought leader for Enterprise Security for nearly 20 years\, Chuck’s expertise stems from independent security software development and consulting for the largest Federal DoD/ civilian and fortune 500 firms. Chuck has demonstrable experience in how threat actors operate and how to defend the Enterprise against them. Further\, Chuck has proven his skills effective by successfully finding and preventing weaponized threats in hostile environments.Previously Chuck was founder of Contegrity Partners LLC and DataLeakTest.com\, as well as Security Engineer for Websense\, Novell\, NetIQ\, Tufts HC\, and Citigroup.\n 
URL:https://issa-centralmd.org/calendar/membership-meeting/
LOCATION:MD
CATEGORIES:Meetings
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20161221T170000
DTEND;TZID=America/New_York:20161221T193000
DTSTAMP:20260424T192121
CREATED:20160927T094648Z
LAST-MODIFIED:20161221T225420Z
UID:441-1482339600-1482348600@issa-centralmd.org
SUMMARY:Membership Meeting
DESCRIPTION:December 21\, 2016 General Meeting\nMeeting Slides: Click Here \nPresentation: Successfully Empowering Employees in Security Awareness \nIt’s a well-known statistic that the majority of cyber security incidents originate from end users within an organization. The emails they click through\, their treatment of mobile devices with access to corporate data\, and the general lack of awareness or empowerment they feel relative to understanding IT security risks leave most organizations operating as though the front door to the building has been left open – it’s become increasingly common for outsiders to gain easy access to corporate data\, practically in broad daylight. \nTo better combat IT security challenges\, Logical Operations has authored an expert-facilitated training course and accompanying credential that helps an organization not only implement a successful security awareness program\, but build a process for ensuring their employees feel continuously empowered relative to IT security and their role in ensuring corporate data is left uncompromised. In this presentation\, Logical Operations will talk through their recommendations for successfully implementing such a program\, as well as the actions they’ve seen corporate clients take to better avoid data compromises \nSpeaker: Joe Mignano\, VP\, Channels\, Logical Operations \nJeanie Saunders\, Director\, Trainer Enablement \nJoe Mignano leads the Channels group at Logical Operations. In this role\, Joe is responsible for setting Logical Operations’ certification development strategy (which includes certifications in IT Security\, secure mobile application development\, vendor-neutral cloud computing\, and virtualization)\, initiating public relations and other awareness efforts relative to Logical Operations’ certification products\, and building partnerships aimed at developing a broader channel for Logical Operations’ certification products worldwide. \nJeanie Saunders is a Logical Operations Instructor with over 15 years of classroom experience. She is certified by Microsoft\, CompTIA\, and Epic\, and has taught classes on Microsoft Office\, Network Operating Systems\, Healthcare software and Trainer Development. In her current role\, she meets with trainers to share ideas and tackle the tough questions relating to the management of today’s computer training classroom using resources that help create the best possible learning environment for students. \n 
URL:https://issa-centralmd.org/calendar/december-meeting/
LOCATION:Parsons\, 110 Samuel Morse Drive\, Suite 200\, Columbia\, MD\, 21046\, United States
CATEGORIES:Meetings
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20161116T170000
DTEND;TZID=America/New_York:20161116T193000
DTSTAMP:20260424T192121
CREATED:20160927T034304Z
LAST-MODIFIED:20161117T124023Z
UID:411-1479315600-1479324600@issa-centralmd.org
SUMMARY:Membership Meeting
DESCRIPTION:November 16\, 2016 General Meeting \nMembership Meeting Slides: \nSpeaker Presentation Slides: \nSpeaker: Don Woodard\, Security Architect\, Attivo Networks \nDon Woodard is a versatile technical professional with over 20 years of experience working with market leading security companies and solid achievements in designing and implementing secure Internet-based solutions. \nDon joined Attivo Networks as the Senior Sales Engineer responsible for US Federal business development.  Don joined the company because he believes the traditional way of securing important assets and information is broken. The power of Deception is a unique solution to the new push to gain full visibility into all network activity. He focuses on the idea that CISO’s are in need of new approaches to fix the broken n architectures in place today. \nHe began his career in Information Technology in 1990\, transitioning into Network Security as a Senior Security Engineer at Guidance Software\, AccessData\, NetWitness\, and RSA. Don sold to and managed some of the largest agencies within the Federal Civilian Government throughout his career. \nDon attended Elon University where he received his B.S. Management Information Systems. \nPresentation: Cyber Attack Detection and Defense \nPrevention\, detection\, and response are the core pillars for any company’s cybersecurity infrastructure. Always prevent what you can\, but also have a solid plan for the real-time detection of an inside-the-network attacker and have the tools in place for post-compromise investigations and remediation. Deception is quickly becoming recognized as the most effective and efficient approach to detecting targeted\, stolen credential\, and ransomware attacks. Deception lures an attacker into revealing themselves and completes extensive attack analysis\, which can be used to improve incident response by automatically blocking and quarantining an attacker. In this session you will learn how deception technologies accelerate time-to-detection\, how attack analysis can be applied to expedite response actions\, and how threat intelligence can be leveraged to strengthen prevention security systems.
