BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//Central Maryland Chapter of ISSA - ECPv6.15.18//NONSGML v1.0//EN
CALSCALE:GREGORIAN
METHOD:PUBLISH
X-WR-CALNAME:Central Maryland Chapter of ISSA
X-ORIGINAL-URL:https://issa-centralmd.org
X-WR-CALDESC:Events for Central Maryland Chapter of ISSA
REFRESH-INTERVAL;VALUE=DURATION:PT1H
X-Robots-Tag:noindex
X-PUBLISHED-TTL:PT1H
BEGIN:VTIMEZONE
TZID:America/New_York
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20170312T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20171105T060000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20180311T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20181104T060000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20190310T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20191103T060000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20200308T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20201101T060000
END:STANDARD
END:VTIMEZONE
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20190919T123000
DTEND;TZID=America/New_York:20190919T170000
DTSTAMP:20260403T165325
CREATED:20190828T014642Z
LAST-MODIFIED:20190828T014642Z
UID:2789-1568896200-1568912400@issa-centralmd.org
SUMMARY:MD Cyber Solutions Showcase
DESCRIPTION:Innovation Showcase ∙ Cybersecurity Product & Service Company Expo ∙ “Ask a Cyber Specialist” Information Stations ∙ Live Cyber Trivia ∙ Fireside Chat with Industry Experts ∙ Networking \nThe Maryland Cybersecurity Solutions Showcase is the single source for businesses\, government agencies and nonprofit organizations of every size in every industry to find: \n\nINFORMATION: get answers to cybersecurity questions\, help identifying cybersecurity risks and details on Maryland’s new cyber tax credit program from cyber specialists\nINNOVATION: discover some of Maryland’s most innovative cybersecurity technologies\nCONNECTIONS: with local solutions for cybersecurity as well as companies/organizations willing to share their cyber stories and strategies
URL:https://issa-centralmd.org/calendar/md-cyber-solutions-showcase/
LOCATION:MD
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20190902T000000
DTEND;TZID=America/New_York:20190902T000000
DTSTAMP:20260403T165325
CREATED:20160927T155331Z
LAST-MODIFIED:20160927T170825Z
UID:535-1567382400-1567382400@issa-centralmd.org
SUMMARY:Labor Day
DESCRIPTION:
URL:https://issa-centralmd.org/calendar/labor-day-9/
LOCATION:MD
CATEGORIES:Holidays
END:VEVENT
BEGIN:VEVENT
DTSTART;VALUE=DATE:20190829
DTEND;VALUE=DATE:20190830
DTSTAMP:20260403T165325
CREATED:20190619T021438Z
LAST-MODIFIED:20190619T021438Z
UID:2696-1567036800-1567123199@issa-centralmd.org
SUMMARY:SANS SEC511: Continuous Monitoring and Security Operations
DESCRIPTION:SEC511: Continuous Monitoring and Security Operations No network is impenetrable\, a\nreality that business executives and security professionals alike have to accept. Prevention is\ncrucial\, and we can’t lose sight of it as the primary goal. However\, a new proactive approach\nto security is needed to enhance the capabilities of organizations to detect threats that will\ninevitably slip through their defenses. SEC511 will teach you how to strengthen your skills to\nundertake that proactive approach. \nFor additional ionformation\, see the attached flier (Click Here). \n 
URL:https://issa-centralmd.org/calendar/sans-sec511-continuous-monitoring-and-security-operations-2/
LOCATION:MD
CATEGORIES:Miscellaneous
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20190828T170000
DTEND;TZID=America/New_York:20190828T193000
DTSTAMP:20260403T165325
CREATED:20181217T022545Z
LAST-MODIFIED:20190828T215416Z
UID:2289-1567011600-1567020600@issa-centralmd.org
SUMMARY:Membership Meeting 8/28/2019
DESCRIPTION:Chapter Business Meeting Slides: 2019-08-28-Meeting-Presentation.pdf \nSpeaker Presentation: Failing-at-Cybersecurity.pdf \nTopic: Fail Secure: 20 Ways to Undermine Your Security Program \nThere’s policy\, and then there’s reality. All too often\, security teams find their efforts overridden or bypassed. Here’s some unconventional wisdom and tips on how to engage your stakeholders and keep your program moving forward. \nSpeaker: Tom Hallewell\, VP of Programs and Event for the ISSA DC Chapter \nTom Hallewell works for the Government. He’s also VP of Programs for ISSA-DC.  He’s worked in just about every area of cybersecurity\, and has the scars to prove it.  Hopefully this talk will help you avoid getting them yourself.  Tom Hallewell is the VP of Programs and Event for the ISSA DC Chapter \nPlease Note: \n\nDeadline to register is August 26th at 5 PM.\nChapter & ISSA member’s ticket: FREE\nGuest tickets: $15 if registered by 5 PM on August 26th. Otherwise\, $20 at the door (cash or credit card). Refunds available until August 26th at 5pm.\n\nAgenda: \n5:15 – 5:45 Chapter Business Meeting \n6:00 – 7:30 Speaker and Q&A
URL:https://issa-centralmd.org/calendar/membership-meeting-8-28-2019/
LOCATION:MD
CATEGORIES:Meetings
END:VEVENT
BEGIN:VEVENT
DTSTART;VALUE=DATE:20190803
DTEND;VALUE=DATE:20190809
DTSTAMP:20260403T165325
CREATED:20190701T122323Z
LAST-MODIFIED:20190701T122323Z
UID:2720-1564790400-1565308799@issa-centralmd.org
SUMMARY:Black Hat
DESCRIPTION:  \n  \nRegister Now for Black Hat USA and Save!  \nBlack Hat USA will take place August 3-8\, 2019 at the Mandalay Bay Convention Center\, offering the largest lineup of content and features to date. Deeply technical\, hands-on Trainings led by the information security industry’s top trainers\, will span a variety of topics from infrastructure hacking to social engineering and car hacking. For information on the available courses\, check out the Trainings lineup. \nBlack Hat USA Briefings will present the latest security research\, Wednesday\, August 7 and Thursday\, August 8. View all announced Briefings abstracts and save $200 when you register for your Briefings pass with code 19issa1. Don’t miss the opportunity to expand your knowledge and network during the biggest week in InfoSec! \n  \n \nIf you have any questions please contact memberservices@issa.org We hope to see you in Las Vegas!
