BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//Central Maryland Chapter of ISSA - ECPv6.15.18//NONSGML v1.0//EN
CALSCALE:GREGORIAN
METHOD:PUBLISH
X-ORIGINAL-URL:https://issa-centralmd.org
X-WR-CALDESC:Events for Central Maryland Chapter of ISSA
REFRESH-INTERVAL;VALUE=DURATION:PT1H
X-Robots-Tag:noindex
X-PUBLISHED-TTL:PT1H
BEGIN:VTIMEZONE
TZID:America/New_York
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20190310T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20191103T060000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20200308T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20201101T060000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20210314T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20211107T060000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20220313T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20221106T060000
END:STANDARD
END:VTIMEZONE
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20200901T083000
DTEND;TZID=America/New_York:20200901T133000
DTSTAMP:20260403T160707
CREATED:20200628T024240Z
LAST-MODIFIED:20200819T020826Z
UID:3301-1598949000-1598967000@issa-centralmd.org
SUMMARY:Insider Threat Day at Johns Hopkins University Applied Physics Lab
DESCRIPTION:The Insider Threat Day at Johns Hopkins University Applied Physics Lab\, hosted by the ISSA Central Maryland Chapter\, will take place on Monday\, September 1\, 2020. This one-day event will be part of the Insider Threat Awareness Month declared by the U.S. National Counterintelligence and Security Center (NSCS) and the National Insider Threat Task Force (NITTF). The goal of Insider Threat Day is to raise awareness and help organizations develop proactive strategies for detecting and combating these threats\, as well as to reduce the risk of compromised information. \nRegister at https://www.fbcinc.com/e/JHU/attendeereg.aspx \n\nEarly Bird registration price for Industry is $75 and ends on 7/31/2020. Afterward\, the registration price will be $100.\nThere is no cost for Government\, ISSA members\, or JHU/APL Employees to register for this event.\n\nJohns Hopkins Applied Physics Lab is the nation’s largest university-affiliated research center and provides U.S. government agencies with deep expertise in specialized fields to support national priorities and technology development programs. They also serve as independent trusted technical agents to the government\, providing continuity for highly complex\, multigenerational technology development systems. To find out more about JHU/APL\, please visit https://www.jhuapl.edu/ \n  \nThis conference is brought to you by the ISSA Central Maryland Chapter and the Federal Business Council.
URL:https://issa-centralmd.org/calendar/insider-threat-day-at-johns-hopkins-university-applied-physics-lab/
LOCATION:JHU Kossiakoff Conference Center\, 11100 Johns Hopkins Road\, Laurel\, MD\, 20723
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20200902T110000
DTEND;TZID=America/New_York:20200902T133000
DTSTAMP:20260403T160707
CREATED:20200823T225155Z
LAST-MODIFIED:20200823T225740Z
UID:3370-1599044400-1599053400@issa-centralmd.org
SUMMARY:Cyber Threat Hunting Workshop
DESCRIPTION:Join RedSeal and ISSA Central Maryland on Thursday\, August 13\, 2020 at 11:30am ET\, for a free virtual Cyber Threat Hunting workshop for cybersecurity practitioners. \nLearn to identify potential attack vectors that bad actors could use to exploit existing vulnerabilities \nDuring the event\, you will leverage the RedSeal platform to assess the overall cybersecurity posture of\, and threat hunt within\, a pre-built virtual network model while refining your skills in risk and vulnerability assessment\, cyber hunting\, and incident response. \nAt the completion of the session\, you will have learned how to: \n\nEasily identify devices on the network that pose the most risk to your enterprise\nIdentify devices across your enterprise that have network access and exploitable vulnerabilities\nQuickly visualize where aggressors can pivot following system compromise\nCoordinate with other teams to enhance digital resilience\n\nClick Here to Register
URL:https://issa-centralmd.org/calendar/cyber-threat-hunting-workshop/
LOCATION:Virtual
CATEGORIES:Training
END:VEVENT
BEGIN:VEVENT
DTSTART;VALUE=DATE:20200905
DTEND;VALUE=DATE:20200907
DTSTAMP:20260403T160707
CREATED:20200210T032446Z
LAST-MODIFIED:20200316T125201Z
UID:3101-1599264000-1599436799@issa-centralmd.org
SUMMARY:BSidesCharm
DESCRIPTION:BSidesCharm is a regional Security B-Sides held in Baltimore\, MD. It operates under the umbrella principles of Security B-Sides as a larger community project within information security. The goal of BSides is to offer small\, intimate events where all participants can engage each other to help develop connections\, friendships\, and network with different industry professionals.\n\nWe recognize the value in engaging a smaller audience and being the big fish in a small pond. Every organization will have different goals and priorities which is why we offer different levels of participation for every individual\, group\, or organization. We specifically designed several different options for any sized organization to participate and support this event.
