BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//Central Maryland Chapter of ISSA - ECPv6.15.18//NONSGML v1.0//EN
CALSCALE:GREGORIAN
METHOD:PUBLISH
X-WR-CALNAME:Central Maryland Chapter of ISSA
X-ORIGINAL-URL:https://issa-centralmd.org
X-WR-CALDESC:Events for Central Maryland Chapter of ISSA
REFRESH-INTERVAL;VALUE=DURATION:PT1H
X-Robots-Tag:noindex
X-PUBLISHED-TTL:PT1H
BEGIN:VTIMEZONE
TZID:America/New_York
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20180311T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20181104T060000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20190310T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20191103T060000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20200308T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20201101T060000
END:STANDARD
END:VTIMEZONE
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20191120T130000
DTEND;TZID=America/New_York:20191120T150000
DTSTAMP:20260403T132804
CREATED:20191116T134123Z
LAST-MODIFIED:20191116T134123Z
UID:2936-1574254800-1574262000@issa-centralmd.org
SUMMARY:Deliver SD-WAN security the right way webinar
DESCRIPTION:Local internet breakouts for cloud services (SaaS and IaaS) have become central to successful cloud transformation. Many organizations have turned to SD-WAN to route traffic locally. But the approach you use for securing your local breakouts will have a significant impact on your ability to realize the SD-WAN promise of agility\, cost-effectiveness\, and improved user experience. \nTo successfully complete a transformation from legacy networks to a true cloud-first architecture\, organizations must think about security differently. Join Sumanth Kakaraparthi\, Director of Product Management at Zscaler\, and Jen Toscano\, Sr. Product Marketing Manager at Zscaler\, as they discuss the most effective solutions to secure your SD-WAN deployment. \nDuring this webinar\, you will hear about: \n\nWhat capabilities are needed to secure direct-to-internet access for SD-WAN\nWhy the security capabilities in your SD-WAN edge device are not enough\nHow to deliver comprehensive SD-WAN security while enhancing performance for all users and all locations
URL:https://issa-centralmd.org/calendar/deliver-sd-wan-security-the-right-way-webinar/
LOCATION:MD
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20191111T000000
DTEND;TZID=America/New_York:20191111T000000
DTSTAMP:20260403T132804
CREATED:20160927T155331Z
LAST-MODIFIED:20160927T170825Z
UID:537-1573430400-1573430400@issa-centralmd.org
SUMMARY:Veterans Day
DESCRIPTION:
URL:https://issa-centralmd.org/calendar/veterans-day-9/
LOCATION:MD
CATEGORIES:Holidays
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20191108T130000
DTEND;TZID=America/New_York:20191108T150000
DTSTAMP:20260403T132804
CREATED:20191015T213439Z
LAST-MODIFIED:20191019T142446Z
UID:2874-1573218000-1573225200@issa-centralmd.org
SUMMARY:ISSA Dark Web Tour Workshop
DESCRIPTION:Click for Dark Web Course Registration\n \nTraining Topic: ISSA Dark Web Tour Workshop \nJoin the ISSA Central Maryland Chapter and IntSights for an afternoon of knowledge transfer on Dark Web and Threat Intelligence. This workshop will include a *live* Dark Web Tour. What was once a figment of the imagination\, the Dark Web has evolved into an Amazon-ish shopping destination where nation-states\, hackers\, and even the most unsophisticated cyber criminals can purchase and barter for malware\, crime ware-as-a-service\, VIP emails and passwords\, credit card numbers\, bank accounts and more. \nObjectives covered: \n\nHow threat intelligence platforms collect threat intelligence from the clear\, deep and dark web to deliver contextual and tailored digital risk protection against emerging threats\nHow to automate threat intelligence to automate proactive defense\nHow crypto currency is being used extensively to monetize criminal activity\nWhich nation-states are expanding their Dark Web presence in an effort to keep up with national defenses\nWhy organizations of all sizes need to understand what is lurking on the Dark Web in order to properly protect against external and internal threats\nThis presentation is open to members and security professionals. This presentation is not intended for security vendors.\n\nSpeaker: Rick Garza\, Senior Sales Engineer for IntSights \nRick Garza is a Senior Sales Engineer for IntSights with 20 years of experience in the tech world\, 10 of which have been spent as an SE for various security vendors across multiple facets of the Cybersecurityindustry. \nClick for Dark Web Course Registration
URL:https://issa-centralmd.org/calendar/issa-dark-web-tour-workshop/
LOCATION:UMBC Training Centers\, 6996 Columbia Gateway Dr.\, Suite 100\, Columbia\, MD\, 21046\, United States
CATEGORIES:Training
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20191016T170000
DTEND;TZID=America/New_York:20191016T193000
DTSTAMP:20260403T132804
CREATED:20181217T022722Z
LAST-MODIFIED:20191016T225533Z
UID:2293-1571245200-1571254200@issa-centralmd.org
SUMMARY:Membership Meeting 10/16/2019
