BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//Central Maryland Chapter of ISSA - ECPv6.15.18//NONSGML v1.0//EN
CALSCALE:GREGORIAN
METHOD:PUBLISH
X-ORIGINAL-URL:https://issa-centralmd.org
X-WR-CALDESC:Events for Central Maryland Chapter of ISSA
REFRESH-INTERVAL;VALUE=DURATION:PT1H
X-Robots-Tag:noindex
X-PUBLISHED-TTL:PT1H
BEGIN:VTIMEZONE
TZID:America/New_York
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20190310T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20191103T060000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20200308T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20201101T060000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20210314T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20211107T060000
END:STANDARD
END:VTIMEZONE
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20200519T170000
DTEND;TZID=America/New_York:20200519T200000
DTSTAMP:20260403T153019
CREATED:20200210T034533Z
LAST-MODIFIED:20200210T034533Z
UID:3129-1589907600-1589918400@issa-centralmd.org
SUMMARY:Spring 2020 CISSP Study Group
DESCRIPTION:ISSA Central Maryland is pleased to announce the opening of registration for our Spring 2020 session of the CISSP Study Group.  As you may know\, we conduct these study groups twice a year (Spring and Fall) in order to provide access to high-quality\, low-priced resources to further the Information Security profession\, and help our community members meet the compliance requirements outlined in DoD 8570.01.  At just $450.00\, our study group sessions are highly affordable even for those who are not reimbursed for educational expenses.
URL:https://issa-centralmd.org/calendar/spring-2020-cissp-study-group-14/
LOCATION:UMBC Training Centers\, 6996 Columbia Gateway Dr.\, Suite 100\, Columbia\, MD\, 21046\, United States
CATEGORIES:Training
END:VEVENT
BEGIN:VEVENT
DTSTART;VALUE=DATE:20200525
DTEND;VALUE=DATE:20200526
DTSTAMP:20260403T153019
CREATED:20160927T155332Z
LAST-MODIFIED:20160930T130147Z
UID:543-1590364800-1590451199@issa-centralmd.org
SUMMARY:Memorial Day
DESCRIPTION:
URL:https://issa-centralmd.org/calendar/memorial-day-9/
LOCATION:MD
CATEGORIES:Holidays
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20200527T170000
DTEND;TZID=America/New_York:20200527T193000
DTSTAMP:20260403T153019
CREATED:20191214T142322Z
LAST-MODIFIED:20200527T214939Z
UID:2972-1590598800-1590607800@issa-centralmd.org
SUMMARY:Membership Meeting 5/27/2020
DESCRIPTION:Chapter Business Meeting Slides: 2020-05-27 Meeting Presentation \nMeeting Sponsor Slides: Semperis AD Recovery and Protection – 2020-05-27 \nSpeaker Slides: Bricata SOAR Presentation – Carl Bolterstein 2020-05-27 \nPresentation Title: SOARing into Netsec \nTraditional methods of security event management create a constant struggle to keep up with the large volumes of data produced by siloed\, highly specialized tools. This segmentation and siloing of capabilities produce a huge manual workload on already over worked and under resourced security operation staffs. \nBridging this gap in analyst and security tool capacity is the concept of security orchestration\, automation and response (SOAR). This methodology and toolset allow for cybersecurity tools to react to alerts and incidents automatically to enhance productivity. It is the process and the underlying perspectives and ideas that will be discussed during this presentation. \nSpeaker Bio: Carl Bolterstein\, Senior Solutions Engineer at Bricata \nCarl is an experienced Solution Architect and Engineer in cybersecurity. He has spent the last seven years focused on network and data cyber analysis. He has worked in the public and private sector with a wide range of customers from small business to large enterprise in the engineering and analyst capacity. He currently serves as a Senior Solutions Engineer at Bricata. \nNote: Due to the COVID-19 Coronavirus\, the May General Membership meeting will only be provided virtually via GoToWebinar. There will be no in-person meeting. \nThe May Membership Meeting is sponsored by \n \n 
URL:https://issa-centralmd.org/calendar/membership-meeting-5-27-2020/
LOCATION:Virtual
CATEGORIES:Meetings
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20200624T170000
DTEND;TZID=America/New_York:20200624T193000
DTSTAMP:20260403T153019
CREATED:20191214T142457Z
LAST-MODIFIED:20200722T102622Z
UID:2974-1593018000-1593027000@issa-centralmd.org
SUMMARY:Membership Meeting 6/24/2020