URL:https://issa-centralmd.org/calendar/black-hat/
LOCATION:MD
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20190724T170000
DTEND;TZID=America/New_York:20190724T193000
DTSTAMP:20260403T165325
CREATED:20181217T022447Z
LAST-MODIFIED:20190729T120043Z
UID:2287-1563987600-1563996600@issa-centralmd.org
SUMMARY:Membership Meeting 7/24/2019
DESCRIPTION:Chapter Business Meeting Slides: 2019-07-24-Meeting-Presentation.pdf \nSpeaker Presentation: Attackers-Prey-on-Uncertainty_ISSA-Central-MD.pdf \nTopic: Attackers Prey on Uncertainty: How to Fail at Threat Detection\n \nIt takes a lot of visibility and context to detect and respond to sophisticated threats. Attackers usually target data\, where enterprises have the least visibility and most uncertainty. In this session\, we’ll explore new\, sophisticated threats from inside and out\, demonstrate how easy it is for adversaries to bypass traditional controls\, and present a methodology to better protect data at scale\, improve threat detection\, and reduce uncertainty. \nSpeaker: Courtney Chau\, System Engineer at Varonis \nBringing a diverse business and technical skill set\, Courtney Chau has had the privilege of working with an elite list of clientele in the Cyber Security & Information Technology sector. Courtney’s commitment to continued learning and academic excellence provided the opportunity for a year of early completion at Virginia Tech with a B.S. in Business Information Technology\, summa cum laude\, and minor in Applied Business Computing. Courtney embarked on her professional journey in IT Risk Assurance at the multinational professional services network firm PricewaterhouseCoopers (PwC)\, providing superior client relationship management to cultivate efficient and innovative business solutions. She collaborated with multiple teams\, inter-company lines of service\, clients\, and client third-party service organizations for multiple projects regarding interfaces/configurations\, key reports\, SDLC\, and other IT general controls. Following this\, Courtney served Darktrace as a Cyber Defense Technology Specialist to manage deployments and incident responses\, ranging from small business to global firms across a variety of industries. She mentored a team of engineers and holds substantial experience covering a global territory. Presently\, she works with Varonis to serve the data security needs of large enterprise customers. \nPlease Note: \n\nDeadline to register is July 22nd at 5 PM.\nChapter & ISSA member’s ticket: FREE\nGuest tickets: $15 if registered by 5 PM on July 22nd. Otherwise\, $20 at the door (cash or credit card). Refunds available until July 22nd at 5pm.\n\nAgenda: \n5:15 – 5:45 Chapter Business Meeting \n6:00 – 7:30 Speaker and Q&A
URL:https://issa-centralmd.org/calendar/membership-meeting-7-24-2018/
LOCATION:MD
CATEGORIES:Meetings
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20190704T000000
DTEND;TZID=America/New_York:20190704T000000
DTSTAMP:20260403T165325
CREATED:20160927T155331Z
LAST-MODIFIED:20160927T170825Z
UID:534-1562198400-1562198400@issa-centralmd.org
SUMMARY:Independence Day
DESCRIPTION:
URL:https://issa-centralmd.org/calendar/independence-day-8/
LOCATION:MD
CATEGORIES:Holidays
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20190626T170000
DTEND;TZID=America/New_York:20190626T193000
DTSTAMP:20260403T165325
CREATED:20181217T022354Z
LAST-MODIFIED:20190701T123836Z
UID:2285-1561568400-1561577400@issa-centralmd.org
SUMMARY:Membership Meeting 6/26/2019
DESCRIPTION:Chapter Meeting Registration  \nPlease note the new meeting Location: Hub Spot\, 6724 Alexander Bell Drive\, Suite 105\, Columbia\, MD 21046\,  \nChapter Business Meeting Slides: 2019-06-26-Meeting-Presentation \nSpeaker Presentation: Crafting a DLP Program \nTopic: Data Loss Prevention Essentials \nA how-to primer on overcoming organizational challenges to implement a successful Data Loss Prevention program. \nAdvances in technology have prompted a rapid evolution of business processes over the last two decades. Along with the benefits provided to organizations\, these advances have brought about new types of risks. Data has become the lifeblood of organizations\, yet many do not know what data they have\, what is important\, or how it is being used. \nA Data Loss Prevention program provides insight into these new risks\, but organizations are often ill-equipped to respond to this new information or manage the associated risks. \nInfolock’s Director of Advisory Services\, Ryan Dobbins\, will discuss the three main areas required for a successful implantation: \n\nGovernance: The organizational articulation