DESCRIPTION:Chapter Business Meeting Slides: 2019-10-16-Meeting-Presentation.pdf \nSpeaker Presentation: Taking a holistic approach to an insider threat program \nSpeaker Presentation: Security Operations Maturity Model (SOMM) \nISSA Central MD is hosting an event at the National Electronic Museum to celebrate National Cybersecurity Month. \nTopic: Taking a holistic approach to an insider threat program \nThis presentation will provide insider threat mitigation strategies for every phase of the employment life cycle\, including pre-employment screening; ongoing insider threat and security training; leveraging tools like Jazz Networks for user activity monitoring\, and finally what to watch out for when an employee is leaving the organization.  We will share anecdotes from public and private sector service experience\, highlighting vulnerable areas of the employee life cycle where an insider can become an active threat.  We will also provide a brief demonstration of the Jazz Networks insider threat and detection platform.\n \nSpeaker: Charles Finfrock\, Senior Threat Investigator\, Tesla \nCharles Finfrock is a Senior Threat Investigator in Tesla’s Security Intelligence Department\, the team responsible for protecting Tesla’s Intellectual Property and confidential business information from internal and external threats. Prior to joining Tesla\, Charles spent 18 years as an operations officer in the Central Intelligence Agency. Charles is also the head of Insider Threat at the Washington DC based\, Cyber Intelligent Partners\, a training and education company focused on helping companies develop programs to counter cyber threats\, regional threats\, and insider threats. \nTopic: Security Operations Maturity Model (SOMM) \nSOMM explores how to assess and evolve the principle programs of the security operations center (SOC): threat monitoring\, threat hunting\, threat investigation\, and incident response. LogRhythm developed the Threat Lifecycle Management (TLM) framework to help organizations ideally align technology\, people\, and process in support of these programs. The TLM framework defines the critical security operations technological capabilities and workflow processes that are vital to realize an efficient and effective SOC. LogRhythm’s SOMM helps organizations measure the effectiveness of their security operations\, and to mature their security operations capabilities. Using our TLM framework\, the SOMM provides a practical guide for organizations that wish to optimally reduce their mean time to detect (MTTD) and mean time to respond (MTTR) — thereby dramatically improving their resilience to cyberthreats. \nSpeaker: Darren Cathey\, Sr. Systems Engineer\, LogRhythm \nDarren Cathey has several decades of experience in programming\, operating systems\, and applications security. His multi-functional experience in engineering\, marketing and sales lends itself well to supporting both SMB and Enterprise customers in the Mid-Atlantic territory as a Sr. Systems Engineer. Past experience includes positions with HP\, Wind River Systems\, Arxan\, Vormetric and Varonis. \n5:15 – 5:45 (Chapter Business / Food / Networking) \n6:00 – 7:30 (Presentation / Q&A) \n7:30 – 9:00 (Exploring the museum on your own or with a guide) \nNote: The October Meeting will be at the National Electronic Museum to celebrate National Cybersecurity Month.
URL:https://issa-centralmd.org/calendar/membership-meeting-10-23-2019/
LOCATION:National Electronics Museum\, 1745 West Nursery Road\, Linthicum\, MD\, United States
CATEGORIES:Meetings
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20191014T000000
DTEND;TZID=America/New_York:20191014T000000
DTSTAMP:20260403T132804
CREATED:20160927T155331Z
LAST-MODIFIED:20160927T170825Z
UID:536-1571011200-1571011200@issa-centralmd.org
SUMMARY:Columbus Day
DESCRIPTION:
URL:https://issa-centralmd.org/calendar/columbus-day-9/
LOCATION:MD
CATEGORIES:Holidays
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20191008T080000
DTEND;TZID=America/New_York:20191008T100000
DTSTAMP:20260403T132804
CREATED:20190820T222219Z
LAST-MODIFIED:20191008T115401Z
UID:2775-1570521600-1570528800@issa-centralmd.org
SUMMARY:ISSA Central MD Breakfast Meeting 10/8/2019
DESCRIPTION:Chapter Business Meeting Slides: 2019-10-08-Meeting-Presentation.pdf \nTopic: A Security Walkthrough of IAM in Light of Data Breaches in the Cloud \nIdentity has become the new perimeter in the world of api-driven infrastructures (cloud computing).  Understanding the challenges and complexity of least privilege is critical to securing your organization against data breaches in the cloud. \nSpeaker: Jonathan Villa\, Practice Director\, Cloud Security at GuidePoint Security \nJonathan Villa has over 19 years of experience as a technology consultant including 17 years of working experience in the information security field. For over 10 years Jonathan consulted to a large municipality as a senior consultant in several competencies including PCI compliance and training\, web application architecture and security\, vulnerability assessments\, trained developers in secure coding\, web application firewall administration\, and co-architected and managed an automated continuous integration environment that included static and dynamic code analysis for over 150 applications deployed to several distinct environments and platforms. Jonathan has worked with virtualization and cloud technologies since 2005 and his main focus has been on cloud security since 2010. Jonathan has worked with clients across the USA\, in South America\, and Asia to design and implement secured public and hybrid cloud environments\, integrate security into continuous integration and continuous delivery methodologies\, develop custom security solutions using the AWS SDK\, and provide guidance to customers in understanding how to manage their environments under the Shared Responsibility Model. \n 
URL:https://issa-centralmd.org/calendar/issa-central-md-breakfast-meeting-10-8-2019/
LOCATION:HubSpot—The Gathering Place on the Gateway\, 6724 Alexander Bell Drive Hub Spot\, Suite 105\, Columbia\, MD\, 21046