DESCRIPTION:Click HERE to Register for the June 2020 Virtual Meeting \nChapter Business Meeting Slides: 2020-06-24-Meeting-Presentation.pdf \nSpeaker Slides: TBD \nTopic: Cybersecurity Maturity Model Certification (CMMC) – A New\, Required DoD Cybersecurity Standard \nOn January 31\, 2020\, the DoD published a new cybersecurity standard which will be required beginning in spring\, 2020 for new acquisitions awarded to contractors who do business with DoD.  The Cybersecurity Maturity Model Certification (CMMC) framework consists of 17 domains\, five processes across five levels to measure maturity\, and 171 practices across five levels to measure technical capabilities.  DoD Program Manager’s will determine what level of maturity required to bid on new RFIs and RFPs based upon the sensitivity of the data in the contract.  Maturity Levels range from Level 1\, Basic Cyber Hygiene which is performed on an ad hoc basis up to Level 5\, Advanced / Progressive cybersecurity capabilities performed with optimized maturity.  Level 3 will be required for all future DoD acquisitions where basic Controlled Unclassified Information (CUI) will be part of the performance of the contract. \nCMMC will be implemented on a crawl\, walk\, run basis over the course of the next five years.  This spring the Accreditation Body will begin to train C3PAO organizations to certify companies.  The DoD will train their Program Managers.  Starting in June\, a few select contracts will be identified with CMMC requirements in RFIs. This fall\, CMMC requirements will appear in a few select RFPs.  The execution of a new contract will require that prime contractor and their subcontractors to achieve the appropriate level of CMMC called upon in the contract.  While details are still evolving\, it is important to prepare now!  Come learn more about these new requirements and how to get started. \nSpeaker: Dawn M Greenman\, Deputy Program Manager Cybersecurity for Johns Hopkins Applied Physics Laboratory (JHU/APL) \nDawn M Greenman is Deputy Program Manager Cybersecurity for Johns Hopkins Applied Physics Laboratory (JHU/APL).  In this position\, she oversees cybersecurity projects across the organization and assists in the oversight of JHU/APL’s cyber operations\, security engineering\, and IT compliance functions. \nOver the past 25 years\, Ms. Greenman has held positions of increasing responsibility in information technology and cybersecurity\, working for companies small to large. In 2017\, Dawn lead JHU/APL to compliance with DFARS 7012 and NIST SP 800-171.  During this time\, she recognized the struggle small organizations were having with compliance requirements and also understood compliance alone was not enough.  She started to participate in external projects and lead working groups with DoD and industry to develop strategies to improve the protection of controlled unclassified information. \nMore recently\, passionate to improve the security of the DoD supply chain\, Ms. Greenman eagerly accepted a role as Outreach Lead for the DoD Office of Sustainment and Acquisition’s Cybersecurity Maturity Model Certification (CMMC) project.  The Cybersecurity Maturity Model\, developed by JHU/APL and SEI/CERT\, delivered DoD a new common standard in cybersecurity in January 2020.  She will continue to participate in efforts to implement this new standard which will begin to be required by all defense contractors doing business with DoD as early as this summer. \nMs. Greenman holds an undergraduate degree in Information Systems with a concentration in Homeland Security.  In July 2019\, she graduated with an Executive Masters of Business Administration from The University of Maryland Robert H. Smith School Of Business.  She is a Certified Information Security Professional (CISSP) and holds the GIAC Security Essentials (GSEC) certification. \nClick HERE to Register for the June 2020 Virtual Meeting
URL:https://issa-centralmd.org/calendar/membership-meeting-6-24-2020/
LOCATION:MD
CATEGORIES:Meetings
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20200625T120000
DTEND;TZID=America/New_York:20200625T170000
DTSTAMP:20260403T153019
CREATED:20200628T124856Z
LAST-MODIFIED:20200628T124856Z
UID:3307-1593086400-1593104400@issa-centralmd.org
SUMMARY:Living Security's Breaking Security Awareness Digital Conference
DESCRIPTION:Living Security just announced the launch of “Breaking Security Awareness\,” a digital conference to help technology leaders develop a customized solution for their organization! During this conference\, leaders will learn action steps in: \n\nDeveloping a gamified solution that resonates across their organization\nPhishing Scams and how to change behavior that minimizes risk\nLearning Diversity in Security Awareness. This isn’t a one-size-fits-all solution\, but it doesn’t have to be complicated either.\nMetrics that drive outcomes and creating the data needed to do this\n\nThe conference will take place Thursday\, June 25\,2020 12:00pm – 5:00pm EST. Be sure to stick around afterwards for a Security Improv Show 5:30-6:30pm which will be fun for the entire family!  Registration is FREE
URL:https://issa-centralmd.org/calendar/living-securitys-breaking-security-awareness-digital-conference/
LOCATION:Virtual
END:VEVENT
BEGIN:VEVENT
DTSTART;VALUE=DATE:20200703
DTEND;VALUE=DATE:20200704
DTSTAMP:20260403T153019
CREATED:20160927T155332Z
LAST-MODIFIED:20160930T125957Z