of what data is important and how it is measured\nVisibility: The technical ability to make informed decisions\nProtection: The enforcement of organization risk tolerance\n\nA successful DLP program supports and informs organizational leadership as they manage data risk and minimize the occurrence and impact of data incidents. Attendees will leave this presentation with an understanding of how to turn DLP technology into a holistic program to reduce organizational risks. \nSpeaker: Ryan Dobbins\, Director of Advisory Services\, Infolock \nRyan Dobbins is Infolock’s Director of Advisory Services and helped develop the Data Risk Management Framework (DRMF). A graduate of James Madison University\, Mr. Dobbins holds the SANS GSLC certification and is active in the Governance\, Risk\, and Compliance (GRC) community where he offers his expertise on topics such as: \n\nStrategic Data Governance\nAligning Compliance Goals with Real Security\nReducing Enterprise Risk with Data Loss Prevention\nHow to Use a Control Framework to Build a Security Program\n\nIn addition to his work at Infolock\, Mr. Dobbins was a featured speaker at VA HIMSS (2017)\, the AMC Security Conference (2017)\, the NCHICA Conference (2016)\, and the AMC Conference (2016). Prior to Infolock\, Mr. Dobbins developed and managed the information security program at a multi-billion-dollar healthcare enterprise\, including its GRC system and Security Operations Center. In this role\, Mr. Dobbins and his team worked to detect\, respond to\, and report on technical security issues. During this time\, they responded to internal and external security audits\, formed business relationships with various organizational units and provided corporate\nguidance on security related issues. The results of their findings were scored against HITRUST and internal policies and added to the GRC system for risk-tracking and remediation. Later\, these results were published to a wide audience across a number of formats\, including\nexecutive dashboards and technician remediation paths. \nPlease note new meeting schedule – June 2019 \n5:15 – 5:45 Chapter Business Meeting \n6:00 – 7:30 Speaker and Q&A \nChapter Meeting Registration
URL:https://issa-centralmd.org/calendar/membership-meeting-6-26-2019/
LOCATION:HubSpot—The Gathering Place on the Gateway\, 6724 Alexander Bell Drive Hub Spot\, Suite 105\, Columbia\, MD\, 21046
CATEGORIES:Meetings
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20190527T000000
DTEND;TZID=America/New_York:20190527T000000
DTSTAMP:20260403T165325
CREATED:20160927T155331Z
LAST-MODIFIED:20160927T170825Z
UID:533-1558915200-1558915200@issa-centralmd.org
SUMMARY:Memorial Day
DESCRIPTION:
URL:https://issa-centralmd.org/calendar/memorial-day-8/
LOCATION:MD
CATEGORIES:Holidays
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20190522T170000
DTEND;TZID=America/New_York:20190522T193000
DTSTAMP:20260403T165325
CREATED:20181217T022300Z
LAST-MODIFIED:20190523T112701Z
UID:2283-1558544400-1558553400@issa-centralmd.org
SUMMARY:Membership Meeting 5/22/2019
DESCRIPTION:Please note the new meeting Location: Hub Spot\, 6724 Alexander Bell Drive\, Suite 105\, Columbia\, MD 21046\,  \nTopic: RMF 2.0 for non-Federal Users \nMembership Meeting Slides: 2019-05-22 Meeting Presentation \nSpeaker Presentation: Risk Management for non-Federal Users \nLearning objectives\n1) Understanding of the NIST Risk Management Framework\n2) Briefing on the updates to Revision 2.0 of NIST 800-37\n3) Walk through of a fictitious Federal Agency system undergoing the RMF process \nThe target audience are those who have not yet dealt with the NIST RMF and would like to understand the various components and how it would apply to a specific computer system. The talk will start with the steps included in the RMF process and will end with the review of the controls within one or two control families. \nSpeaker: Joe Klein\, Mitre \nJoe Klein is a +30-year veteran of the IT\, IA\, IoT and IO domains\, with extensive experience in DoD\, US Government\, and commercial sectors. He has a long history of speaking at Computer Science\, Technology\, Security and Hacker conferences on topics such as IPv6\, Time Hacking\, Auto Hacking\, Physical Security\, Risk Management\, IoT Security\, Cybersecurity as a Business advantage\, and success in your security career. National and international speaking venues include Defcon\, BlackHat\, BSidesDC\, ISSA events\, ITU\, InfraGard\, TorCon\, SecTor\, and Security Days. \nHe also contributes his talent to standards and practices at NIST\, DoD\, SPAWAR\, IEEE\, and IETF. \nPlease note new meeting schedule – May 2019\n5:15 to 5:45 Business Meeting\n5:45 to 6:15 Networking and Dinner\n6:15 to 7:45 Speaker and Q&A \n 