CATEGORIES:Meetings
END:VEVENT
BEGIN:VEVENT
DTSTART;VALUE=DATE:20191007
DTEND;VALUE=DATE:20191008
DTSTAMP:20260403T132804
CREATED:20190923T003950Z
LAST-MODIFIED:20190923T004031Z
UID:2841-1570406400-1570492799@issa-centralmd.org
SUMMARY:2019 Infolock Golf Open
DESCRIPTION:Infolock’s founders are committed to supporting their employees and the community at large. We are incredibly excited that the 2019 Infolock Open meets both goals as we play to support 11q Research & Resource Group. 11q is managed by the spouse of one of Infolock’s long-time employees. Their family has been deeply affected by Jacobsen Syndrome for more than 20 years. \n  \nPlease join us on Monday\, October 7\, 2019 at the award-winning Laurel Hill Golf Club in Lorton\, VA for this meaningful event. Registration includes light breakfast\, range balls and greens practice\, 18-hole shotgun-start / scramble with on-course contests\, boxed lunch\, on-course refreshments\, and a final BBQ banquet with awards to wrap up the day. \n  \nTo register\, sponsor\, or learn more\, visit \nhttp://www.infolockopen.rsvpify.com
URL:https://issa-centralmd.org/calendar/2019-infolock-golf-open/
LOCATION:MD
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20190925T170000
DTEND;TZID=America/New_York:20190925T193000
DTSTAMP:20260403T132804
CREATED:20181217T022636Z
LAST-MODIFIED:20191019T131328Z
UID:2291-1569430800-1569439800@issa-centralmd.org
SUMMARY:Membership Meeting 9/25/2019
DESCRIPTION:Chapter Business Meeting Slides: 2019-09-25-Meeting-Presentation.pdf \nSpeaker Presentation: .govCAR: Threat Based Cyber Capability Review \nTopic: .govCAR: Threat Based Cyber Capability Review \nThe Cybersecurity and Infrastructure Security Agency (CISA) developed the .govCAR methodology to take a threat-based approach to cybersecurity risk management. .govCAR represents an evolution in managing cybersecurity —an advancement from the traditional consequence (compliance) and vulnerability (cyber hygiene) based approaches. This next-generation approach looks at cybersecurity capabilities the same way an adversary does to directly identify areas where mitigations should be applied for best defense. .govCAR creates opportunities for organizations to make their own threat-informed risk decisions and develop a prioritized approach to reducing risk to known threats. .govCAR is vendor agnostic and does not evaluate specific vendors or products. \nThe speaker will walk the audience through the concept of threat based architecture reviews and will discuss how cybersecurity threat framework and architectural cybersecurity capabilities come together to allow organizations to improve their cybersecurity posture. \nSpeaker: Branko S. Bokan\, Department of Homeland Security \nBranko Bokan is a Cybersecurity specialist with the Cybersecurity and Infrastructure Security Agency (CISA) at the Department of Homeland Security (DHS). In his role\, Branko assists federal agencies to adopt the .govCAR methodology. A proud holder of all three ISC2 CISSP concentrations (ISSAP\, ISSEP\, ISSMP)\, Branko also teaches cybersecurity as an adjunct professor at a local university.
URL:https://issa-centralmd.org/calendar/membership-meeting-9-25-2019/
LOCATION:MD
CATEGORIES:Meetings
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20190919T123000
DTEND;TZID=America/New_York:20190919T170000
DTSTAMP:20260403T132804
CREATED:20190828T014642Z
LAST-MODIFIED:20190828T014642Z
UID:2789-1568896200-1568912400@issa-centralmd.org
SUMMARY:MD Cyber Solutions Showcase
DESCRIPTION:Innovation Showcase ∙ Cybersecurity Product & Service Company Expo ∙ “Ask a Cyber Specialist” Information Stations ∙ Live Cyber Trivia ∙ Fireside Chat with Industry Experts ∙ Networking \nThe Maryland Cybersecurity Solutions Showcase is the single source for businesses\, government agencies and nonprofit organizations of every size in every industry to find: \n\nINFORMATION: get answers to cybersecurity questions\, help identifying cybersecurity risks and details on Maryland’s new cyber tax credit program from cyber specialists\nINNOVATION: discover some of Maryland’s most innovative cybersecurity technologies\nCONNECTIONS: with local solutions for cybersecurity as well as companies/organizations willing to share their cyber stories and strategies
URL:https://issa-centralmd.org/calendar/md-cyber-solutions-showcase/
LOCATION:MD
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20190902T000000
DTEND;TZID=America/New_York:20190902T000000
DTSTAMP:20260403T132804
CREATED:20160927T155331Z
LAST-MODIFIED:20160927T170825Z
UID:535-1567382400-1567382400@issa-centralmd.org
SUMMARY:Labor Day
DESCRIPTION:
URL:https://issa-centralmd.org/calendar/labor-day-9/
LOCATION:MD
CATEGORIES:Holidays
END:VEVENT
BEGIN:VEVENT
DTSTART;VALUE=DATE:20190829
DTEND;VALUE=DATE:20190830
DTSTAMP:20260403T132804
CREATED:20190619T021438Z
LAST-MODIFIED:20190619T021438Z
UID:2696-1567036800-1567123199@issa-centralmd.org
SUMMARY:SANS SEC511: Continuous Monitoring and Security Operations
DESCRIPTION:SEC511: Continuous Monitoring and Security Operations No network is impenetrable\, a\nreality that business executives and security professionals alike have to accept. Prevention is\ncrucial\, and we can’t lose sight of it as the primary goal. However\, a new proactive approach\nto security is needed to enhance the capabilities of organizations to detect threats that will\ninevitably slip through their defenses. SEC511 will teach you how to strengthen your skills to\nundertake that proactive approach. \nFor additional ionformation\, see the attached flier (Click Here). \n 