UID:544-1593734400-1593820799@issa-centralmd.org
SUMMARY:Independence Day
DESCRIPTION:
URL:https://issa-centralmd.org/calendar/independence-day-9/
LOCATION:MD
CATEGORIES:Holidays
END:VEVENT
BEGIN:VEVENT
DTSTART;VALUE=DATE:20200716
DTEND;VALUE=DATE:20200718
DTSTAMP:20260403T153019
CREATED:20200624T135847Z
LAST-MODIFIED:20200624T135847Z
UID:3292-1594857600-1595030399@issa-centralmd.org
SUMMARY:SANS DFIR Summit & Training - Live Online
DESCRIPTION:DFIR Summit & Training – Live Online\nWe are opening this virtual Summit (July 16-17) up to the community! Register now for FREE. (Yes — you read that right!) \n\nTwo days of in-depth DFIR Summit talks *MULTIPLE TRACKS* → VIEW AGENDA\nSolutions Track Now Available → VIEW SOLUTIONS TRACK\nTop hands-on SANS DFIR courses → VIEW COURSES\nExclusive networking opportunities
URL:https://issa-centralmd.org/calendar/sans-dfir-summit-training-live-online/
LOCATION:Virtual
CATEGORIES:Training
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20200722T170000
DTEND;TZID=America/New_York:20200722T193000
DTSTAMP:20260403T153019
CREATED:20191214T142609Z
LAST-MODIFIED:20210316T224103Z
UID:2976-1595437200-1595446200@issa-centralmd.org
SUMMARY:Membership Meeting 7/22/2020
DESCRIPTION:Chapter Business Meeting Slides: Membership Meeting 7/22/2020 \nSpeaker Slides: MSSP Market Overview \nSpeaker Recording: MSSP Market Overview \nTopic: Managed Security Services \nAn overview of the Managed Security Services market including: \n\nDefinition of MSS\nCategorization of MSS market segments and the pros and cons of each\nExplanation of why certain offerings dominate the MSS market and why other offerings are less common\nOverview of vendors and their products aligned with the common MSS offerings\nDescription of the varying service models and how they align to different types of customers\nPredictions of disruptions to the MSS market in the coming years\n\nSpeaker: \nJohn Perkins\, Founder\, ThreatAngler \nJohn Perkins is the Founder of Threat Angler and brings over twenty years of cybersecurity experience. During the first fifteen years of his career at the Federal Reserve\, he contributed to nearly all cybersecurity disciplines. John spent the next five years designing\, building\, and leading managed security services with Optiv\, GuidePoint\, Insight Enterprises\, and other service providers. John’s passion is to build a sustainable managed security service focused on delivering cybersecurity value outcomes while developing cybersecurity talents in team members.
URL:https://issa-centralmd.org/calendar/membership-meeting-7-22-2020/
LOCATION:Virtual via Zoom\, MD
CATEGORIES:Meetings
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20200723T100000
DTEND;TZID=America/New_York:20200723T150000
DTSTAMP:20260403T153019
CREATED:20200628T025152Z
LAST-MODIFIED:20200628T025152Z
UID:3305-1595498400-1595516400@issa-centralmd.org
SUMMARY:IT + Cybersecurity Virtual Career Expo
DESCRIPTION:The Maryland Tech Council\, in collaboration with Montgomery College’s America’s Promise leadership\, is hosting a virtual career expo to connect job seekers and students with industry for cybersecurity and IT related career positions and create awareness of the job opportunities available. The Career Expo is complimentary for all students and job seekers\, registration is required. \nAbout the IT + Cybersecurity Virtual Career Expo\n\n20 employers in the virtual expo hall\nExplore employer information and career opportunities\nAbility to engage with employers through the one-on-one online chat feature\nUpload your resume and LinkedIn information to make a strong first impression\nThis event is complimentary and open to all students and job seekers exploring career opportunities in cybersecurity and IT related fields\n\nIf your company is interested in exhibiting\, please contact Emily Sumpter at emily@mdtechcouncil.com for more details.
URL:https://issa-centralmd.org/calendar/it-cybersecurity-virtual-career-expo/
LOCATION:Virtual
END:VEVENT
BEGIN:VEVENT
DTSTART;VALUE=DATE:20200811
DTEND;VALUE=DATE:20200813
DTSTAMP:20260403T153019
CREATED:20200721T233920Z
LAST-MODIFIED:20200721T233920Z
UID:3330-1597104000-1597276799@issa-centralmd.org
SUMMARY:SANS - Cyber Camp for Teens
DESCRIPTION:SANS introduces the first-ever SANS Cyber Camp for Teens. If you’re interested in a career in cyber security and you attend high school or junior high\, this event is for you! \nThe camp brings together a group of cyber security experts\, discussing the latest topics and trends in IT Security. This free Live Online training event includes: \n\nIT Security-Focused Talks – The industry’s top practitioners will present a series of short\, age-appropriate talks on Coding\, Using Technology Responsibly\, Ethical Hacking\, Digital Forensics\, Security Awareness and more!\nWorkshops – These hands-on activities are designed to help you learn in a safe and fun environment and do what the professionals do every day.