URL:https://issa-centralmd.org/calendar/bsidescharm/
LOCATION:MD
CATEGORIES:Miscellaneous
END:VEVENT
BEGIN:VEVENT
DTSTART;VALUE=DATE:20200907
DTEND;VALUE=DATE:20200908
DTSTAMP:20260403T160707
CREATED:20160927T155332Z
LAST-MODIFIED:20160930T125930Z
UID:545-1599436800-1599523199@issa-centralmd.org
SUMMARY:Labor Day
DESCRIPTION:
URL:https://issa-centralmd.org/calendar/labor-day-10/
LOCATION:MD
CATEGORIES:Holidays
END:VEVENT
BEGIN:VEVENT
DTSTART;VALUE=DATE:20200908
DTEND;VALUE=DATE:20200910
DTSTAMP:20260403T160707
CREATED:20200413T022408Z
LAST-MODIFIED:20200413T022408Z
UID:3207-1599523200-1599695999@issa-centralmd.org
SUMMARY:Billington CyberSecurity Summit
DESCRIPTION:Following a sold-out Summit in 2019\, the 11th Annual CyberSecurity Summit promises to continue the proud tradition of convening the top “who’s who” in cybersecurity leadership for an unparalleled two days of high-level networking and knowledge-sharing to advocate cyber mission in the U.S. and among allied countries.
URL:https://issa-centralmd.org/calendar/billington-cybersecurity-summit/
LOCATION:MD
CATEGORIES:Miscellaneous
END:VEVENT
BEGIN:VEVENT
DTSTART;VALUE=DATE:20200919
DTEND;VALUE=DATE:20200920
DTSTAMP:20260403T160707
CREATED:20191214T143827Z
LAST-MODIFIED:20191214T143827Z
UID:2988-1600473600-1600559999@issa-centralmd.org
SUMMARY:Rosh Hashanah Jewish Holiday
DESCRIPTION:
URL:https://issa-centralmd.org/calendar/rosh-hashanah-jewish-holiday/
LOCATION:MD
CATEGORIES:Holidays
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20200923T170000
DTEND;TZID=America/New_York:20200923T193000
DTSTAMP:20260403T160707
CREATED:20191214T143109Z
LAST-MODIFIED:20200923T224911Z
UID:2980-1600880400-1600889400@issa-centralmd.org
SUMMARY:Membership Meeting 9/23/2020
DESCRIPTION:Chapter Business Meeting Slides: 2020-09-23-Meeting-Presentation.pdf \nSpeaker Slides: UAS-Forensics-Framework-2020-09-23.pdf \nTopic: A Study on Drone Forensics Framework \nAs consumer unmanned aircraft systems (UAS) or drones are used more commonly in public areas\, an approach for a drone forensics framework is needed to guide forensics investigators in analyzing recovered drones that entered the unauthorized national airspace system (NAS). The presentation is based on a doctoral research study focused on whether a single framework and multiple frameworks for drone forensics. The data collected through an online survey provided detailed descriptions of the participants’ most commonly used forensics frameworks or guidelines. The data collected from participants in the United States measured the occurrences of the type of guidelines forensics examiners used. The results of the study identified a need for a standard drone forensic framework across digital forensic disciplines and aircraft accident investigation for use by investigators to produce admissible evidence for litigation in the U.S. courts. The research led to a proposed basic drone forensics framework\, which can be improved upon in future research. \nSpeaker: Nagi Mei\, D.Sc. \n\nDr. Nagi Mei has over 14 years in management and technology consulting service offerings to the commercial and health industries\, and federal\, state\, and local governments. She has extensive experience in strategic initiatives and operational responsibilities grounded in information security management. Dr. Mei is a project manager where she leads teams in implementing information security projects. Dr. Mei received a Doctor of Science in Cybersecurity from the Capitol Technology University. She holds a Master in Business Administration\, a Master of Science in Information and Telecommunications Systems from the Johns Hopkins Carey Business School\, and a Bachelor of Science in Information Systems concentrating in Digital Forensics from the Johns Hopkins University. She holds certifications in Sec+\, PMP\, PMI-ACP\, SSM\, CSM\, and ITILv3.