URL:https://issa-centralmd.org/calendar/membership-meeting-5-22-2019/
LOCATION:HubSpot—The Gathering Place on the Gateway\, 6724 Alexander Bell Drive Hub Spot\, Suite 105\, Columbia\, MD\, 21046
CATEGORIES:Meetings
END:VEVENT
BEGIN:VEVENT
DTSTART;VALUE=DATE:20190425
DTEND;VALUE=DATE:20190426
DTSTAMP:20260403T165325
CREATED:20190204T190724Z
LAST-MODIFIED:20190204T190724Z
UID:2535-1556150400-1556236799@issa-centralmd.org
SUMMARY:SANS Hacker Tools\, Techniques\, Exploits\, and Incident Handling
DESCRIPTION:SANS Hacker Tools\, Techniques\, Exploits\, and Incident Handling\nThe Internet is full of powerful hacking tools and bad guys using them extensively. If your organization has an Internet connection or one or two disgruntled employees (and whose doesn’t!)\, your computer systems will get attacked. From the five\, ten\, or even one hundred daily probes against your Internet infrastructure to the malicious insider slowly creeping through your most vital information assets\, attackers are targeting your systems with increasing viciousness and stealth. As defenders\, it is essential we understand these hacking tools and techniques. \nFor additional information and to register\, click HERE
URL:https://issa-centralmd.org/calendar/sans-hacker-tools-techniques-exploits-and-incident-handling/
LOCATION:MD
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20190424T170000
DTEND;TZID=America/New_York:20190424T193000
DTSTAMP:20260403T165325
CREATED:20181217T022201Z
LAST-MODIFIED:20190515T164644Z
UID:2281-1556125200-1556134200@issa-centralmd.org
SUMMARY:Membership Meeting 4/24/2019
DESCRIPTION:Membership Meeting Slides: 2019-04027 Meeting Presentation \nSpeaker Presentation: Intro to Cyber Insurance \nTopic: Intro to Cyber Insurance \nCyber risk management is something that continues to evolve with the threat landscape as well as innovations in processes and technology. One of these new innovations is the emergence of cyber insurance. While it is new in terms of insurance products it has been around for several years and is quickly developing into something that many commercial organizations are starting to consider. The purpose of this presentation is to provide an overview of the cyber insurance marketplace\, the underwriting process and a shallow dive into the coverage provided by a typical policy. \nSpeaker: MICHAEL VOLK\, VP\, CYBER RISK SOLUTIONS\, PSA INSURANCE \nAs the lead for PSA’s Cyber Risk Solutions Practice\, Mike Volk is responsible for helping clients make informed decisions about cyber insurance and develop strategies to reduce cyber risk. For the past eight years he has worked in several roles where he helped individuals and organizations navigate the complex cybersecurity landscape. Mike is engaged in the cybersecurity community and currently serves on the Board of Directors for the Cybersecurity Association of Maryland\, Inc. (CAMI). Prior to joining PSA\, Mike worked with individual job-seekers\, industry experts\, as well as government organizations and contractors in areas related to cybersecurity training and workforce development. He has authored several articles on topics related to cyber risk\, cybersecurity education/training and cybersecurity workforce development. Mike contributed to Anne Arundel Community College as the Business Development Coordinator for the CyberCenter and Instructional Specialist for the Cyber and Technology Training area. He also served as the Cybersecurity Navigator and Project Coordinator for the Mayor’s Office of Employment Development in Baltimore City. \nPlease note new meeting schedule – February 2019\n5:15 to 5:45 Business Meeting\n5:45 to 6:15 Networking and Dinner\n6:15 to 7:45 Speaker and
URL:https://issa-centralmd.org/calendar/membership-meeting-4-24-2019/
LOCATION:MD
CATEGORIES:Meetings
END:VEVENT
BEGIN:VEVENT
DTSTART;VALUE=DATE:20190418
DTEND;VALUE=DATE:20190419
DTSTAMP:20260403T165325
CREATED:20190204T194828Z
LAST-MODIFIED:20190204T194828Z
UID:2537-1555545600-1555631999@issa-centralmd.org
SUMMARY:SANS Network Penetration Testing and Ethical Hacking
DESCRIPTION:SANS Network Penetration Testing and Ethical Hacking \nAs a cybersecurity professional\, you have a unique responsibility to find and understand your organization’s vulnerabilities and to work diligently to mitigate them before the bad guys pounce. Are you ready? SEC560\, the flagship SANS course for penetration testing\, fully arms you to address this duty head-on. \nFor additional details or to register for this class\, click HERE.