URL:https://issa-centralmd.org/calendar/sans-sec511-continuous-monitoring-and-security-operations-2/
LOCATION:MD
CATEGORIES:Miscellaneous
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20190828T170000
DTEND;TZID=America/New_York:20190828T193000
DTSTAMP:20260403T132804
CREATED:20181217T022545Z
LAST-MODIFIED:20190828T215416Z
UID:2289-1567011600-1567020600@issa-centralmd.org
SUMMARY:Membership Meeting 8/28/2019
DESCRIPTION:Chapter Business Meeting Slides: 2019-08-28-Meeting-Presentation.pdf \nSpeaker Presentation: Failing-at-Cybersecurity.pdf \nTopic: Fail Secure: 20 Ways to Undermine Your Security Program \nThere’s policy\, and then there’s reality. All too often\, security teams find their efforts overridden or bypassed. Here’s some unconventional wisdom and tips on how to engage your stakeholders and keep your program moving forward. \nSpeaker: Tom Hallewell\, VP of Programs and Event for the ISSA DC Chapter \nTom Hallewell works for the Government. He’s also VP of Programs for ISSA-DC.  He’s worked in just about every area of cybersecurity\, and has the scars to prove it.  Hopefully this talk will help you avoid getting them yourself.  Tom Hallewell is the VP of Programs and Event for the ISSA DC Chapter \nPlease Note: \n\nDeadline to register is August 26th at 5 PM.\nChapter & ISSA member’s ticket: FREE\nGuest tickets: $15 if registered by 5 PM on August 26th. Otherwise\, $20 at the door (cash or credit card). Refunds available until August 26th at 5pm.\n\nAgenda: \n5:15 – 5:45 Chapter Business Meeting \n6:00 – 7:30 Speaker and Q&A
URL:https://issa-centralmd.org/calendar/membership-meeting-8-28-2019/
LOCATION:MD
CATEGORIES:Meetings
END:VEVENT
BEGIN:VEVENT
DTSTART;VALUE=DATE:20190803
DTEND;VALUE=DATE:20190809
DTSTAMP:20260403T132804
CREATED:20190701T122323Z
LAST-MODIFIED:20190701T122323Z
UID:2720-1564790400-1565308799@issa-centralmd.org
SUMMARY:Black Hat
DESCRIPTION:  \n  \nRegister Now for Black Hat USA and Save!  \nBlack Hat USA will take place August 3-8\, 2019 at the Mandalay Bay Convention Center\, offering the largest lineup of content and features to date. Deeply technical\, hands-on Trainings led by the information security industry’s top trainers\, will span a variety of topics from infrastructure hacking to social engineering and car hacking. For information on the available courses\, check out the Trainings lineup. \nBlack Hat USA Briefings will present the latest security research\, Wednesday\, August 7 and Thursday\, August 8. View all announced Briefings abstracts and save $200 when you register for your Briefings pass with code 19issa1. Don’t miss the opportunity to expand your knowledge and network during the biggest week in InfoSec! \n  \n \nIf you have any questions please contact memberservices@issa.org We hope to see you in Las Vegas!
URL:https://issa-centralmd.org/calendar/black-hat/
LOCATION:MD
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20190724T170000
DTEND;TZID=America/New_York:20190724T193000
DTSTAMP:20260403T132804
CREATED:20181217T022447Z
LAST-MODIFIED:20190729T120043Z
UID:2287-1563987600-1563996600@issa-centralmd.org
SUMMARY:Membership Meeting 7/24/2019
DESCRIPTION:Chapter Business Meeting Slides: 2019-07-24-Meeting-Presentation.pdf \nSpeaker Presentation: Attackers-Prey-on-Uncertainty_ISSA-Central-MD.pdf \nTopic: Attackers Prey on Uncertainty: How to Fail at Threat Detection\n \nIt takes a lot of visibility and context to detect and respond to sophisticated threats. Attackers usually target data\, where enterprises have the least visibility and most uncertainty. In this session\, we’ll explore new\, sophisticated threats from inside and out\, demonstrate how easy it is for adversaries to bypass traditional controls\, and present a methodology to better protect data at scale\, improve threat detection\, and reduce uncertainty. \nSpeaker: Courtney Chau\, System Engineer at Varonis \nBringing a diverse business and technical skill set\, Courtney Chau has had the privilege of working with an elite list of clientele in the Cyber Security & Information Technology sector. Courtney’s commitment to continued learning and academic excellence provided the opportunity for a year of early completion at Virginia Tech with a B.S. in Business Information Technology\, summa cum laude\, and minor in Applied Business Computing. Courtney embarked on her professional journey in IT Risk Assurance at the multinational professional services network firm PricewaterhouseCoopers (PwC)\, providing superior client relationship management to cultivate efficient and innovative business solutions. She collaborated with multiple teams\, inter-company lines of service\, clients\, and client third-party service organizations for multiple projects regarding interfaces/configurations\, key reports\, SDLC\, and other IT general controls. Following this\, Courtney served Darktrace as a Cyber Defense Technology Specialist to manage deployments and incident responses\, ranging from small business to global firms across a variety of industries. She mentored a team of engineers and holds substantial experience covering a global territory. Presently\, she works with Varonis to serve the data security needs of large enterprise customers. \nPlease Note: \n\nDeadline to register is July 22nd at 5 PM.\nChapter & ISSA member’s ticket: FREE\nGuest tickets: $15 if registered by 5 PM on July 22nd. Otherwise\, $20 at the door (cash or credit card). Refunds available until July 22nd at 5pm.\n\nAgenda: \n5:15 – 5:45 Chapter Business Meeting \n6:00 – 7:30 Speaker and Q&A