URL:https://issa-centralmd.org/calendar/membership-meeting-9-23-2020/
LOCATION:Virtual via Zoom\, MD
CATEGORIES:Meetings
END:VEVENT
BEGIN:VEVENT
DTSTART;VALUE=DATE:20200928
DTEND;VALUE=DATE:20200929
DTSTAMP:20260403T160707
CREATED:20191214T143949Z
LAST-MODIFIED:20191214T143949Z
UID:2990-1601251200-1601337599@issa-centralmd.org
SUMMARY:Yom Kippur Jewish Holiday
DESCRIPTION:
URL:https://issa-centralmd.org/calendar/yom-kippur-jewish-holiday/
LOCATION:MD
CATEGORIES:Holidays
END:VEVENT
BEGIN:VEVENT
DTSTART;VALUE=DATE:20200930
DTEND;VALUE=DATE:20201001
DTSTAMP:20260403T160707
CREATED:20200225T230013Z
LAST-MODIFIED:20200827T233628Z
UID:3146-1601424000-1601510399@issa-centralmd.org
SUMMARY:Data Connectors Baltimore 2020
DESCRIPTION:Capital Region:\nVirtual Cybersecurity Summit\nA live\, interactive experience!\nWednesday\, September 30th\nMore than 70\,000 members of the Data Connectors Cybersecurity Community are in the DC area. The Virtual Summit will be conducted in real time\, with the same panels\, presentations and solution provider exhibits and demonstrations \nComplimentary Registration Includes:\n\nKeynote presentation\nCIO/CISO Panel Discussion\nCybersecurity expert presentations\nVirtual exhibits from solution providers with chat capability\nCPE Credits\nPrizes such as Air Pods\, XBox\, Amazon Gift Cards and lots more…\n\nRegister Here
URL:https://issa-centralmd.org/calendar/data-connectors-baltimore-2020/
LOCATION:MD
CATEGORIES:Miscellaneous
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20201008T100000
DTEND;TZID=America/New_York:20201008T160000
DTSTAMP:20260403T160707
CREATED:20200922T211257Z
LAST-MODIFIED:20200922T211404Z
UID:3407-1602151200-1602172800@issa-centralmd.org
SUMMARY:Virtual Threat Defense Challenge
DESCRIPTION:Join our security experts for a hands-on learning experience as you navigate a simulated cyberattack in real-time. Learn to “think like a hacker” and then respond to and defend valuable assets. Whether you are a novice or a skilled security professional\, this experience has something for everyone. \nCompete in teams alongside your peers to run cyberattacks in a controlled environment. Premium prizes will be given to the team with the most points. \nJoin this action-packed session and learn to:  \n\nUnderstand the tools and techniques used by hackers\nIdentify infrastructure security gaps\nPlan and implement security measures\n\nThere’s no cost to attend. Just bring your best game! \nRegister Here; https://resources.trendmicro.com/2020-Q4-NE-MA_TDC_OCT8.html
URL:https://issa-centralmd.org/calendar/virtual-threat-defense-challenge/
LOCATION:Virtual
CATEGORIES:Training
END:VEVENT
BEGIN:VEVENT
DTSTART;VALUE=DATE:20201012
DTEND;VALUE=DATE:20201013
DTSTAMP:20260403T160707
CREATED:20160927T155332Z
LAST-MODIFIED:20160930T125753Z
UID:546-1602460800-1602547199@issa-centralmd.org
SUMMARY:Columbus Day
DESCRIPTION:
URL:https://issa-centralmd.org/calendar/columbus-day-10/
LOCATION:MD
CATEGORIES:Holidays
END:VEVENT
BEGIN:VEVENT
DTSTART;VALUE=DATE:20201019
DTEND;VALUE=DATE:20201024
DTSTAMP:20260403T160707
CREATED:20200722T101510Z
LAST-MODIFIED:20200722T101510Z
UID:3334-1603065600-1603497599@issa-centralmd.org
SUMMARY:EC-Council - Hacker Halted Virtual Cyber Security Training and Conference 2020
DESCRIPTION:Hacker Halted is a global series of computer and information security conferences presented by EC-Council. Hacker Halted is a global series of computer and information security conferences presented by EC-Council. The objective of the hacker halted conferences is to raise international awareness towards increased education and ethics in IT security.