URL:https://issa-centralmd.org/calendar/sans-network-penetration-testing-and-ethical-hacking/
LOCATION:MD
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20190417T170000
DTEND;TZID=America/New_York:20190417T190000
DTSTAMP:20260403T165325
CREATED:20190326T184203Z
LAST-MODIFIED:20190404T001511Z
UID:2600-1555520400-1555527600@issa-centralmd.org
SUMMARY:ISSA Central MD Networking & Social Sponsored By Varonis
DESCRIPTION:Click Here to Register \n\nWhen: Wednesday\, April 17th from 5:00 – 7:00 PM EST\nLocation: Hysteria Brewing Company\, 9570 Berger Rd Suite J\, Columbia\, MD 21046\n\nClick Here to Register
URL:https://issa-centralmd.org/calendar/issa-central-md-networking-beer-social-sponsored-by-varonis/
LOCATION:Hysteria Brewing Company\, 9570 Berger Rd Suite J\, Columbia\, MD\, 21044
END:VEVENT
BEGIN:VEVENT
DTSTART;VALUE=DATE:20190402
DTEND;VALUE=DATE:20190403
DTSTAMP:20260403T165325
CREATED:20190321T000205Z
LAST-MODIFIED:20190321T000205Z
UID:2594-1554163200-1554249599@issa-centralmd.org
SUMMARY:SIM Philadelphia Technology Leadership Summit
DESCRIPTION:Join Innovative Thought Leaders from around the country sharing their real experiences and hundreds of your peers for a day of Networking\, Collaboration and Knowledge-Transfer \n\nYour Admission Gets You: \n– Opportunity to see world-class keynote speakers with real-life experiences: \nGreg Hiebert\, Managing Partner\, Leadership Forward  \nJulie Rieger\, President\, Chief Data Strategist & Head of Media\, 20th Century Fox Film– \nUnlimited access to all 16 breakout sessions \nAccess to an interactive learning experience with our sessions featuring: \nDigital Transformation • Economic Forecasts • Security & Risk • Leveraging Data \nBoard Pursuit • Large-Scale M&A • Innovative Tech Discussions \n– Opportunity to network with hundreds of local IT executives \n– Hot breakfast\, lunch and bottomless cups of coffee to fuel your day! \n\nRegister yourself & your team Today For FREE! \nwww.simphillysummit.org
URL:https://issa-centralmd.org/calendar/sim-philadelphia-technology-leadership-summit/
LOCATION:MD
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20190327T170000
DTEND;TZID=America/New_York:20190327T193000
DTSTAMP:20260403T165325
CREATED:20181217T022110Z
LAST-MODIFIED:20190402T170004Z
UID:2279-1553706000-1553715000@issa-centralmd.org
SUMMARY:Membership Meeting 3/27/2019
DESCRIPTION:Chapter Business Meeting Slides: 2019-03-27-Meeting-Presentation \nTopic: An Update on Deep Content Inspection and DLP for Government \nDeep Content Inspection!  OK right\, but what is Deep Content Inspection?  Is it the ability to work in highly regulated federal agencies?  Is it working with other vendors to ensure that file transfers are reviewed prior to allowing? Or ensuring that data transfers to removable media drives do not contain sensitive information? Is it automatically encrypting email messages that contain sensitive information in them? How about all of the above?  Today\, advanced security and data loss prevention features are needed to combat information borne threats across a wide range of technologies. \nSpeaker: Scott Messick\, Senior Sales Engineer with Clearswift  \nScott Messick is a Senior Sales Engineer with Clearswift based in New Jersey. In this role he works with the largest Clearswift customers and prospects across North and South America. Scott joined Clearswift about two years ago\, after 12 years with Credit Agricole Corporate Investment Bank (CA-CIB). While with Credit Agricole\, Scott was a Windows Technical Lead\, a Windows Platform Engineer\, a Windows Platform Group Manager and was promoted to Vice President. Scott also served on the IT and IT Security Management Committees that oversaw all North and South America IT and IT Security infrastructure operations for the Bank. \nPlease note new meeting schedule – February 2019\n5:15 to 5:45 Business Meeting\n5:45 to 6:15 Networking and Dinner\n6:15 to 7:45 Speaker and Questions
URL:https://issa-centralmd.org/calendar/membership-meeting-3-27-2019/
LOCATION:UMBC Training Centers\, 6996 Columbia Gateway Dr.\, Suite 100\, Columbia\, MD\, 21046\, United States
CATEGORIES:Meetings
END:VEVENT
BEGIN:VEVENT
DTSTART;VALUE=DATE:20190310
DTEND;VALUE=DATE:20190311
DTSTAMP:20260403T165325
CREATED:20190207T182825Z
LAST-MODIFIED:20190207T183414Z
UID:2545-1552176000-1552262399@issa-centralmd.org
SUMMARY:Girl Power STEM Event at JHUAPL
DESCRIPTION:APL hosts Girl Power\, a STEM expo for elementary and middle school students\, with support from the Maryland Space Business Roundtable. The annual event features hands-on activities\, cool demonstrations\, and take-home material for the students to encourage an interest in STEM careers. Visitors have the opportunity to talk to professional women in STEM careers such as aerospace\, computer science\, electrical engineering\, geology\, information technology\, and space mission engineering. You can find more information by clicking on the flyer @ https://www.jhuapl.edu/STEM/Content/docs/GirlPower2019Flyer.pdf.  The event is free and no registration is required. Girl Power is scheduled for March 10\, 2019.