URL:https://issa-centralmd.org/calendar/sans-cyber-camp-for-teens/
LOCATION:Virtual
CATEGORIES:Training
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20200818T183000
DTEND;TZID=America/New_York:20200818T200000
DTSTAMP:20260403T153019
CREATED:20200729T110546Z
LAST-MODIFIED:20200729T110651Z
UID:3353-1597775400-1597780800@issa-centralmd.org
SUMMARY:ISSA-DC August Chapter Meeting
DESCRIPTION:Incident Handling & Threat Hunting w/ Security Onion by Tyrone E. Wilson \nMr. Wilson will discuss how to use a free and open source tool like Security Onion (SO) to provide hands-on experience and increase our knowledge in incident response and threat hunting. This event is for those with minimal experience working with detection alerts\, pcap files\, and log management. We will learn how to setup Security Onion at home or on an enterprise network and use its features to complete various network defense challenges. Attendees will leave with a higher level of confidence in network defense as well as the ability to crush their next analyst interview. Participants will also receive a booklet of instructions and credentials to a live SO server which will allow them to continue to practice their new found skills from anywhere in the world.
URL:https://issa-centralmd.org/calendar/issa-dc-august-chapter-meeting/
LOCATION:Virtual via Go To Meeting\, MD
CATEGORIES:Miscellaneous
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20200826T170000
DTEND;TZID=America/New_York:20200826T193000
DTSTAMP:20260403T153019
CREATED:20191214T142719Z
LAST-MODIFIED:20210316T223758Z
UID:2978-1598461200-1598470200@issa-centralmd.org
SUMMARY:Membership Meeting 8/26/2020
DESCRIPTION:Chapter Business Meeting Slides: 2020-08-26 Membership Meeting \nSpeaker Slides: Dell Security Operations 2.0 Transformation \nSpeaker Recording: Dell Security Operations 2.0 Transformation \nTopic: Security Operations 2.0 \nWith Dell Technologies being looked at as a key innovator is response to the rapidly changing workforce\, Bob will layout  a vision of what the next-gen security operations will begin to look like. Based on his past experience as a cybersecurity director and his current outlook within Dell Technologies\, Bob will explore how technology will drive how we assess risk\, manage and mitigate risk\, and provide situational awareness. Enablers for remote workforce\, multi-cloud operations\, and enhanced intelligence all play a role in every agency’s modernization strategy.  But should how you secure these new environments change how you think about securing the rest? \nSpeaker: Bob Nicholson\, Business Development Executive\, Dell Technologies Federal \nBob Nicholson is currently a Business Development Executive for the Dell Technologies’ Federal team with a concentration on Federal Civilian agencies. Bob has been serving in this position for 5 years but brings more than 25+ years of solutioning experience in support of the public sector. \nFor 15 years he served as a cybersecurity leader and solution architect within the federal government which included designing and implementing many enterprise solutions and establishing many best practices. Many of these as a result of Federal mandates\, Bob has a great deal of experience working within government\, in coordination with its many bodies of governance\, and throughout industry. He has transferred this knowledge and relationships into not only being a strong advocate for innovation within government\, but also a facilitator for ensuring its success.
URL:https://issa-centralmd.org/calendar/membership-meeting-8-26-2020/
LOCATION:HubSpot—The Gathering Place on the Gateway\, 6724 Alexander Bell Drive Hub Spot\, Suite 105\, Columbia\, MD\, 21046
CATEGORIES:Meetings
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20200901T083000
DTEND;TZID=America/New_York:20200901T133000
DTSTAMP:20260403T153019
CREATED:20200628T024240Z
LAST-MODIFIED:20200819T020826Z
UID:3301-1598949000-1598967000@issa-centralmd.org
SUMMARY:Insider Threat Day at Johns Hopkins University Applied Physics Lab
DESCRIPTION:The Insider Threat Day at Johns Hopkins University Applied Physics Lab\, hosted by the ISSA Central Maryland Chapter\, will take place on Monday\, September 1\, 2020. This one-day event will be part of the Insider Threat Awareness Month declared by the U.S. National Counterintelligence and Security Center (NSCS) and the National Insider Threat Task Force (NITTF). The goal of Insider Threat Day is to raise awareness and help organizations develop proactive strategies for detecting and combating these threats\, as well as to reduce the risk of compromised information. \nRegister at https://www.fbcinc.com/e/JHU/attendeereg.aspx \n\nEarly Bird registration price for Industry is $75 and ends on 7/31/2020. Afterward\, the registration price will be $100.\nThere is no cost for Government\, ISSA members\, or JHU/APL Employees to register for this event.\n\nJohns Hopkins Applied Physics Lab is the nation’s largest university-affiliated research center and provides U.S. government agencies with deep expertise in specialized fields to support national priorities and technology development programs. They also serve as independent trusted technical agents to the government\, providing continuity for highly complex\, multigenerational technology development systems. To find out more about JHU/APL\, please visit https://www.jhuapl.edu/ \n  \nThis conference is brought to you by the ISSA Central Maryland Chapter and the Federal Business Council.