URL:https://issa-centralmd.org/calendar/ec-council-hacker-halted-virtual-cyber-security-training-and-conference-2020/
LOCATION:Virtual
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20201028T170000
DTEND;TZID=America/New_York:20201028T193000
DTSTAMP:20260403T160707
CREATED:20191214T143204Z
LAST-MODIFIED:20201111T151355Z
UID:2982-1603904400-1603913400@issa-centralmd.org
SUMMARY:Membership Meeting 10/28/2020
DESCRIPTION:Chapter Business Meeting Slides: 2020-10-28- Meeting Presentastion.pdf \nSpeaker Slides: 30 Years 20-10-28.pdf \nTopic: Lessons Learned from 30 Years of Security Awareness Efforts \nOrganisations acknowledge that employees are often the weakest link\, yet efforts to improve ‘user awareness’ tend to rely upon available tools and not true experience. Drawing on three decades of awareness efforts and experience improving true security behaviours\, Ira Winkler will dispel many commonly held beliefs about security awareness\, detailing what consistently works and what does not. \nLearning Objectives:\n1: Learn and apply what works consistently across hundreds of organisational awareness efforts.\n2: Learn from research in other disciplines that improves awareness efforts.\n3: Learn how to create a security culture that drives individual security behaviours. \nSpeaker: Ira Winkler\, President\, Secure Mentem \n\n\nIra Winkler\, CISSP\, is the President of Secure Mentem and Author of Advanced Persistent Security\, and the forthcoming books\, You Can Stop Stupid and Security Awareness for Dummies. He is considered one of the world’s most influential security professionals and was named “The Awareness Crusader” by CSO magazine in receiving their CSO COMPASS Award. He also received the ISSA Hall of Fame award. He has designed and implemented and supported security awareness programs at organizations of all sizes\, in all industries\, around the world. Ira began his career at the National Security Agency\, where he served in various roles as an Intelligence and Computer Systems Analyst. He has since served in other positions supporting the cybersecurity programs in organizations of all sizes. Ira’s new book can be preordered here: https://tiny.cc/stupidbook
URL:https://issa-centralmd.org/calendar/membership-meeting-10-28-2020/
LOCATION:Virtual via Zoom\, MD
CATEGORIES:Meetings
END:VEVENT
BEGIN:VEVENT
DTSTART;VALUE=DATE:20201111
DTEND;VALUE=DATE:20201112
DTSTAMP:20260403T160707
CREATED:20160927T155332Z
LAST-MODIFIED:20160930T125850Z
UID:547-1605052800-1605139199@issa-centralmd.org
SUMMARY:Veterans Day
DESCRIPTION:
URL:https://issa-centralmd.org/calendar/veterans-day-10/
LOCATION:MD
CATEGORIES:Holidays
END:VEVENT
BEGIN:VEVENT
DTSTART;VALUE=DATE:20201116
DTEND;VALUE=DATE:20201119
DTSTAMP:20260403T160707
CREATED:20200721T233623Z
LAST-MODIFIED:20200721T233623Z
UID:3327-1605484800-1605743999@issa-centralmd.org
SUMMARY:(ISC)² Security Congress
DESCRIPTION:Join thousands of leading cybersecurity professionals virtually at (ISC)² Security Congress 2020 November 16-18. You will hear expert insights into the latest security challenges\, and share best practices for combating threats\, building teams and implementing the latest processes and procedures to better defend your organizations’ critical assets. We will discuss the latest issues facing the workforce\, explore pathways for career advancement and discover new tools and solutions together. \nAttend (ISC)² Security Congress from home and take advantage of the powerful collaboration that you can only find at a conference of your peers who are dedicated to helping one another solve the challenges we all face. \nEarly Bird pricing to (ISC)² members and associates of just $295 for an All-Access pass. Non-members will also benefit with Early Bird pricing of $395. Registration details will be announced when open. The Early Bird window will close on September 30. Registration and more information can be found Here!
URL:https://issa-centralmd.org/calendar/isc%c2%b2-security-congress/
LOCATION:Virtual
CATEGORIES:Training
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20201118T170000
DTEND;TZID=America/New_York:20201118T193000
DTSTAMP:20260403T160707
CREATED:20191214T143303Z
LAST-MODIFIED:20201202T174304Z
UID:2984-1605718800-1605727800@issa-centralmd.org
SUMMARY:Membership Meeting 11/18/2020
