BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//Central Maryland Chapter of ISSA - ECPv6.15.18//NONSGML v1.0//EN
CALSCALE:GREGORIAN
METHOD:PUBLISH
X-WR-CALNAME:Central Maryland Chapter of ISSA
X-ORIGINAL-URL:https://issa-centralmd.org
X-WR-CALDESC:Events for Central Maryland Chapter of ISSA
REFRESH-INTERVAL;VALUE=DURATION:PT1H
X-Robots-Tag:noindex
X-PUBLISHED-TTL:PT1H
BEGIN:VTIMEZONE
TZID:America/New_York
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20170312T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20171105T060000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20180311T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20181104T060000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20190310T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20191103T060000
END:STANDARD
END:VTIMEZONE
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20181128T170000
DTEND;TZID=America/New_York:20181128T193000
DTSTAMP:20260403T152036
CREATED:20171112T231511Z
LAST-MODIFIED:20181219T021341Z
UID:1791-1543424400-1543433400@issa-centralmd.org
SUMMARY:Membership Meeting 11/28/2018
DESCRIPTION:Business Meeting Slides: 2018-10-24-Meeting-Presentation.pdf \nSpeaker: Colton McQue\, Zscaler \nTopic: No Network Needed?!?! \nIt seems every day\, we are bombarded with news of yet another breach and our personal information being traded and sold on the dark web/Internet.  We lose sleep wondering if we have the right controls and policies in place to prevent our companies and our names from appearing in the next morning’s headlines.  Is it time for a different approach?  What if we could get rid of our network so we no longer had to define complex boundaries and policies?  Is it really possible to architect a system that removes all the traditional ingress and egress points?  If we resign ourselves to the fact that it’s not IF but WHEN our network gets breached….then why do we still have a network?
URL:https://issa-centralmd.org/calendar/membership-meeting-11212018/
CATEGORIES:Meetings
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20181122T000000
DTEND;TZID=America/New_York:20181122T000000
DTSTAMP:20260403T152036
CREATED:20160927T155330Z
LAST-MODIFIED:20160927T170847Z
UID:528-1542844800-1542844800@issa-centralmd.org
SUMMARY:Thanksgiving Day
DESCRIPTION:
URL:https://issa-centralmd.org/calendar/thanksgiving-day-7/
CATEGORIES:Holidays
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20181112T000000
DTEND;TZID=America/New_York:20181112T000000
DTSTAMP:20260403T152036
CREATED:20160927T155330Z
LAST-MODIFIED:20160927T170847Z
UID:527-1541980800-1541980800@issa-centralmd.org
SUMMARY:Veterans Day
DESCRIPTION:
URL:https://issa-centralmd.org/calendar/veterans-day-8/
CATEGORIES:Holidays
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20181107T073000
DTEND;TZID=America/New_York:20181107T180000
DTSTAMP:20260403T152036
CREATED:20180730T002716Z
LAST-MODIFIED:20180730T002716Z
UID:2147-1541575800-1541613600@issa-centralmd.org
SUMMARY:FITSC 2018
DESCRIPTION:The Federal IT Security Institute (FITSI) in partnership with Phoenix TS is hosting the third annual Federal IT Security Conference. Speakers from NIST\, DHS\, the Defense Department as well as private industry will be in attendance discussing the themes and trends that are influencing the Federal/DoD cyber landscape. This year’s conference will take place on Wednesday\, November 7 at the Samuel Riggs IV Alumni Center. \nAll proceeds from the event will go towards retraining members of the Wounded Warriors organization to become cyber defenders! \nPlease click here for a downloadable PDF overview of the conference. \nAbout the Federal IT Security Institute\nThe Federal IT Security Institute (FITSI)\, based in Alexandria\, Virginia\, offers role-based certification to four groups of federal IT professionals: managers\, designers\, operators and auditors. FITSI provides certification exams with the objective of making federal IT systems more secure by assuring that the people who create and manage them understand and apply the appropriate federal IT security standards. FITSI is based in Alexandria\, VA. \nAbout PhoenixTS\nSince 1998\, Phoenix TS has committed and delivered on the promise of high quality training services with results at an affordable price point\, earning the trust of both public and private sector customers by consistently delivering excellent training results at an affordable price point. We offer a full catalog of vendor specific and vendor agnostic IT\, business process\, and management training solutions. Our focus on building an enjoyable learning environment is a major reason our students return time after time. \nAbout the Wounded Warrior Cyber Combat Academy (W2CCA)\nThe mission of the Wounded Warrior Cyber Combat Academy (W2CCA) is “To Build the Next Generation of Cyber Defenders by Cross-Training the League of Wounded Warriors to help Protect and Defend the Nation’s Information Systems.” The W2CCA program is run by the FITSI Foundation which is a 501c3 public charity.