URL:https://issa-centralmd.org/calendar/insider-threat-day-at-johns-hopkins-university-applied-physics-lab/
LOCATION:JHU Kossiakoff Conference Center\, 11100 Johns Hopkins Road\, Laurel\, MD\, 20723
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20200902T110000
DTEND;TZID=America/New_York:20200902T133000
DTSTAMP:20260403T153019
CREATED:20200823T225155Z
LAST-MODIFIED:20200823T225740Z
UID:3370-1599044400-1599053400@issa-centralmd.org
SUMMARY:Cyber Threat Hunting Workshop
DESCRIPTION:Join RedSeal and ISSA Central Maryland on Thursday\, August 13\, 2020 at 11:30am ET\, for a free virtual Cyber Threat Hunting workshop for cybersecurity practitioners. \nLearn to identify potential attack vectors that bad actors could use to exploit existing vulnerabilities \nDuring the event\, you will leverage the RedSeal platform to assess the overall cybersecurity posture of\, and threat hunt within\, a pre-built virtual network model while refining your skills in risk and vulnerability assessment\, cyber hunting\, and incident response. \nAt the completion of the session\, you will have learned how to: \n\nEasily identify devices on the network that pose the most risk to your enterprise\nIdentify devices across your enterprise that have network access and exploitable vulnerabilities\nQuickly visualize where aggressors can pivot following system compromise\nCoordinate with other teams to enhance digital resilience\n\nClick Here to Register
URL:https://issa-centralmd.org/calendar/cyber-threat-hunting-workshop/
LOCATION:Virtual
CATEGORIES:Training
END:VEVENT
BEGIN:VEVENT
DTSTART;VALUE=DATE:20200905
DTEND;VALUE=DATE:20200907
DTSTAMP:20260403T153019
CREATED:20200210T032446Z
LAST-MODIFIED:20200316T125201Z
UID:3101-1599264000-1599436799@issa-centralmd.org
SUMMARY:BSidesCharm
DESCRIPTION:BSidesCharm is a regional Security B-Sides held in Baltimore\, MD. It operates under the umbrella principles of Security B-Sides as a larger community project within information security. The goal of BSides is to offer small\, intimate events where all participants can engage each other to help develop connections\, friendships\, and network with different industry professionals.\n\nWe recognize the value in engaging a smaller audience and being the big fish in a small pond. Every organization will have different goals and priorities which is why we offer different levels of participation for every individual\, group\, or organization. We specifically designed several different options for any sized organization to participate and support this event.
URL:https://issa-centralmd.org/calendar/bsidescharm/
LOCATION:MD
CATEGORIES:Miscellaneous
END:VEVENT
BEGIN:VEVENT
DTSTART;VALUE=DATE:20200907
DTEND;VALUE=DATE:20200908
DTSTAMP:20260403T153019
CREATED:20160927T155332Z
LAST-MODIFIED:20160930T125930Z
UID:545-1599436800-1599523199@issa-centralmd.org
SUMMARY:Labor Day
DESCRIPTION:
URL:https://issa-centralmd.org/calendar/labor-day-10/
LOCATION:MD
CATEGORIES:Holidays
END:VEVENT
BEGIN:VEVENT
DTSTART;VALUE=DATE:20200908
DTEND;VALUE=DATE:20200910
DTSTAMP:20260403T153019
CREATED:20200413T022408Z
LAST-MODIFIED:20200413T022408Z
UID:3207-1599523200-1599695999@issa-centralmd.org
SUMMARY:Billington CyberSecurity Summit
DESCRIPTION:Following a sold-out Summit in 2019\, the 11th Annual CyberSecurity Summit promises to continue the proud tradition of convening the top “who’s who” in cybersecurity leadership for an unparalleled two days of high-level networking and knowledge-sharing to advocate cyber mission in the U.S. and among allied countries.