URL:https://issa-centralmd.org/calendar/girl-power-stem-event-at-jhuapl/
LOCATION:MD
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20190227T170000
DTEND;TZID=America/New_York:20190227T193000
DTSTAMP:20260403T165325
CREATED:20181217T022018Z
LAST-MODIFIED:20190319T232821Z
UID:2277-1551286800-1551295800@issa-centralmd.org
SUMMARY:Membership Meeting 2/27/2019
DESCRIPTION:Meeting Presentation: 2019-02-27 Meeting Presentation \nSpeaker Presentation: Hacking Social Media – ZeroFOX \n\n\nSocial Media Protection For Dummies: Download free book\, click HERE. \nTopic: What is Social Media Security? \nSocial media security is the process of analyzing dynamic social media data in order to protect against security and business threats.. Every industry faces a unique set of risks on social\, many of which have put organizations in the press or at the center of controversy. \nSpeaker: Christopher Cullison\, VP Emerging Technologies @ ZeroFOX \nCo-founder of ZeroFOX and Vice President of Emerging Technologies\, has over 16 years of experience in the software industry. Christopher has worked with and managed large scale applications for Fortune 50 corporations\, specializing in advanced enterprise architecture solutions. His expertise includes reverse engineering\, code inspection\, dynamic integrations\, and cyber-security. Chris has worked as a consulting expert in patent litigation\, specializing in patent and prior art analysis. Besides holding multiple coding and security certifications\, he speaks regularly about innovative coding at security conferences. Chris has a Bachelors in Business Information Systems from Stevenson University. \nPlease note new meeting schedule – February 2019\n5:15 to 5:45 Business Meeting\n5:45 to 6:15 Networking and Dinner\n6:15 to 7:45 Speaker and Q&A
URL:https://issa-centralmd.org/calendar/membership-meeting-2-27-2019/
LOCATION:MD
CATEGORIES:Meetings
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20190218T000000
DTEND;TZID=America/New_York:20190218T000000
DTSTAMP:20260403T165325
CREATED:20160927T155330Z
LAST-MODIFIED:20160927T170825Z
UID:532-1550448000-1550448000@issa-centralmd.org
SUMMARY:Presidents Day (Washingtons Birthday)
DESCRIPTION:
URL:https://issa-centralmd.org/calendar/presidents-day-washingtons-birthday-8/
LOCATION:MD
CATEGORIES:Holidays
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20190124T084500
DTEND;TZID=America/New_York:20190124T154500
DTSTAMP:20260403T165325
CREATED:20190103T121619Z
LAST-MODIFIED:20190103T121619Z
UID:2392-1548319500-1548344700@issa-centralmd.org
SUMMARY:Infragard Cybersecurity Conference
DESCRIPTION:InfraGard Md will be hosting its inaugural Cyber Security event. The theme of this event is Cyber Incident Response. This event will be open to the public and you do not need to be an InfraGard Member to attend. \nInfraGard is a partnership between the FBI and members of the private sector. The InfraGard program provides a vehicle for seamless public-private collaboration with government that expedites the timely exchange of information and promotes mutual learning opportunities relevant to the protection of Critical Infrastructure. With thousands of vetted members nationally\, InfraGard’s membership includes business executives\, entrepreneurs\, military and government officials\, computer professionals\, academia and state and local law enforcement; each dedicated to contributing industry specific insight and advancing national security. Audience – Government and private sector employees\, CISOs\, InfraGard members (currently over 1000 in chapter)\, fusion centers\, state\, county\, local law enforcement. \nPurpose: Raise Cybersecurity awareness within the Maryland Community \nSession Topics: \n\nBe aware of cyber threats to Maryland organizations.\nProvide incident response and “what do I do now” scenarios.\nHelp participants understand the lifecycle of threats\, protection\, and business risk.\nCyber hygiene\nOverall training and education\n\nDesired speaker types: IT Security and CISO\, Business executives not in cyber\, Resilience\, gov\, law enforcement\, legislators. \nGoals: \n\nProvide high-demand cyber content to Maryland community\nInform community on Threats and Trends\nProvide usable pathways for action\nAnswer unanswered questions about security\nCreate engagement between industry\, government and InfraGard
URL:https://issa-centralmd.org/calendar/infragard-cybersecurity-conference/
LOCATION:Riggs Alumni Center – University of Maryland
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20190123T170000
DTEND;TZID=America/New_York:20190123T193000
DTSTAMP:20260403T165325
CREATED:20181217T021913Z
LAST-MODIFIED:20190123T231913Z
UID:2275-1548262800-1548271800@issa-centralmd.org
SUMMARY:Membership Meeting 1/23/2019
DESCRIPTION:Meeting Presentation: 2019-01-23 Meeting Presentation \nSpeaker Presentation: What is Cyber Threat Intelligence? \nJohn Stoner and Ronnie Obenhaus will present on how gathering threat intelligence data is necessary to combat various threat actors from nation states.  