URL:https://issa-centralmd.org/calendar/membership-meeting-7-24-2018/
LOCATION:MD
CATEGORIES:Meetings
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20190704T000000
DTEND;TZID=America/New_York:20190704T000000
DTSTAMP:20260403T132804
CREATED:20160927T155331Z
LAST-MODIFIED:20160927T170825Z
UID:534-1562198400-1562198400@issa-centralmd.org
SUMMARY:Independence Day
DESCRIPTION:
URL:https://issa-centralmd.org/calendar/independence-day-8/
LOCATION:MD
CATEGORIES:Holidays
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20190626T170000
DTEND;TZID=America/New_York:20190626T193000
DTSTAMP:20260403T132804
CREATED:20181217T022354Z
LAST-MODIFIED:20190701T123836Z
UID:2285-1561568400-1561577400@issa-centralmd.org
SUMMARY:Membership Meeting 6/26/2019
DESCRIPTION:Chapter Meeting Registration  \nPlease note the new meeting Location: Hub Spot\, 6724 Alexander Bell Drive\, Suite 105\, Columbia\, MD 21046\,  \nChapter Business Meeting Slides: 2019-06-26-Meeting-Presentation \nSpeaker Presentation: Crafting a DLP Program \nTopic: Data Loss Prevention Essentials \nA how-to primer on overcoming organizational challenges to implement a successful Data Loss Prevention program. \nAdvances in technology have prompted a rapid evolution of business processes over the last two decades. Along with the benefits provided to organizations\, these advances have brought about new types of risks. Data has become the lifeblood of organizations\, yet many do not know what data they have\, what is important\, or how it is being used. \nA Data Loss Prevention program provides insight into these new risks\, but organizations are often ill-equipped to respond to this new information or manage the associated risks. \nInfolock’s Director of Advisory Services\, Ryan Dobbins\, will discuss the three main areas required for a successful implantation: \n\nGovernance: The organizational articulation of what data is important and how it is measured\nVisibility: The technical ability to make informed decisions\nProtection: The enforcement of organization risk tolerance\n\nA successful DLP program supports and informs organizational leadership as they manage data risk and minimize the occurrence and impact of data incidents. Attendees will leave this presentation with an understanding of how to turn DLP technology into a holistic program to reduce organizational risks. \nSpeaker: Ryan Dobbins\, Director of Advisory Services\, Infolock \nRyan Dobbins is Infolock’s Director of Advisory Services and helped develop the Data Risk Management Framework (DRMF). A graduate of James Madison University\, Mr. Dobbins holds the SANS GSLC certification and is active in the Governance\, Risk\, and Compliance (GRC) community where he offers his expertise on topics such as: \n\nStrategic Data Governance\nAligning Compliance Goals with Real Security\nReducing Enterprise Risk with Data Loss Prevention\nHow to Use a Control Framework to Build a Security Program\n\nIn addition to his work at Infolock\, Mr. Dobbins was a featured speaker at VA HIMSS (2017)\, the AMC Security Conference (2017)\, the NCHICA Conference (2016)\, and the AMC Conference (2016). Prior to Infolock\, Mr. Dobbins developed and managed the information security program at a multi-billion-dollar healthcare enterprise\, including its GRC system and Security Operations Center. In this role\, Mr. Dobbins and his team worked to detect\, respond to\, and report on technical security issues. During this time\, they responded to internal and external security audits\, formed business relationships with various organizational units and provided corporate\nguidance on security related issues. The results of their findings were scored against HITRUST and internal policies and added to the GRC system for risk-tracking and remediation. Later\, these results were published to a wide audience across a number of formats\, including\nexecutive dashboards and technician remediation paths. \nPlease note new meeting schedule – June 2019 \n5:15 – 5:45 Chapter Business Meeting \n6:00 – 7:30 Speaker and Q&A \nChapter Meeting Registration
URL:https://issa-centralmd.org/calendar/membership-meeting-6-26-2019/
LOCATION:HubSpot—The Gathering Place on the Gateway\, 6724 Alexander Bell Drive Hub Spot\, Suite 105\, Columbia\, MD\, 21046
CATEGORIES:Meetings
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20190527T000000
DTEND;TZID=America/New_York:20190527T000000
DTSTAMP:20260403T132804
CREATED:20160927T155331Z
LAST-MODIFIED:20160927T170825Z
UID:533-1558915200-1558915200@issa-centralmd.org
SUMMARY:Memorial Day
DESCRIPTION:
URL:https://issa-centralmd.org/calendar/memorial-day-8/
LOCATION:MD
CATEGORIES:Holidays
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20190522T170000
DTEND;TZID=America/New_York:20190522T193000
DTSTAMP:20260403T132804
CREATED:20181217T022300Z
LAST-MODIFIED:20190523T112701Z
UID:2283-1558544400-1558553400@issa-centralmd.org
SUMMARY:Membership Meeting 5/22/2019