URL:https://issa-centralmd.org/calendar/billington-cybersecurity-summit/
LOCATION:MD
CATEGORIES:Miscellaneous
END:VEVENT
BEGIN:VEVENT
DTSTART;VALUE=DATE:20200919
DTEND;VALUE=DATE:20200920
DTSTAMP:20260403T153019
CREATED:20191214T143827Z
LAST-MODIFIED:20191214T143827Z
UID:2988-1600473600-1600559999@issa-centralmd.org
SUMMARY:Rosh Hashanah Jewish Holiday
DESCRIPTION:
URL:https://issa-centralmd.org/calendar/rosh-hashanah-jewish-holiday/
LOCATION:MD
CATEGORIES:Holidays
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20200923T170000
DTEND;TZID=America/New_York:20200923T193000
DTSTAMP:20260403T153019
CREATED:20191214T143109Z
LAST-MODIFIED:20200923T224911Z
UID:2980-1600880400-1600889400@issa-centralmd.org
SUMMARY:Membership Meeting 9/23/2020
DESCRIPTION:Chapter Business Meeting Slides: 2020-09-23-Meeting-Presentation.pdf \nSpeaker Slides: UAS-Forensics-Framework-2020-09-23.pdf \nTopic: A Study on Drone Forensics Framework \nAs consumer unmanned aircraft systems (UAS) or drones are used more commonly in public areas\, an approach for a drone forensics framework is needed to guide forensics investigators in analyzing recovered drones that entered the unauthorized national airspace system (NAS). The presentation is based on a doctoral research study focused on whether a single framework and multiple frameworks for drone forensics. The data collected through an online survey provided detailed descriptions of the participants’ most commonly used forensics frameworks or guidelines. The data collected from participants in the United States measured the occurrences of the type of guidelines forensics examiners used. The results of the study identified a need for a standard drone forensic framework across digital forensic disciplines and aircraft accident investigation for use by investigators to produce admissible evidence for litigation in the U.S. courts. The research led to a proposed basic drone forensics framework\, which can be improved upon in future research. \nSpeaker: Nagi Mei\, D.Sc. \n\nDr. Nagi Mei has over 14 years in management and technology consulting service offerings to the commercial and health industries\, and federal\, state\, and local governments. She has extensive experience in strategic initiatives and operational responsibilities grounded in information security management. Dr. Mei is a project manager where she leads teams in implementing information security projects. Dr. Mei received a Doctor of Science in Cybersecurity from the Capitol Technology University. She holds a Master in Business Administration\, a Master of Science in Information and Telecommunications Systems from the Johns Hopkins Carey Business School\, and a Bachelor of Science in Information Systems concentrating in Digital Forensics from the Johns Hopkins University. She holds certifications in Sec+\, PMP\, PMI-ACP\, SSM\, CSM\, and ITILv3.
URL:https://issa-centralmd.org/calendar/membership-meeting-9-23-2020/
LOCATION:Virtual via Zoom\, MD
CATEGORIES:Meetings
END:VEVENT
BEGIN:VEVENT
DTSTART;VALUE=DATE:20200928
DTEND;VALUE=DATE:20200929
DTSTAMP:20260403T153019
CREATED:20191214T143949Z
LAST-MODIFIED:20191214T143949Z
UID:2990-1601251200-1601337599@issa-centralmd.org
SUMMARY:Yom Kippur Jewish Holiday
DESCRIPTION:
URL:https://issa-centralmd.org/calendar/yom-kippur-jewish-holiday/
LOCATION:MD
CATEGORIES:Holidays
END:VEVENT
BEGIN:VEVENT
DTSTART;VALUE=DATE:20200930
DTEND;VALUE=DATE:20201001
DTSTAMP:20260403T153019
CREATED:20200225T230013Z
LAST-MODIFIED:20200827T233628Z
UID:3146-1601424000-1601510399@issa-centralmd.org
SUMMARY:Data Connectors Baltimore 2020
DESCRIPTION:Capital Region:\nVirtual Cybersecurity Summit\nA live\, interactive experience!\nWednesday\, September 30th\nMore than 70\,000 members of the Data Connectors Cybersecurity Community are in the DC area. The Virtual Summit will be conducted in real time\, with the same panels\, presentations and solution provider exhibits and demonstrations \nComplimentary Registration Includes:\n\nKeynote presentation\nCIO/CISO Panel Discussion\nCybersecurity expert presentations\nVirtual exhibits from solution providers with chat capability\nCPE Credits\nPrizes such as Air Pods\, XBox\, Amazon Gift Cards and lots more…\n\nRegister Here
URL:https://issa-centralmd.org/calendar/data-connectors-baltimore-2020/
LOCATION:MD
CATEGORIES:Miscellaneous
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20201008T100000
DTEND;TZID=America/New_York:20201008T160000
DTSTAMP:20260403T153019
CREATED:20200922T211257Z
LAST-MODIFIED:20200922T211404Z
UID:3407-1602151200-1602172800@issa-centralmd.org
SUMMARY:Virtual Threat Defense Challenge
DESCRIPTION:Join our security experts for a hands-on learning experience as you navigate a simulated cyberattack in real-time. Learn to “think like a hacker” and then respond to and defend valuable assets. Whether you are a novice or a skilled security professional\, this experience has something for everyone. \nCompete in teams alongside your peers to run cyberattacks in a controlled environment. Premium prizes will be given to the team with the most points. \nJoin this action-packed session and learn to:  \n\nUnderstand the tools and techniques used by hackers\nIdentify infrastructure security gaps\nPlan and implement security measures\n\nThere’s no cost to attend. Just bring your best game! \nRegister Here; https://resources.trendmicro.com/2020-Q4-NE-MA_TDC_OCT8.html
URL:https://issa-centralmd.org/calendar/virtual-threat-defense-challenge/
LOCATION:Virtual
CATEGORIES:Training
END:VEVENT
BEGIN:VEVENT
DTSTART;VALUE=DATE:20201012
DTEND;VALUE=DATE:20201013
DTSTAMP:20260403T153019
CREATED:20160927T155332Z
LAST-MODIFIED:20160930T125753Z
UID:546-1602460800-1602547199@issa-centralmd.org
SUMMARY:Columbus Day
DESCRIPTION:
URL:https://issa-centralmd.org/calendar/columbus-day-10/
LOCATION:MD
CATEGORIES:Holidays
END:VEVENT
BEGIN:VEVENT
DTSTART;VALUE=DATE:20201019
DTEND;VALUE=DATE:20201024
DTSTAMP:20260403T153019
CREATED:20200722T101510Z
LAST-MODIFIED:20200722T101510Z
UID:3334-1603065600-1603497599@issa-centralmd.org
SUMMARY:EC-Council - Hacker Halted Virtual Cyber Security Training and Conference 2020
DESCRIPTION:Hacker Halted is a global series of computer and information security conferences presented by EC-Council. Hacker Halted is a global series of computer and information security conferences presented by EC-Council. The objective of the hacker halted conferences is to raise international awareness towards increased education and ethics in IT security.