Threat intelligence solutions gather raw data about emerging or existing threat actors and threats from a number of sources. CTI data is  analyzed and filtered to produce threat intelligence feeds and management reports that contain information that can be used by automated security control solutions. The primary purpose of this type of security is to keep organizations informed of the risks of advanced persistent threats\, zero-day threats and exploits\, and how to protect against them. \nSpeaker: John Stoner & Ronnie Obenhaus \nCyber Threat Intelligence Analyst John Stoner has over 18 years of experience in the national security and defense sector working a variety of roles\, including most recently as a Cyber Threat Intelligence Analyst\, Cyber Counterintelligence Analyst and Cyber Instructor. His work experience includes IT\, instruction and course design\, cyber exercise and testing\, penetration testing\, intelligence collection\, threat support\, SIGINT (Signals Intelligence)\, and Cyber Operations. He holds A+\, Net+\, CEH\, CHFI\, CEI\, CISD\, CASP and CISSP and a Computer Studies degree from UMUC. He is a huge soccer fan and coaches youth soccer. You may see his Zombie response car at unnamed government facilities. By secretly joining the Army at 19 years old\, he got started in military intelligence and then eventually government cybersecurity. \nCyber Threat Intelligence Analyst Ronnie Obenhaus is a US Army Veteran and is not good at providing additional facts for his bio. He is married and has several children (amount variable). He may or may not have pets\, but seems to like dogs. He currently is a DOD civilian at a federal cyber agency. \nAgenda: \n\n5:15 – 5:45 (Chapter Business)\n5:45 – 6:15 (Food / Networking)\n6:15 – 7:15 (Presentation / Q&A)
URL:https://issa-centralmd.org/calendar/membership-meeting-1-23-2019/
LOCATION:UMBC Training Centers\, 6996 Columbia Gateway Dr.\, Suite 100\, Columbia\, MD\, 21046\, United States
CATEGORIES:Meetings
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20190121T000000
DTEND;TZID=America/New_York:20190121T000000
DTSTAMP:20260403T165325
CREATED:20160927T155330Z
LAST-MODIFIED:20160927T170826Z
UID:531-1548028800-1548028800@issa-centralmd.org
SUMMARY:Martin Luther King Jr. Day
DESCRIPTION:
URL:https://issa-centralmd.org/calendar/martin-luther-king-jr-day-8/
LOCATION:MD
CATEGORIES:Holidays
END:VEVENT
BEGIN:VEVENT
DTSTART;VALUE=DATE:20190101
DTEND;VALUE=DATE:20190102
DTSTAMP:20260403T165325
CREATED:20160927T155330Z
LAST-MODIFIED:20160930T181154Z
UID:530-1546300800-1546387199@issa-centralmd.org
SUMMARY:New Year Day
DESCRIPTION:
URL:https://issa-centralmd.org/calendar/new-year-day-7/
LOCATION:MD
CATEGORIES:Holidays
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20181225T000000
DTEND;TZID=America/New_York:20181225T000000
DTSTAMP:20260403T165325
CREATED:20160927T155330Z
LAST-MODIFIED:20160927T170847Z
UID:529-1545696000-1545696000@issa-centralmd.org
SUMMARY:Christmas Day
DESCRIPTION:
URL:https://issa-centralmd.org/calendar/christmas-day-7/
LOCATION:MD
CATEGORIES:Holidays
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20181219T170000
DTEND;TZID=America/New_York:20181219T193000
DTSTAMP:20260403T165325
CREATED:20171112T231742Z
LAST-MODIFIED:20190114T022042Z
UID:1793-1545238800-1545247800@issa-centralmd.org
SUMMARY:Membership Meeting 12/19/2018
DESCRIPTION:ISSA Central MD Chapter Meeting Presentation: 2018-12-19-Meeting-Presentation.pdf \nSpeaker Presentation: Human Securty Officer \nTopic: Creating a Human Security Officer \nWhile everyone acknowledges that users are the top security vulnerability\, they rely upon awareness to solve the problem\, despite the fact that awareness is far from perfect. To solve this problem in a coordinated way\, what is required is not an awareness manager\, but a Human Security Officer who is responsible for looking at human vulnerabilities and determining the optimal way to mitigate the vulnerability through a combination of process and technology. As opposed to trying to tell people what not to do\, the HSO implements technology that reduces the likelihood of attacks reaching users\, and creates business processes that tells users how to do their jobs correctly. Awareness programs are then implemented to inform people how to do their jobs correctly. This presentation will cover the implementation of a Human Security Officer. \nSpeaker: Ira Winkler\, CISSP\, President of Secure Mentem \nHe is considered one of the world’s most influential security professionals\, and has been named a “Modern Day James Bond” by the media. He did this by performing espionage simulations\, where he physically and technically “broke into” some of the largest companies in the World and investigating crimes against them\, and telling them how to cost effectively protect their information and computer infrastructure. He continues to perform these espionage simulations\, as well as assisting organizations in developing cost effective security programs. Ira also won the Hall of Fame award from the Information Systems Security Association\, as well as several other prestigious industry awards. Most recently\, CSO Magazine named Ira a CSO Compass Award winner as The Awareness Crusader. \nIra is also author of the riveting\, entertaining\, and educational books\, Advanced Persistent Security\, Spies Among Us and Zen and the Art of Information Security. He is also a columnist for ComputerWorld\, and writes for several other industry publications. \n 
URL:https://issa-centralmd.org/calendar/membership-meeting-12192018/
LOCATION:MD
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20181128T170000
DTEND;TZID=America/New_York:20181128T193000
DTSTAMP:20260403T165325
CREATED:20171112T231511Z
LAST-MODIFIED:20181219T021341Z
UID:1791-1543424400-1543433400@issa-centralmd.org
SUMMARY:Membership Meeting 11/28/2018
DESCRIPTION:Business Meeting Slides: 2018-10-24-Meeting-Presentation.pdf \nSpeaker: Colton McQue\, Zscaler \nTopic: No Network Needed?!?! \nIt seems every day\, we are bombarded with news of yet another breach and our personal information being traded and sold on the dark web/Internet.  We lose sleep wondering if we have the right controls and policies in place to prevent our companies and our names from appearing in the next morning’s headlines.  Is it time for a different approach?  What if we could get rid of our network so we no longer had to define complex boundaries and policies?  Is it really possible to architect a system that removes all the traditional ingress and egress points?  If we resign ourselves to the fact that it’s not IF but WHEN our network gets breached….then why do we still have a network?