DESCRIPTION:Please note the new meeting Location: Hub Spot\, 6724 Alexander Bell Drive\, Suite 105\, Columbia\, MD 21046\,  \nTopic: RMF 2.0 for non-Federal Users \nMembership Meeting Slides: 2019-05-22 Meeting Presentation \nSpeaker Presentation: Risk Management for non-Federal Users \nLearning objectives\n1) Understanding of the NIST Risk Management Framework\n2) Briefing on the updates to Revision 2.0 of NIST 800-37\n3) Walk through of a fictitious Federal Agency system undergoing the RMF process \nThe target audience are those who have not yet dealt with the NIST RMF and would like to understand the various components and how it would apply to a specific computer system. The talk will start with the steps included in the RMF process and will end with the review of the controls within one or two control families. \nSpeaker: Joe Klein\, Mitre \nJoe Klein is a +30-year veteran of the IT\, IA\, IoT and IO domains\, with extensive experience in DoD\, US Government\, and commercial sectors. He has a long history of speaking at Computer Science\, Technology\, Security and Hacker conferences on topics such as IPv6\, Time Hacking\, Auto Hacking\, Physical Security\, Risk Management\, IoT Security\, Cybersecurity as a Business advantage\, and success in your security career. National and international speaking venues include Defcon\, BlackHat\, BSidesDC\, ISSA events\, ITU\, InfraGard\, TorCon\, SecTor\, and Security Days. \nHe also contributes his talent to standards and practices at NIST\, DoD\, SPAWAR\, IEEE\, and IETF. \nPlease note new meeting schedule – May 2019\n5:15 to 5:45 Business Meeting\n5:45 to 6:15 Networking and Dinner\n6:15 to 7:45 Speaker and Q&A \n 
URL:https://issa-centralmd.org/calendar/membership-meeting-5-22-2019/
LOCATION:HubSpot—The Gathering Place on the Gateway\, 6724 Alexander Bell Drive Hub Spot\, Suite 105\, Columbia\, MD\, 21046
CATEGORIES:Meetings
END:VEVENT
BEGIN:VEVENT
DTSTART;VALUE=DATE:20190425
DTEND;VALUE=DATE:20190426
DTSTAMP:20260403T132804
CREATED:20190204T190724Z
LAST-MODIFIED:20190204T190724Z
UID:2535-1556150400-1556236799@issa-centralmd.org
SUMMARY:SANS Hacker Tools\, Techniques\, Exploits\, and Incident Handling
DESCRIPTION:SANS Hacker Tools\, Techniques\, Exploits\, and Incident Handling\nThe Internet is full of powerful hacking tools and bad guys using them extensively. If your organization has an Internet connection or one or two disgruntled employees (and whose doesn’t!)\, your computer systems will get attacked. From the five\, ten\, or even one hundred daily probes against your Internet infrastructure to the malicious insider slowly creeping through your most vital information assets\, attackers are targeting your systems with increasing viciousness and stealth. As defenders\, it is essential we understand these hacking tools and techniques. \nFor additional information and to register\, click HERE
URL:https://issa-centralmd.org/calendar/sans-hacker-tools-techniques-exploits-and-incident-handling/
LOCATION:MD
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20190424T170000
DTEND;TZID=America/New_York:20190424T193000
DTSTAMP:20260403T132804
CREATED:20181217T022201Z
LAST-MODIFIED:20190515T164644Z
UID:2281-1556125200-1556134200@issa-centralmd.org
SUMMARY:Membership Meeting 4/24/2019
DESCRIPTION:Membership Meeting Slides: 2019-04027 Meeting Presentation \nSpeaker Presentation: Intro to Cyber Insurance \nTopic: Intro to Cyber Insurance \nCyber risk management is something that continues to evolve with the threat landscape as well as innovations in processes and technology. One of these new innovations is the emergence of cyber insurance. While it is new in terms of insurance products it has been around for several years and is quickly developing into something that many commercial organizations are starting to consider. The purpose of this presentation is to provide an overview of the cyber insurance marketplace\, the underwriting process and a shallow dive into the coverage provided by a typical policy. \nSpeaker: MICHAEL VOLK\, VP\, CYBER RISK SOLUTIONS\, PSA INSURANCE \nAs the lead for PSA’s Cyber Risk Solutions Practice\, Mike Volk is responsible for helping clients make informed decisions about cyber insurance and develop strategies to reduce cyber risk. For the past eight years he has worked in several roles where he helped individuals and organizations navigate the complex cybersecurity landscape. Mike is engaged in the cybersecurity community and currently serves on the Board of Directors for the Cybersecurity Association of Maryland\, Inc. (CAMI). Prior to joining PSA\, Mike worked with individual job-seekers\, industry experts\, as well as government organizations and contractors in areas related to cybersecurity training and workforce development. He has authored several articles on topics related to cyber risk\, cybersecurity education/training and cybersecurity workforce development. Mike contributed to Anne Arundel Community College as the Business Development Coordinator for the CyberCenter and Instructional Specialist for the Cyber and Technology Training area. He also served as the Cybersecurity Navigator and Project Coordinator for the Mayor’s Office of Employment Development in Baltimore City. \nPlease note new meeting schedule – February 2019\n5:15 to 5:45 Business Meeting\n5:45 to 6:15 Networking and Dinner\n6:15 to 7:45 Speaker and
URL:https://issa-centralmd.org/calendar/membership-meeting-4-24-2019/
LOCATION:MD
CATEGORIES:Meetings
END:VEVENT
BEGIN:VEVENT
DTSTART;VALUE=DATE:20190418
DTEND;VALUE=DATE:20190419
DTSTAMP:20260403T132804
CREATED:20190204T194828Z
LAST-MODIFIED:20190204T194828Z
UID:2537-1555545600-1555631999@issa-centralmd.org
SUMMARY:SANS Network Penetration Testing and Ethical Hacking
DESCRIPTION:SANS Network Penetration Testing and Ethical Hacking \nAs a cybersecurity professional\, you have a unique responsibility to find and understand your organization’s vulnerabilities and to work diligently to mitigate them before the bad guys pounce. Are you ready? SEC560\, the flagship SANS course for penetration testing\, fully arms you to address this duty head-on. \nFor additional details or to register for this class\, click HERE.