URL:https://issa-centralmd.org/calendar/ec-council-hacker-halted-virtual-cyber-security-training-and-conference-2020/
LOCATION:Virtual
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20201028T170000
DTEND;TZID=America/New_York:20201028T193000
DTSTAMP:20260403T153019
CREATED:20191214T143204Z
LAST-MODIFIED:20201111T151355Z
UID:2982-1603904400-1603913400@issa-centralmd.org
SUMMARY:Membership Meeting 10/28/2020
DESCRIPTION:Chapter Business Meeting Slides: 2020-10-28- Meeting Presentastion.pdf \nSpeaker Slides: 30 Years 20-10-28.pdf \nTopic: Lessons Learned from 30 Years of Security Awareness Efforts \nOrganisations acknowledge that employees are often the weakest link\, yet efforts to improve ‘user awareness’ tend to rely upon available tools and not true experience. Drawing on three decades of awareness efforts and experience improving true security behaviours\, Ira Winkler will dispel many commonly held beliefs about security awareness\, detailing what consistently works and what does not. \nLearning Objectives:\n1: Learn and apply what works consistently across hundreds of organisational awareness efforts.\n2: Learn from research in other disciplines that improves awareness efforts.\n3: Learn how to create a security culture that drives individual security behaviours. \nSpeaker: Ira Winkler\, President\, Secure Mentem \n\n\nIra Winkler\, CISSP\, is the President of Secure Mentem and Author of Advanced Persistent Security\, and the forthcoming books\, You Can Stop Stupid and Security Awareness for Dummies. He is considered one of the world’s most influential security professionals and was named “The Awareness Crusader” by CSO magazine in receiving their CSO COMPASS Award. He also received the ISSA Hall of Fame award. He has designed and implemented and supported security awareness programs at organizations of all sizes\, in all industries\, around the world. Ira began his career at the National Security Agency\, where he served in various roles as an Intelligence and Computer Systems Analyst. He has since served in other positions supporting the cybersecurity programs in organizations of all sizes. Ira’s new book can be preordered here: https://tiny.cc/stupidbook
URL:https://issa-centralmd.org/calendar/membership-meeting-10-28-2020/
LOCATION:Virtual via Zoom\, MD
CATEGORIES:Meetings
END:VEVENT
BEGIN:VEVENT
DTSTART;VALUE=DATE:20201111
DTEND;VALUE=DATE:20201112
DTSTAMP:20260403T153019
CREATED:20160927T155332Z
LAST-MODIFIED:20160930T125850Z
UID:547-1605052800-1605139199@issa-centralmd.org
SUMMARY:Veterans Day
DESCRIPTION:
URL:https://issa-centralmd.org/calendar/veterans-day-10/
LOCATION:MD
CATEGORIES:Holidays
END:VEVENT
BEGIN:VEVENT
DTSTART;VALUE=DATE:20201116
DTEND;VALUE=DATE:20201119
DTSTAMP:20260403T153019
CREATED:20200721T233623Z
LAST-MODIFIED:20200721T233623Z
UID:3327-1605484800-1605743999@issa-centralmd.org
SUMMARY:(ISC)² Security Congress
DESCRIPTION:Join thousands of leading cybersecurity professionals virtually at (ISC)² Security Congress 2020 November 16-18. You will hear expert insights into the latest security challenges\, and share best practices for combating threats\, building teams and implementing the latest processes and procedures to better defend your organizations’ critical assets. We will discuss the latest issues facing the workforce\, explore pathways for career advancement and discover new tools and solutions together. \nAttend (ISC)² Security Congress from home and take advantage of the powerful collaboration that you can only find at a conference of your peers who are dedicated to helping one another solve the challenges we all face. \nEarly Bird pricing to (ISC)² members and associates of just $295 for an All-Access pass. Non-members will also benefit with Early Bird pricing of $395. Registration details will be announced when open. The Early Bird window will close on September 30. Registration and more information can be found Here!