URL:https://issa-centralmd.org/calendar/fitsc-2018/
LOCATION:University of Maryland College Park\, 7801 Alumni Drive\, MD\, 20707
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20181024T170000
DTEND;TZID=America/New_York:20181024T193000
DTSTAMP:20260403T152036
CREATED:20171112T231348Z
LAST-MODIFIED:20181025T003602Z
UID:1789-1540400400-1540409400@issa-centralmd.org
SUMMARY:Membership Meeting 10/24/2018
DESCRIPTION:October 24\, 2018 General Meeting\n\nGeneral Meeting Slides: 2018-10-24-Meeting-Presentation.pdf \nSpeaker Presentation: The devil is in the details \nSpeaker: Greg Schwartzkopf\, Fortinet \nGreg Schwartzkopf is a Sr. Systems Engineering Director at Fortinet\, Inc. with 22 years active in cybersecurity. As a reformed hacker\, serial tinkerer\, and technology lover\, his insights on the cybersecurity world are anchored in being a part of it since it’s inception. His vast experience on the ground shows in his no-nonsense advice on practical ways security professionals everywhere can increase their knowledge\, understanding and security posture in today’s complex business world.\n\nTopic: The devil is in the details: Nuanced conversations about cybersecurity \nSummary: As security professionals each day we get inundated with news\, buzzwords\, product pitches\, analyst summaries and a constant reminder by everyone around us that the sky is falling. Most of what is repeated to us over and over\, however\, is completely irrelevant to actually providing security to our customers. Join me for an interactive conversation about what’s pragmatic in this sensational world\, how we can have more nuanced conversations about security— and most important\, why not to be afraid of “I don’t know.” \n 
URL:https://issa-centralmd.org/calendar/membership-meeting-10242018/
END:VEVENT
BEGIN:VEVENT
DTSTART;VALUE=DATE:20181016
DTEND;VALUE=DATE:20181018
DTSTAMP:20260403T152036
CREATED:20160928T001124Z
LAST-MODIFIED:20160930T181547Z
UID:989-1539648000-1539820799@issa-centralmd.org
SUMMARY:ISSA International Conference
DESCRIPTION:
URL:https://issa-centralmd.org/calendar/issa-international-conference-2/
CATEGORIES:Miscellaneous
END:VEVENT
BEGIN:VEVENT
DTSTART;VALUE=DATE:20181008
DTEND;VALUE=DATE:20181009
DTSTAMP:20260403T152036
CREATED:20160927T155330Z
LAST-MODIFIED:20160930T130056Z
UID:526-1538956800-1539043199@issa-centralmd.org
SUMMARY:Columbus Day
DESCRIPTION:
URL:https://issa-centralmd.org/calendar/columbus-day-8/
CATEGORIES:Holidays
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20181004T180000
DTEND;TZID=America/New_York:20181004T200000
DTSTAMP:20260403T152036
CREATED:20180727T140344Z
LAST-MODIFIED:20180727T141113Z
UID:2137-1538676000-1538683200@issa-centralmd.org
SUMMARY:SANS SEC505 Securing Windows and PowerShell Automation
DESCRIPTION:This is a fun course and a real eye-opener\, even for Windows administrators with years of experience. We don’t cover patch management\, share permissions\, or other such basics – the aim is to go far beyond that. Come have fun learning PowerShell and Windows security at the same time! You Will Learn How to:\n• Use PowerShell for security automation\n• Run PowerShell scripts on thousands of hosts\n• Do SecOps/DevOps continuous enforcement\n• Deploy and manage a Windows PKI\n• Manage privileges for an assumed breach\n• Protect admin credentials for an assumed breach\n• Do pre-forensics to help the Hunt Team\n• Secure Kerberos\, DNS\, TLS\, RDP\, and SMB\n• Use PowerShell Windows management Instrumentation (WMI) for the Blue Team \nAdditional informaton can be found Here.