DESCRIPTION:Chapter Business Meeting Slides: 2020-11-18 – Meeting Presentastion.pdf\n\n\n\nSpeaker Slides: Roles of Artificial Intelligence and Deep Learning in Detecting Data Exfiltration \nTopic: Roles of Artificial Intelligence and Deep Learning in Detecting Data Exfiltration \nEssential Internet services are vital for many aspects of modern living\, yet those services remain valuable to threat actors who use them for network intrusions and data exfiltration. Dr. Pena completed a quantitative research study analyzing the ability of a Convolutional Neural Network (CNN) to detect Domain Name System (DNS) covert communications generated by the DNSExfiltrator open source tool. The results showed the CNN model had100% accuracy when exfiltrated file sizes exceeded 2 Kilobytes (KB) using the default (maximum) transmission packet size\, but its performance fell dramatically for files below 1 KB in size. \nAs AI/ML solutions become more prevalent in cybersecurity tools\, professionals must understand where a model’s strengths and weaknesses lay in order to apply appropriate risk mitigations\, such as tuning complimentary detection systems. \nSpeaker: Dr. Tomas Pena\, L3 Harris Technologies \n\n\nDr. Tomas Pena is the Chief Technologist for Cyber Operations at L3Harris Technologies’ Space and Airborne Systems Segment. In that role\, he’s responsible for cyber innovation and improving the resiliency of company products spanning land\, sea\, air\, space\, and cyber domains. He’s been in cyber-related systems engineering and defense contracting positions since 2013. Prior to that time\, he completed 20 years of service in the United States Air Force as a Cyberspace Operations Officer where he organized\, planned\, executed full-spectrum cyberspace operations\, stood up the United States Cyber Command’s 24/7 Joint Operations Center\, and led Air Force Business Transformation Initiatives at the Pentagon. Dr. Pena has also filled roles such as managing the Global Positioning System satellite control systems\, managing theater communications during Operations IRAQI FREEDOM and ENDURING FREEDOM. He is also the Founder and President of Parallax Cyber LLC\, a small business focused on training and educating the workforce in Cybersecurity and Cyber Conflict\, and the current Editor-in-Chief of the Military Cyber Professional Associations’ Military Cyber Affairs Journal. \n\n\nClick Here to register for the November 18\, 2020 General Membership Meeting
URL:https://issa-centralmd.org/calendar/membership-meeting-11-18-2020/
LOCATION:Virtual via Zoom\, MD
CATEGORIES:Meetings
END:VEVENT
BEGIN:VEVENT
DTSTART;VALUE=DATE:20201126
DTEND;VALUE=DATE:20201127
DTSTAMP:20260403T160707
CREATED:20160927T155333Z
LAST-MODIFIED:20160930T125831Z
UID:548-1606348800-1606435199@issa-centralmd.org
SUMMARY:Thanksgiving Day
DESCRIPTION:
URL:https://issa-centralmd.org/calendar/thanksgiving-day-9/
LOCATION:MD
CATEGORIES:Holidays
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20201216T120000
DTEND;TZID=America/New_York:20201216T130000
DTSTAMP:20260403T160707
CREATED:20201117T234508Z
LAST-MODIFIED:20201117T235451Z
UID:3475-1608120000-1608123600@issa-centralmd.org
SUMMARY:December 2020 "Lunch and Learn"
DESCRIPTION:O365 Lunch and Learn Abstract: We’ll navigate through uncharted security territory by analyzing the attack lifecycle in the cloud and dissecting a real-world attack. The same technology that makes the cloud dynamic can have the opposite effect on an organization’s ability to implement detection and response in cloud environments. This includes the adding additional layer of preventative controls in addition to MFA\, because it’s increasingly being bypassed in O365 as an example. Chris Morales\, Head of Analytics with Vectra\, will help us navigate through the uncharted security territory by analyzing the attack lifecycle in the cloud\, reviewing the top cloud security threats\, and dissecting a real-world cloud attack. Additionally\, he’ll provide key takeaways for managing access\, detection and response\, and security operations. \nThis event is sponsored by Vectra. \n \nClick Here to register for this event. Thanks.
URL:https://issa-centralmd.org/calendar/december-2020-lunch-and-learn/
LOCATION:Virtual via Zoom\, MD
CATEGORIES:Miscellaneous
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20201216T170000
DTEND;TZID=America/New_York:20201216T193000
DTSTAMP:20260403T160707
CREATED:20191214T143442Z
LAST-MODIFIED:20210316T223344Z
UID:2986-1608138000-1608147000@issa-centralmd.org
SUMMARY:Membership Meeting 12/16/2020