URL:https://issa-centralmd.org/calendar/sans-network-penetration-testing-and-ethical-hacking/
LOCATION:MD
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20190417T170000
DTEND;TZID=America/New_York:20190417T190000
DTSTAMP:20260403T132804
CREATED:20190326T184203Z
LAST-MODIFIED:20190404T001511Z
UID:2600-1555520400-1555527600@issa-centralmd.org
SUMMARY:ISSA Central MD Networking & Social Sponsored By Varonis
DESCRIPTION:Click Here to Register \n\nWhen: Wednesday\, April 17th from 5:00 – 7:00 PM EST\nLocation: Hysteria Brewing Company\, 9570 Berger Rd Suite J\, Columbia\, MD 21046\n\nClick Here to Register
URL:https://issa-centralmd.org/calendar/issa-central-md-networking-beer-social-sponsored-by-varonis/
LOCATION:Hysteria Brewing Company\, 9570 Berger Rd Suite J\, Columbia\, MD\, 21044
END:VEVENT
BEGIN:VEVENT
DTSTART;VALUE=DATE:20190402
DTEND;VALUE=DATE:20190403
DTSTAMP:20260403T132804
CREATED:20190321T000205Z
LAST-MODIFIED:20190321T000205Z
UID:2594-1554163200-1554249599@issa-centralmd.org
SUMMARY:SIM Philadelphia Technology Leadership Summit
DESCRIPTION:Join Innovative Thought Leaders from around the country sharing their real experiences and hundreds of your peers for a day of Networking\, Collaboration and Knowledge-Transfer \n\nYour Admission Gets You: \n– Opportunity to see world-class keynote speakers with real-life experiences: \nGreg Hiebert\, Managing Partner\, Leadership Forward  \nJulie Rieger\, President\, Chief Data Strategist & Head of Media\, 20th Century Fox Film– \nUnlimited access to all 16 breakout sessions \nAccess to an interactive learning experience with our sessions featuring: \nDigital Transformation • Economic Forecasts • Security & Risk • Leveraging Data \nBoard Pursuit • Large-Scale M&A • Innovative Tech Discussions \n– Opportunity to network with hundreds of local IT executives \n– Hot breakfast\, lunch and bottomless cups of coffee to fuel your day! \n\nRegister yourself & your team Today For FREE! \nwww.simphillysummit.org
URL:https://issa-centralmd.org/calendar/sim-philadelphia-technology-leadership-summit/
LOCATION:MD
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20190327T170000
DTEND;TZID=America/New_York:20190327T193000
DTSTAMP:20260403T132804
CREATED:20181217T022110Z
LAST-MODIFIED:20190402T170004Z
UID:2279-1553706000-1553715000@issa-centralmd.org
SUMMARY:Membership Meeting 3/27/2019
DESCRIPTION:Chapter Business Meeting Slides: 2019-03-27-Meeting-Presentation \nTopic: An Update on Deep Content Inspection and DLP for Government \nDeep Content Inspection!  OK right\, but what is Deep Content Inspection?  Is it the ability to work in highly regulated federal agencies?  Is it working with other vendors to ensure that file transfers are reviewed prior to allowing? Or ensuring that data transfers to removable media drives do not contain sensitive information? Is it automatically encrypting email messages that contain sensitive information in them? How about all of the above?  Today\, advanced security and data loss prevention features are needed to combat information borne threats across a wide range of technologies. \nSpeaker: Scott Messick\, Senior Sales Engineer with Clearswift  \nScott Messick is a Senior Sales Engineer with Clearswift based in New Jersey. In this role he works with the largest Clearswift customers and prospects across North and South America. Scott joined Clearswift about two years ago\, after 12 years with Credit Agricole Corporate Investment Bank (CA-CIB). While with Credit Agricole\, Scott was a Windows Technical Lead\, a Windows Platform Engineer\, a Windows Platform Group Manager and was promoted to Vice President. Scott also served on the IT and IT Security Management Committees that oversaw all North and South America IT and IT Security infrastructure operations for the Bank. \nPlease note new meeting schedule – February 2019\n5:15 to 5:45 Business Meeting\n5:45 to 6:15 Networking and Dinner\n6:15 to 7:45 Speaker and Questions
URL:https://issa-centralmd.org/calendar/membership-meeting-3-27-2019/
LOCATION:UMBC Training Centers\, 6996 Columbia Gateway Dr.\, Suite 100\, Columbia\, MD\, 21046\, United States
CATEGORIES:Meetings
END:VEVENT
BEGIN:VEVENT
DTSTART;VALUE=DATE:20190310
DTEND;VALUE=DATE:20190311
DTSTAMP:20260403T132804
CREATED:20190207T182825Z
LAST-MODIFIED:20190207T183414Z
UID:2545-1552176000-1552262399@issa-centralmd.org
SUMMARY:Girl Power STEM Event at JHUAPL
DESCRIPTION:APL hosts Girl Power\, a STEM expo for elementary and middle school students\, with support from the Maryland Space Business Roundtable. The annual event features hands-on activities\, cool demonstrations\, and take-home material for the students to encourage an interest in STEM careers. Visitors have the opportunity to talk to professional women in STEM careers such as aerospace\, computer science\, electrical engineering\, geology\, information technology\, and space mission engineering. You can find more information by clicking on the flyer @ https://www.jhuapl.edu/STEM/Content/docs/GirlPower2019Flyer.pdf.  The event is free and no registration is required. Girl Power is scheduled for March 10\, 2019.