URL:https://issa-centralmd.org/calendar/sans-sec505-securing-windows-and-powershell-automation/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20180926T170000
DTEND;TZID=America/New_York:20180926T193000
DTSTAMP:20260403T152036
CREATED:20171112T231246Z
LAST-MODIFIED:20180926T224302Z
UID:1787-1537981200-1537990200@issa-centralmd.org
SUMMARY:Membership Meeting 09/26/2018
DESCRIPTION:ISSA Central MD Chapter Meeting Presentation: 2018-09-26-Meeting-Presentation.pdf \nSpeaker Presentation:  \nSpeaker: Conrad Fernandes – Johns Hopkins – Applied Physics Laboratory (APL) \nConrad Fernandes is a long time cyber security engineer and architect\, with various security certifications (CISSP\, GIAC FA\, Certified AWS Solutions Architect and Security Specialist\, among others) and has worked extensively with US Defense agencies and the DoD since the early 2000’s while at Booz Allen Hamilton. Conrad currently serves as a senior cyber security engineer at the Johns Hopkins Applied Physics Laboratory (APL)\, where he leads security and governance practices on emerging cloud technologies\, including commercial and US GovCloud (e.g.\, Amazon web services) and Hadoop-based data science platforms from Cloudera and Hortonworks. Conrad recently presented strategies for “Incident Response and Spillage Handling in AWS” at Amazon’s Public Sector Summit and re:Invent Conference. Additionally\, Conrad has been researching and implementing security and audit logging and monitoring strategies on data science platforms at Johns Hopkins Medical Institute (JHMI) that utilize various emerging services from Hortonworks Data Platform (HDP) distributions and the collection and correlation of security audit events via Splunk. Conrad also enjoys sharing security best-practices and lessons-learned from the experiences with the larger cloud and big-data communities. \nTopic: AWS Security: Central Logging Techniques for Multiple Accounts\, and Automating via Cloud Formation Templates \nLogging of essential Amazon services\, such as Cloudtrail and VPC flow logs\, is essential for security and compliance and governance\, whether HIPAA\, FISMA\, PCI and several other regulatory bodies. In this session we will go over the key concepts in detail — such as setting up a central account for managing and retaining log events\, by any number of governed (source) accounts;  and the setup for the source accounts to send their respective logs to the centrally managed account.  Since working with multiple accounts can become an issue with scaling and consistency and human errors if the setup was done manually\, we will go over better methods using cloud formation templates that help tremendously in that regard by automating the setup!  Last but not least\, we will also cover best practices – including codifying in the templates – that will account for any type of Amazon unclassified account – which includes the commercial regions as well as the GovCloud (US) regions.
URL:https://issa-centralmd.org/calendar/membership-meeting-09262018/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20180903T000000
DTEND;TZID=America/New_York:20180903T000000
DTSTAMP:20260403T152036
CREATED:20160927T155330Z
LAST-MODIFIED:20160927T170847Z
UID:525-1535932800-1535932800@issa-centralmd.org
SUMMARY:Labor Day
DESCRIPTION:
URL:https://issa-centralmd.org/calendar/labor-day-8/
CATEGORIES:Holidays
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20180822T170000
DTEND;TZID=America/New_York:20180822T193000
DTSTAMP:20260403T152036
CREATED:20171112T231151Z
LAST-MODIFIED:20180822T225227Z
UID:1785-1534957200-1534966200@issa-centralmd.org
SUMMARY:Membership Meeting 08/22/2018
DESCRIPTION:Meet Presentation: Click Here \nSpeaker Presentation: Aruba 360 Fabric and the Insider Threat \nSpeaker: Austin Hawthorne\, Sr. Director\, Aruba a Hewlett Packard Enterprise Company \nAustin Hawthorne has been with Aruba for over 14 years and is currently Director of our WW Security business.  He has been in the networking and security industry for over 25 years and holds many top level industry certifications like Aruba’s own Mobile First Expert and formerly holder of the CCIE certification.  During his tenure at Aruba he has designed and implemented many large organization’s network security framework and has a leadership role in Aruba’s product and technology strategy for our security and networking portfolio of solutions.  Prior to Aruba\, Austin was a MPLS/VPLS subject matter expert for a large switching/routing company\, innovated Internet connectivity over satellite networks during the early days of the Internet boom\, and served in the US Air Force. \nTopic: Aruba 360 Fabric and the Insider Threat \nAttacks against an organizations valuable and sensible information are getting more and more complex and frequent. Hackers know that the weakest point of attack is the user and exploits that fact by targeted phishing\, over the shoulder\, and brute force attacks meant to expose a user’s credentials. Once they have this\, they craft their next steps carefully to evade traditional security mechanisms\, masking their maneuvers to appear like normal user traffic. From this session\, learn more about this attack vector and Aruba’s security solutions and methodology on how to minimize your risk as well as how to apply machine learning and AI to quickly find and remove these threats from your environment. \n 
URL:https://issa-centralmd.org/calendar/membership-meeting-08222018/
LOCATION:UMBC Training Centers\, 6996 Columbia Gateway Dr.\, Suite 100\, Columbia\, MD\, 21046\, United States
END:VEVENT
BEGIN:VEVENT
DTSTART;VALUE=DATE:20180817
DTEND;VALUE=DATE:20180818
DTSTAMP:20260403T152036
CREATED:20180627T223251Z
LAST-MODIFIED:20180627T223251Z
UID:2111-1534464000-1534550399@issa-centralmd.org
SUMMARY:SANS - SEC511 – Continuous Monitoring and Security Operations.