DESCRIPTION:December meeting is sponsored:  \n \nhttps://redcanary.com/\nClick Here for more information about on meeeting sponsor. \n\nChapter Business Meeting Slides: 2020-12-16 Membership Meeting \n\n\n\nSpeaker Slides: Least Privilege with PowerShell JEA \n\n\nSpeaker Recording: Least Privilege with PowerShell JEA \nTopic: PowerShell JEA \nPowerShell JEA allows us Systems Administrators to empower our fellow admins\, developers\, and security personal to accomplish what they need to on our systems. Give them just enough administrative permissions to accomplish their duties without interrupting your day or night. This talk shows how to assign roles and give the appropriate permissions to those roles. \nSpeaker: James Honeycutt \n\n\nJames is a dedicated cybersecurity professional who enjoys scripting and participating in capture the flags. He has served over 20 years in the military in various technical and leadership positions. He is part of a Cyber Protection Team and serve as the Microsoft Windows Expert.  In past assignments\, he served as the OIC (Officer in Charge) of both the battalion IT shop and brigade logistics IT shop\, he was the “technology adviser to the Commander”. He has  also served as a systems administrator\, helpdesk manager\, and classroom support tech.  Some of his additional duties included being an Information Assurance Manager Alternate and Network Admin backup. \n​James is working as a SANs Mentor and TrilogyEd TA.  For SANs\, he is mentoring SEC505 (Securing Windows and PowerShell Automation) and SEC511 (Continuous Monitoring and Security Operations) and for TrilogyEd\, He is TA’ing a Cyber Security Bootcamp \nDuring his career\, James has been known as the “go-to guy” for IT questions and problems by his directors\, commanders\, and peers. He has received numerous awards for his work and knowledge\, to include several Meritorious Service Medals and Company Grade Officer of the Year for the state of Arkansas.  He has a Bachelors of Science in Management in Information Systems.  James holds the following certifications: CISSP\, VCP5-DCV\, GWAPT\, GPYC\, GMON\, GCWN\, GPEN\, GCIA\, GCIH\, GCFA\, GSEC\, GSNA\, SEC +\, C|EH
URL:https://issa-centralmd.org/calendar/membership-meeting-12-16-2020/
LOCATION:Virtual via Zoom\, MD
CATEGORIES:Meetings
END:VEVENT
BEGIN:VEVENT
DTSTART;VALUE=DATE:20201225
DTEND;VALUE=DATE:20201226
DTSTAMP:20260403T160707
CREATED:20160927T155333Z
LAST-MODIFIED:20160930T125811Z
UID:549-1608854400-1608940799@issa-centralmd.org
SUMMARY:Christmas Day
DESCRIPTION:
URL:https://issa-centralmd.org/calendar/christmas-day-9/
LOCATION:MD
CATEGORIES:Holidays
END:VEVENT
BEGIN:VEVENT
DTSTART;VALUE=DATE:20210101
DTEND;VALUE=DATE:20210102
DTSTAMP:20260403T160707
CREATED:20201215T235620Z
LAST-MODIFIED:20201215T235620Z
UID:3529-1609459200-1609545599@issa-centralmd.org
SUMMARY:New Years Day
DESCRIPTION:
URL:https://issa-centralmd.org/calendar/new-years-day/
LOCATION:MD
CATEGORIES:Holidays
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20210113T080000
DTEND;TZID=America/New_York:20210113T093000
DTSTAMP:20260403T160707
CREATED:20201216T141121Z
LAST-MODIFIED:20210316T222818Z
UID:3580-1610524800-1610530200@issa-centralmd.org
SUMMARY:Morning Membership Meeting 01/13/2021
DESCRIPTION:Chapter Business Meeting Slides: 2021-01-13 Breakfast Meeting Presentation \n\n\n\nSpeaker Slides: 2021-01-13 Sepio HAC Solution for ISSA \nSepio Whitre Paper: 2021-01-13 Sepio CMMC White Paper \n\n\nTopic: Reducing The Risk of Unapproved and Rogue Devices \nMeeting Recording: Reducing The Risk of Unapproved and Rogue Devices \nSepio delivers a Hardware Access Control (HAC) platform that reduces the risk of unapproved and rogue devices by providing complete visibility\, control\, and mitigation of all hardware assets. Sepio’s hardware fingerprinting\, augmented by machine learning\, discovers all managed\, unmanaged\, and hidden devices that are invisible to all other security tools. Sepio’s solution supports CMMC hardware controls\, NNDA section 889 and also enhances zero trust\, insider threat\, BYOD\, IT\, OT\, and IoT security programs. \nSpeaker: Jay Smilyk\, Chief Revenue Officer\, Sepio \n\n\nJay Smilyk is the Chief Revenue Officer for Sepio.  He oversees the firm’s strategic operations including its growth\, recruitment and channel development efforts.   Previously\, Smilyk served as vice president of North American sales at Safend/Supercom and held similar sales leadership positions at Cynet\, RSA and Check Point Software Technologies.
URL:https://issa-centralmd.org/calendar/morning-membership-meeting-01-13-2021/
LOCATION:Virtual via Zoom\, MD
CATEGORIES:Meetings
END:VEVENT
BEGIN:VEVENT
DTSTART;VALUE=DATE:20210118
DTEND;VALUE=DATE:20210119
DTSTAMP:20260403T160707
CREATED:20201215T235708Z
LAST-MODIFIED:20201215T235708Z
UID:3531-1610928000-1611014399@issa-centralmd.org
SUMMARY:Martin Luther King Day
DESCRIPTION:
URL:https://issa-centralmd.org/calendar/martin-luther-king-day/
LOCATION:MD
CATEGORIES:Holidays
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20210121T113000
DTEND;TZID=America/New_York:20210121T130000
DTSTAMP:20260403T160707
CREATED:20210114T233258Z
LAST-MODIFIED:20210114T233258Z
UID:3636-1611228600-1611234000@issa-centralmd.org
SUMMARY:AFCEA January Luncheon