URL:https://issa-centralmd.org/calendar/isc%c2%b2-security-congress/
LOCATION:Virtual
CATEGORIES:Training
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20201118T170000
DTEND;TZID=America/New_York:20201118T193000
DTSTAMP:20260403T153019
CREATED:20191214T143303Z
LAST-MODIFIED:20201202T174304Z
UID:2984-1605718800-1605727800@issa-centralmd.org
SUMMARY:Membership Meeting 11/18/2020
DESCRIPTION:Chapter Business Meeting Slides: 2020-11-18 – Meeting Presentastion.pdf\n\n\n\nSpeaker Slides: Roles of Artificial Intelligence and Deep Learning in Detecting Data Exfiltration \nTopic: Roles of Artificial Intelligence and Deep Learning in Detecting Data Exfiltration \nEssential Internet services are vital for many aspects of modern living\, yet those services remain valuable to threat actors who use them for network intrusions and data exfiltration. Dr. Pena completed a quantitative research study analyzing the ability of a Convolutional Neural Network (CNN) to detect Domain Name System (DNS) covert communications generated by the DNSExfiltrator open source tool. The results showed the CNN model had100% accuracy when exfiltrated file sizes exceeded 2 Kilobytes (KB) using the default (maximum) transmission packet size\, but its performance fell dramatically for files below 1 KB in size. \nAs AI/ML solutions become more prevalent in cybersecurity tools\, professionals must understand where a model’s strengths and weaknesses lay in order to apply appropriate risk mitigations\, such as tuning complimentary detection systems. \nSpeaker: Dr. Tomas Pena\, L3 Harris Technologies \n\n\nDr. Tomas Pena is the Chief Technologist for Cyber Operations at L3Harris Technologies’ Space and Airborne Systems Segment. In that role\, he’s responsible for cyber innovation and improving the resiliency of company products spanning land\, sea\, air\, space\, and cyber domains. He’s been in cyber-related systems engineering and defense contracting positions since 2013. Prior to that time\, he completed 20 years of service in the United States Air Force as a Cyberspace Operations Officer where he organized\, planned\, executed full-spectrum cyberspace operations\, stood up the United States Cyber Command’s 24/7 Joint Operations Center\, and led Air Force Business Transformation Initiatives at the Pentagon. Dr. Pena has also filled roles such as managing the Global Positioning System satellite control systems\, managing theater communications during Operations IRAQI FREEDOM and ENDURING FREEDOM. He is also the Founder and President of Parallax Cyber LLC\, a small business focused on training and educating the workforce in Cybersecurity and Cyber Conflict\, and the current Editor-in-Chief of the Military Cyber Professional Associations’ Military Cyber Affairs Journal. \n\n\nClick Here to register for the November 18\, 2020 General Membership Meeting
URL:https://issa-centralmd.org/calendar/membership-meeting-11-18-2020/
LOCATION:Virtual via Zoom\, MD
CATEGORIES:Meetings
END:VEVENT
BEGIN:VEVENT
DTSTART;VALUE=DATE:20201126
DTEND;VALUE=DATE:20201127
DTSTAMP:20260403T153019
CREATED:20160927T155333Z
LAST-MODIFIED:20160930T125831Z
UID:548-1606348800-1606435199@issa-centralmd.org
SUMMARY:Thanksgiving Day
DESCRIPTION:
URL:https://issa-centralmd.org/calendar/thanksgiving-day-9/
LOCATION:MD
CATEGORIES:Holidays
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20201216T120000
DTEND;TZID=America/New_York:20201216T130000
DTSTAMP:20260403T153019
CREATED:20201117T234508Z
LAST-MODIFIED:20201117T235451Z
UID:3475-1608120000-1608123600@issa-centralmd.org
SUMMARY:December 2020 "Lunch and Learn"
DESCRIPTION:O365 Lunch and Learn Abstract: We’ll navigate through uncharted security territory by analyzing the attack lifecycle in the cloud and dissecting a real-world attack. The same technology that makes the cloud dynamic can have the opposite effect on an organization’s ability to implement detection and response in cloud environments. This includes the adding additional layer of preventative controls in addition to MFA\, because it’s increasingly being bypassed in O365 as an example. Chris Morales\, Head of Analytics with Vectra\, will help us navigate through the uncharted security territory by analyzing the attack lifecycle in the cloud\, reviewing the top cloud security threats\, and dissecting a real-world cloud attack. Additionally\, he’ll provide key takeaways for managing access\, detection and response\, and security operations. \nThis event is sponsored by Vectra. \n \nClick Here to register for this event. Thanks.
URL:https://issa-centralmd.org/calendar/december-2020-lunch-and-learn/
LOCATION:Virtual via Zoom\, MD
CATEGORIES:Miscellaneous
END:VEVENT
END:VCALENDAR