URL:https://issa-centralmd.org/calendar/membership-meeting-11212018/
LOCATION:MD
CATEGORIES:Meetings
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20181122T000000
DTEND;TZID=America/New_York:20181122T000000
DTSTAMP:20260403T165325
CREATED:20160927T155330Z
LAST-MODIFIED:20160927T170847Z
UID:528-1542844800-1542844800@issa-centralmd.org
SUMMARY:Thanksgiving Day
DESCRIPTION:
URL:https://issa-centralmd.org/calendar/thanksgiving-day-7/
LOCATION:MD
CATEGORIES:Holidays
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20181112T000000
DTEND;TZID=America/New_York:20181112T000000
DTSTAMP:20260403T165325
CREATED:20160927T155330Z
LAST-MODIFIED:20160927T170847Z
UID:527-1541980800-1541980800@issa-centralmd.org
SUMMARY:Veterans Day
DESCRIPTION:
URL:https://issa-centralmd.org/calendar/veterans-day-8/
LOCATION:MD
CATEGORIES:Holidays
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20181107T073000
DTEND;TZID=America/New_York:20181107T180000
DTSTAMP:20260403T165325
CREATED:20180730T002716Z
LAST-MODIFIED:20180730T002716Z
UID:2147-1541575800-1541613600@issa-centralmd.org
SUMMARY:FITSC 2018
DESCRIPTION:The Federal IT Security Institute (FITSI) in partnership with Phoenix TS is hosting the third annual Federal IT Security Conference. Speakers from NIST\, DHS\, the Defense Department as well as private industry will be in attendance discussing the themes and trends that are influencing the Federal/DoD cyber landscape. This year’s conference will take place on Wednesday\, November 7 at the Samuel Riggs IV Alumni Center. \nAll proceeds from the event will go towards retraining members of the Wounded Warriors organization to become cyber defenders! \nPlease click here for a downloadable PDF overview of the conference. \nAbout the Federal IT Security Institute\nThe Federal IT Security Institute (FITSI)\, based in Alexandria\, Virginia\, offers role-based certification to four groups of federal IT professionals: managers\, designers\, operators and auditors. FITSI provides certification exams with the objective of making federal IT systems more secure by assuring that the people who create and manage them understand and apply the appropriate federal IT security standards. FITSI is based in Alexandria\, VA. \nAbout PhoenixTS\nSince 1998\, Phoenix TS has committed and delivered on the promise of high quality training services with results at an affordable price point\, earning the trust of both public and private sector customers by consistently delivering excellent training results at an affordable price point. We offer a full catalog of vendor specific and vendor agnostic IT\, business process\, and management training solutions. Our focus on building an enjoyable learning environment is a major reason our students return time after time. \nAbout the Wounded Warrior Cyber Combat Academy (W2CCA)\nThe mission of the Wounded Warrior Cyber Combat Academy (W2CCA) is “To Build the Next Generation of Cyber Defenders by Cross-Training the League of Wounded Warriors to help Protect and Defend the Nation’s Information Systems.” The W2CCA program is run by the FITSI Foundation which is a 501c3 public charity.
URL:https://issa-centralmd.org/calendar/fitsc-2018/
LOCATION:University of Maryland College Park\, 7801 Alumni Drive\, MD\, 20707
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20181024T170000
DTEND;TZID=America/New_York:20181024T193000
DTSTAMP:20260403T165325
CREATED:20171112T231348Z
LAST-MODIFIED:20181025T003602Z
UID:1789-1540400400-1540409400@issa-centralmd.org
SUMMARY:Membership Meeting 10/24/2018
DESCRIPTION:October 24\, 2018 General Meeting\n\nGeneral Meeting Slides: 2018-10-24-Meeting-Presentation.pdf \nSpeaker Presentation: The devil is in the details \nSpeaker: Greg Schwartzkopf\, Fortinet \nGreg Schwartzkopf is a Sr. Systems Engineering Director at Fortinet\, Inc. with 22 years active in cybersecurity. As a reformed hacker\, serial tinkerer\, and technology lover\, his insights on the cybersecurity world are anchored in being a part of it since it’s inception. His vast experience on the ground shows in his no-nonsense advice on practical ways security professionals everywhere can increase their knowledge\, understanding and security posture in today’s complex business world.\n\nTopic: The devil is in the details: Nuanced conversations about cybersecurity \nSummary: As security professionals each day we get inundated with news\, buzzwords\, product pitches\, analyst summaries and a constant reminder by everyone around us that the sky is falling. Most of what is repeated to us over and over\, however\, is completely irrelevant to actually providing security to our customers. Join me for an interactive conversation about what’s pragmatic in this sensational world\, how we can have more nuanced conversations about security— and most important\, why not to be afraid of “I don’t know.” \n 
URL:https://issa-centralmd.org/calendar/membership-meeting-10242018/
LOCATION:MD
END:VEVENT
END:VCALENDAR