DESCRIPTION:Featured Speakers: GEN Keith Alexander (Ret.)\, Founder\, Chairman & Co-CEO of IronNet Cybersecurity\, is one of the foremost authorities on cybersecurity in the world. A four-star Army general\, GEN Alexander was previously the highest-ranked military official of USCYBERCOM\, NSA/CSS\, where he led these DoD agencies during the conflicts in Afghanistan and Iraq.\n\n\n\n\n\n\n\n\n\n\n\nRegistration Page Here
URL:https://issa-centralmd.org/calendar/afcea-january-luncheon/
LOCATION:Virtual
CATEGORIES:Miscellaneous
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20210127T170000
DTEND;TZID=America/New_York:20210127T193000
DTSTAMP:20260403T160707
CREATED:20201215T232054Z
LAST-MODIFIED:20210128T202619Z
UID:3505-1611766800-1611775800@issa-centralmd.org
SUMMARY:Membership Meeting 1/27/2021
DESCRIPTION:Chapter Business Meeting Slides: 2021-01-27 Membership Meeting \n\n\n\nSpeaker Slides: 2021-01-27 Red Canary Threat Detection ReportTBD \n\n\nMITRE ATT&CK home page: https://attack.mitre.org/\nGithub repo of Atomic Red Team: https://github.com/redcanaryco/atomic-red-team\nGithub Repo for Atomic Red Team execution fraemwork\, Invoke-Atomic: https://github.com/redcanaryco/invoke-atomicredteam\nGithub repo for variation testing tool\, AtomicTestHarnesses: https://github.com/redcanaryco/AtomicTestHarnesses\nInstallation wiki for Invoke-Atomic: https://github.com/redcanaryco/invoke-atomicredteam/wiki\nInvoke-Atomic video tutorials: https://www.youtube.com/watch?v=-HEx-qfd54M&list=PL92eUXSF717W9TCfZzLca6DmlFXFIu8p6\nAbout Atomic Red Team: https://github.com/redcanaryco/atomic-red-team/wiki/About-Atomic-Red-Team\nAtomic Red Team microsite: https://atomicredteam.io/\nAtomic Red Team Slack: https://slack.atomicredteam.io/\nAtomic Test Harnesses Blog series:\nPt. 1: https://redcanary.com/blog/introducing-atomictestharnesses/\nPt. 2: ‌https://redcanary.com/blog/threat-research-questions/\n2020 Threat Detection Report: https://redcanary.com/threat-detection-report/introduction/\nPreviewing the 2021 Threat Detection Report: https://redcanary.com/blog/2021-threat-detection-report-preview/\nSomeone asked about the difference between Caldera and Atomic Red Team: https://redcanary.com/blog/comparing-red-team-platforms/\nHere’s some information on mapping to ATT&CK (both on the context of Atomic Red Team and in the context of behavioral analytics): https://redcanary.com/blog/mitre-sub-techniques/ \nTopic: Simulating Adversary Tradecraft with Atomic Red Team and the Red Canary Threat Detection Report \nWe plan to discuss two important resources that leading teams are using to improve their security: \n\n2020 Threat Detection Report: Red Canary’s annual in-depth analysis of of the top techniques for tens of thousands of threats seen in the wild. For each technique\, we include detection\, prevention\, and testing strategies.\n\n\n\n\nAtomic Red Team: An open-source tool mapped to ATT&CK techniques valuable for benignly simulating specific adversary behaviors\n\n\n\nSpeaker: Brian Donohue\, Red Canary \nBrian has been writing about and researching information security for the last decade. He started his career as a journalist covering security and privacy. He later consulted as a threat intelligence analyst\, researching adversaries and techniques for a variety of major banks\, retailers\, and manufacturers. At Red Canary\, Brian helps guide research publication and technical messaging efforts.
URL:https://issa-centralmd.org/calendar/membership-meeting-1-27-2021/
LOCATION:MD
CATEGORIES:Meetings
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20210128T090000
DTEND;TZID=America/New_York:20210128T123000
DTSTAMP:20260403T160707
CREATED:20210106T025118Z
LAST-MODIFIED:20210106T025118Z
UID:3614-1611824400-1611837000@issa-centralmd.org
SUMMARY:Red Team Workshop
DESCRIPTION:Join the ISSA Central Maryland for a Red Team Workshop\, an educational lab where individuals can better understand the skills and tactics of the adversary.  Participants will learn about critical attack vectors and how attackers plot\, ploy and work their way into enterprise vulnerabilities. Participants will then take training wheels off for an open play as a “Red Team” attacker. Attendees will reconvene for a working session\, walking through the live attacks from the morning and how blue teams\, or the threat hunters\, actually identify\, detect and respond to advanced threats. \nParticipant Requirements: \n\nSkill level: novice to intermediate\nBasic attacking skills (i.e. Threat Hunters\, Security Analysts\, etc)\nBasic knowledge with Linux/Kali systems\nVPN installation required\n\n\n\n\nReceive 3.5 CPE credits and a digital certificate upon completion. The deadline to register is January 21st and is open to the first 30 participants.