URL:https://issa-centralmd.org/calendar/girl-power-stem-event-at-jhuapl/
LOCATION:MD
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20190227T170000
DTEND;TZID=America/New_York:20190227T193000
DTSTAMP:20260403T132804
CREATED:20181217T022018Z
LAST-MODIFIED:20190319T232821Z
UID:2277-1551286800-1551295800@issa-centralmd.org
SUMMARY:Membership Meeting 2/27/2019
DESCRIPTION:Meeting Presentation: 2019-02-27 Meeting Presentation \nSpeaker Presentation: Hacking Social Media – ZeroFOX \n\n\nSocial Media Protection For Dummies: Download free book\, click HERE. \nTopic: What is Social Media Security? \nSocial media security is the process of analyzing dynamic social media data in order to protect against security and business threats.. Every industry faces a unique set of risks on social\, many of which have put organizations in the press or at the center of controversy. \nSpeaker: Christopher Cullison\, VP Emerging Technologies @ ZeroFOX \nCo-founder of ZeroFOX and Vice President of Emerging Technologies\, has over 16 years of experience in the software industry. Christopher has worked with and managed large scale applications for Fortune 50 corporations\, specializing in advanced enterprise architecture solutions. His expertise includes reverse engineering\, code inspection\, dynamic integrations\, and cyber-security. Chris has worked as a consulting expert in patent litigation\, specializing in patent and prior art analysis. Besides holding multiple coding and security certifications\, he speaks regularly about innovative coding at security conferences. Chris has a Bachelors in Business Information Systems from Stevenson University. \nPlease note new meeting schedule – February 2019\n5:15 to 5:45 Business Meeting\n5:45 to 6:15 Networking and Dinner\n6:15 to 7:45 Speaker and Q&A
URL:https://issa-centralmd.org/calendar/membership-meeting-2-27-2019/
LOCATION:MD
CATEGORIES:Meetings
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20190218T000000
DTEND;TZID=America/New_York:20190218T000000
DTSTAMP:20260403T132804
CREATED:20160927T155330Z
LAST-MODIFIED:20160927T170825Z
UID:532-1550448000-1550448000@issa-centralmd.org
SUMMARY:Presidents Day (Washingtons Birthday)
DESCRIPTION:
URL:https://issa-centralmd.org/calendar/presidents-day-washingtons-birthday-8/
LOCATION:MD
CATEGORIES:Holidays
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20190124T084500
DTEND;TZID=America/New_York:20190124T154500
DTSTAMP:20260403T132804
CREATED:20190103T121619Z
LAST-MODIFIED:20190103T121619Z
UID:2392-1548319500-1548344700@issa-centralmd.org
SUMMARY:Infragard Cybersecurity Conference
DESCRIPTION:InfraGard Md will be hosting its inaugural Cyber Security event. The theme of this event is Cyber Incident Response. This event will be open to the public and you do not need to be an InfraGard Member to attend. \nInfraGard is a partnership between the FBI and members of the private sector. The InfraGard program provides a vehicle for seamless public-private collaboration with government that expedites the timely exchange of information and promotes mutual learning opportunities relevant to the protection of Critical Infrastructure. With thousands of vetted members nationally\, InfraGard’s membership includes business executives\, entrepreneurs\, military and government officials\, computer professionals\, academia and state and local law enforcement; each dedicated to contributing industry specific insight and advancing national security. Audience – Government and private sector employees\, CISOs\, InfraGard members (currently over 1000 in chapter)\, fusion centers\, state\, county\, local law enforcement. \nPurpose: Raise Cybersecurity awareness within the Maryland Community \nSession Topics: \n\nBe aware of cyber threats to Maryland organizations.\nProvide incident response and “what do I do now” scenarios.\nHelp participants understand the lifecycle of threats\, protection\, and business risk.\nCyber hygiene\nOverall training and education\n\nDesired speaker types: IT Security and CISO\, Business executives not in cyber\, Resilience\, gov\, law enforcement\, legislators. \nGoals: \n\nProvide high-demand cyber content to Maryland community\nInform community on Threats and Trends\nProvide usable pathways for action\nAnswer unanswered questions about security\nCreate engagement between industry\, government and InfraGard
URL:https://issa-centralmd.org/calendar/infragard-cybersecurity-conference/
LOCATION:Riggs Alumni Center – University of Maryland
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20190123T170000
DTEND;TZID=America/New_York:20190123T193000
DTSTAMP:20260403T132804
CREATED:20181217T021913Z
LAST-MODIFIED:20190123T231913Z
UID:2275-1548262800-1548271800@issa-centralmd.org
SUMMARY:Membership Meeting 1/23/2019
DESCRIPTION:Meeting Presentation: 2019-01-23 Meeting Presentation \nSpeaker Presentation: What is Cyber Threat Intelligence? \nJohn Stoner and Ronnie Obenhaus will present on how gathering threat intelligence data is necessary to combat various threat actors from nation states.  Threat intelligence solutions gather raw data about emerging or existing threat actors and threats from a number of sources. CTI data is  analyzed and filtered to produce threat intelligence feeds and management reports that contain information that can be used by automated security control solutions. The primary purpose of this type of security is to keep organizations informed of the risks of advanced persistent threats\, zero-day threats and exploits\, and how to protect against them. \nSpeaker: John Stoner & Ronnie Obenhaus \nCyber Threat Intelligence Analyst John Stoner has over 18 years of experience in the national security and defense sector working a variety of roles\, including most recently as a Cyber Threat Intelligence Analyst\, Cyber Counterintelligence Analyst and Cyber Instructor. His work experience includes IT\, instruction and course design\, cyber exercise and testing\, penetration testing\, intelligence collection\, threat support\, SIGINT (Signals Intelligence)\, and Cyber Operations. He holds A+\, Net+\, CEH\, CHFI\, CEI\, CISD\, CASP and CISSP and a Computer Studies degree from UMUC. He is a huge soccer fan and coaches youth soccer. You may see his Zombie response car at unnamed government facilities. By secretly joining the Army at 19 years old\, he got started in military intelligence and then eventually government cybersecurity. \nCyber Threat Intelligence Analyst Ronnie Obenhaus is a US Army Veteran and is not good at providing additional facts for his bio. He is married and has several children (amount variable). He may or may not have pets\, but seems to like dogs. He currently is a DOD civilian at a federal cyber agency. \nAgenda: \n\n5:15 – 5:45 (Chapter Business)\n5:45 – 6:15 (Food / Networking)\n6:15 – 7:15 (Presentation / Q&A)
URL:https://issa-centralmd.org/calendar/membership-meeting-1-23-2019/
LOCATION:UMBC Training Centers\, 6996 Columbia Gateway Dr.\, Suite 100\, Columbia\, MD\, 21046\, United States
CATEGORIES:Meetings
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20190121T000000
DTEND;TZID=America/New_York:20190121T000000
DTSTAMP:20260403T132804
CREATED:20160927T155330Z
LAST-MODIFIED:20160927T170826Z
UID:531-1548028800-1548028800@issa-centralmd.org
SUMMARY:Martin Luther King Jr. Day
DESCRIPTION:
URL:https://issa-centralmd.org/calendar/martin-luther-king-jr-day-8/
LOCATION:MD
CATEGORIES:Holidays
END:VEVENT
END:VCALENDAR