URL:https://issa-centralmd.org/calendar/2016-november-meeting/
LOCATION:Parsons\, 110 Samuel Morse Drive\, Suite 200\, Columbia\, MD\, 21046\, United States
CATEGORIES:Meetings
END:VEVENT
BEGIN:VEVENT
DTSTART;VALUE=DATE:20161102
DTEND;VALUE=DATE:20161104
DTSTAMP:20260424T192121
CREATED:20160601T202247Z
LAST-MODIFIED:20160927T040403Z
UID:44-1478044800-1478217599@issa-centralmd.org
SUMMARY:ISSA International Conference
DESCRIPTION:Join us at the 2016 ISSA International Conference!\nSurvival Strategies in a Cyber World\nNovember 2-3\, 2016\nHyatt Regency Dallas\nDallas\, TX\, USA\n#ISSAConf\nJoin us for solution oriented\, proactive and innovative sessions focused on security as a vital part of business.
URL:https://issa-centralmd.org/calendar/2016-issa-international-conference-2/
LOCATION:Hyatt Regency Dallas\, Dallas\,\, TX\, United States
CATEGORIES:Meetings
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20161026T170000
DTEND;TZID=America/New_York:20161026T193000
DTSTAMP:20260424T192121
CREATED:20160601T202509Z
LAST-MODIFIED:20161025T221007Z
UID:45-1477501200-1477510200@issa-centralmd.org
SUMMARY:Membership Meeting
DESCRIPTION:October 26\, 2016 General Meeting: (Business Meeting Slides) \nSpeaker: Steven Grossman\, Bay Dynamics \nSteven has over 20 years of management consulting and industry experience working with technology\, security and business executives\, driving solutions to their most critical and complex problems. At Bay Dynamics\, Steven is responsible for ensuring our clients are successful in achieving their security and risk management goals. Prior to Bay Dynamics\, Steven held senior positions at top tier consultancies such as PriceWaterhouseCoopers and EMC\, where he architected and managed programs focused on security\, risk\, business intelligence\, big data analytics\, enterprise program management offices\, corporate legal operations\, data privacy\, cloud architecture and business continuity planning for global clients in the financial services and health care industries. Steven holds a BA in Economics and Computer Science from Queens College and has achieved his CISSP certification \nPresentation: Assets At Risk – A Risk Based Approach to Cyber Security \nMost organizations address cyber risk in silos\, addressing events in each threat and vulnerability tool in isolation\, without considering the bigger picture or the impact on their business.  The result is responders not focusing on the most important events and taking too much time to connect the dots that indicate what is really going on.  This session will present a risk based approach to cyber security\, that will explain how threats\, vulnerabilities\, business context and asset value come together to prioritize response and improve communication with decision makers\, to minimize impact on your business and to get the resources you need. \n 
URL:https://issa-centralmd.org/calendar/october-meeting/
LOCATION:MD
CATEGORIES:Meetings
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=UTC:20160928T170000
DTEND;TZID=UTC:20160928T193000
DTSTAMP:20260424T192121
CREATED:20160601T202543Z
LAST-MODIFIED:20160928T222741Z
UID:46-1475082000-1475091000@issa-centralmd.org
SUMMARY:Membership Meeting
DESCRIPTION:Business Meeting Slides \nSpeaker: Chris Hauser\, Senior Security Engineer\, Imperva \nChris Hauser is a Senior Security Engineer with Imperva.  He has twenty years of experience creating\, delivering\, and advising customers on how to manage and secure their information.  He has worked for SAIC\, EMC\, and Leidos in a variety of leadership positions. \nTopic: A Flexible Response for APT Malware (Presentation Slides) \nOverview of Threat actors\, Ransomware\, BOT’s and other emerging APTs\, their attack platforms\, how they can be identified and mitigated utilizing Tools\, tips and techniques relevant to their security context. Controls and processes that identify and mitigate APT platforms buried in enterprise networks.
URL:https://issa-centralmd.org/calendar/september-meeting/
LOCATION:MD
CATEGORIES:Meetings
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=UTC:20160622T080000
DTEND;TZID=UTC:20160622T150000
DTSTAMP:20260424T192121
CREATED:20160601T202802Z
LAST-MODIFIED:20161002T170844Z
UID:49-1466582400-1466607600@issa-centralmd.org
SUMMARY:June Meeting
DESCRIPTION:Speaker: Dawn M. Greenman\,  Acting Program Manager Cybersecurity\, JHU/APL \nDawn has over 20 years of IT\, project and program management experience with the last 4 years focused on Cybersecurity.  Dawn is currently tasked with compliance activities to meet new DFARS Cybersecurity requirements facing DoD contractors. \nTopic New DFARS Cybersecurity Requirements for Defense Contractors \nAfter the OPM breach last summer\, DoD contractors and their subs were hit\, practically overnight\, with new Cybersecurity requirements added to contracts through DFARS Clause 252.204-7012  “Safeguarding Covered Defense Information and Cyber Incident Reporting”.  Working through the obscure wording\, coming to consensus on the interpretation of these new cybersecurity controls and then planning and paying for deployment of multifactor authentication to be compliant by the December 31\, 2017 deadline is a challenge for any DoD contractor and subcontractor. \nIn this session\, you will learn a little about the new DFARS Cybersecurity requirements (and NIST 800-171) and hear some insight into the steps JHU/APL followed to work through the process. \nBusiness Meeting Slides
URL:https://issa-centralmd.org/calendar/june-meeting/
LOCATION:MD
CATEGORIES:Meetings
END:VEVENT
END:VCALENDAR