URL:https://issa-centralmd.org/calendar/red-team-workshop/
LOCATION:Virtual
CATEGORIES:Training
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20210129T120000
DTEND;TZID=America/New_York:20210129T133000
DTSTAMP:20260403T160707
CREATED:20210114T233721Z
LAST-MODIFIED:20210114T233721Z
UID:3638-1611921600-1611927000@issa-centralmd.org
SUMMARY:AFCEA Virtual Lunch and Learn
DESCRIPTION:RAD for Small Business Panel \nDiscuss lessons learned and best practices to help Small Businesses take on Independent Research & Development as a way to advance innovative solutions and improve their outreach to their customers.\n\nPanel Moderator: Robert Parlock – Vice President of Engineering\, Engineering Solutions\, Inc. (ESi)\n\nPanel Members:\n\nJoe Karolchik – President\, Nteligen\nStephen Kahmann – Technical Director\, iNovex Information Systems\nDustin Zepp – President/CEO\, Clarity Innovations\nWayne Johnson – President\, Ashton-Group Service\nKathryn Shamleffer – Chief Operating Officer\, Helm Point Solutions\n\nClick Here to Register for FREE!
URL:https://issa-centralmd.org/calendar/afcea-virtual-lunch-and-learn/
LOCATION:Virtual
CATEGORIES:Miscellaneous
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20210210T140000
DTEND;TZID=America/New_York:20210210T160000
DTSTAMP:20260403T160707
CREATED:20210204T211153Z
LAST-MODIFIED:20210204T211153Z
UID:3710-1612965600-1612972800@issa-centralmd.org
SUMMARY:Roger Grimes Teaches Ransomware Mitigation
DESCRIPTION:A Master Class on IT Security: Roger Grimes Teaches Ransomware Mitigation\nCyber-criminals have become thoughtful about ransomware attacks; taking time to maximize your organization’s potential damage and their payoff. Protecting your network from this growing threat is more important than ever. And nobody knows this more than Roger Grimes\, Data-Driven Defense Evangelist at KnowBe4.\nWith 30+ years experience as a computer security consultant\, instructor\, and award-winning author\, Roger has dedicated his life to making sure you’re prepared to defend against quickly-evolving IT security threats like ransomware. \nJoin Roger for this thought-provoking webinar to learn what you can do to prevent\, detect\, and mitigate ransomware. \nIn this session you’ll learn: \n\nHow to detect ransomware programs\, even those that are highly stealthy\nOfficial recommendations from the Cybersecurity & Infrastructure Security Agency (CISA)\nThe policies\, technical controls\, and education you need to stop ransomware in its tracks\nWhy a good backup (even offline backups) no longer save you from ransomware\n\nYou can learn how to identify and stop these attacks before they wreak havoc on your network. Register now and earn CPE credit for attending! \nDate/Time: Wednesday\, February 10 @ 2:00 PM ET \nSave My Spot!
URL:https://issa-centralmd.org/calendar/roger-grimes-teaches-ransomware-mitigation/
LOCATION:MD
CATEGORIES:Miscellaneous,Training
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20210210T170000
DTEND;TZID=America/New_York:20210210T200000
DTSTAMP:20260403T160707
CREATED:20210108T141910Z
LAST-MODIFIED:20210108T141910Z
UID:3618-1612976400-1612987200@issa-centralmd.org
SUMMARY:VMware Carbon Black Virtual Threat Hunting Challenge 
DESCRIPTION:Copper River IT has partnered with VMware Carbon Black to deliver their popular gamified Threat Hunting Challenge in a work-from-home model. \nCopper River IT cordially invites you to participate in this three-hour educational deep-dive which will allow you to gain hands-on experience threat hunting with VMware Carbon Black’s latest products. Participants of all security levels can enjoy 1:1 private in-game support from VMware Carbon Black technical experts. \nDuring this event you will: \n\nLearn how to find attacks used in actual incidents\nAdvance your skills with the latest Threat knowledge\nGet hands-on with VMware Carbon Black Cloud and discover why real-time device assessment and remediation are key for a remote workforce\nTalk to experts individually about how to uplift your organization’s SecOps strategy\nEarn a certificate of completion worth 3 CPE Credits\n\nRegister HERE
URL:https://issa-centralmd.org/calendar/vmware-carbon-black-virtual-threat-hunting-challenge/
LOCATION:MD
CATEGORIES:Miscellaneous
END:VEVENT
BEGIN:VEVENT
DTSTART;VALUE=DATE:20210215
DTEND;VALUE=DATE:20210216
DTSTAMP:20260403T160707
CREATED:20201215T235737Z
LAST-MODIFIED:20201215T235737Z
UID:3533-1613347200-1613433599@issa-centralmd.org
SUMMARY:Presidents Day
DESCRIPTION:
URL:https://issa-centralmd.org/calendar/presidents-day/
LOCATION:MD
CATEGORIES:Holidays
END:VEVENT
END:VCALENDAR