DESCRIPTION:https://www.sans.org/mentor/class/sec511-columbia-17aug2018-michael-hennick
URL:https://issa-centralmd.org/calendar/sans-sec511-continuous-monitoring-and-security-operations/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20180725T170000
DTEND;TZID=America/New_York:20180725T193000
DTSTAMP:20260403T152036
CREATED:20171112T231107Z
LAST-MODIFIED:20180725T015439Z
UID:1783-1532538000-1532547000@issa-centralmd.org
SUMMARY:Membership Meeting 07/25/2018
DESCRIPTION:Monthly ISSA Meeting Slides: Click Here \nSpeaker Slides: Baltimore Cyber Range.pdf \nSpeaker: Michael Doyle\, Baltimore Cyber Range \nAs co-founder and President of Baltimore Cyber Range (BCR)\, Michael Doyle is responsible for contributing to all technical aspects of the company’s activities. His technical and operational experience covers more than four decades including RF systems\, computer / network technology\, software\, hardware and data processing. He has also performed concept development and modeling for networks\, antenna systems\, sensor systems\, and satellite communications systems. Mr. Doyle continues to participate as a senior technical consultant for Sterling Technologies Group (STG)\, a technology consulting firm in northern Virginia. Before founding STG he served as a staff\, senior scientist employed by the US Government where he participated in both small and very large SIGINT\, MASINT and Computer / Network security programs over a 27-year career. \nMr. Doyle holds degrees in Computer Science and Mathematics. \nTopic: Baltimore Cyber Range \nPresentation will cover an introduction to Baltimore Cyber Range \nPrimary Activities / Programs \nResources \nOutline of current and future training \nUnder / un employed (Entry level training) \nAdvanced Training \nSTEM \nDevelopments / Resources \n 
URL:https://issa-centralmd.org/calendar/membership-meeting-07252018/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20180704T000000
DTEND;TZID=America/New_York:20180704T000000
DTSTAMP:20260403T152036
CREATED:20160927T155330Z
LAST-MODIFIED:20160927T170847Z
UID:524-1530662400-1530662400@issa-centralmd.org
SUMMARY:Independence Day
DESCRIPTION:
URL:https://issa-centralmd.org/calendar/independence-day-7/
CATEGORIES:Holidays
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20180627T170000
DTEND;TZID=America/New_York:20180627T193000
DTSTAMP:20260403T152036
CREATED:20171112T230909Z
LAST-MODIFIED:20180627T220059Z
UID:1781-1530118800-1530127800@issa-centralmd.org
SUMMARY:Membership Meeting 06/27/2018
DESCRIPTION:Monthly ISSA Meeting Slides: Click Here \nSpeaker Slides: REnigma: A Tool to Analyze Malware \nTitle: REnigma: A Tool to Analyze Malware \n\nREnigma is an advanced semi-automated malware analysis tool designed to give enterprise network defenders a safe\, effective\, and efficient environment to manually execute and inspect malware behavior. Originally developed at the Johns Hopkins University Applied Physics Laboratory (JHU/APL) with funding from the United States Government\, REnigma uses advanced Virtual Machine Record and Replay technology to capture everything that happens inside of a virtual machine at nearly full speed and perfectly replay execution down to the instruction level. With this capability\, analysts can easily capture second stages\, defeat advanced packers\, extract IOCs from memory\, and much more. This talk will cover how REnigma works\, how REnigma is deployed within an enterprise environment\, and give a demonstration of REnigma analyzing malware.\n\n\nSpeaker: Jim Stevens\, Co-Founder Deterministic Security\, LLC \nJim Stevens is a co-founder of Deterministic Security\, LLC. He was previously employed at the Johns Hopkins University Applied Physics Laboratory (JHU/APL). At JHU/APL\, Jim co-lead the Malware Laboratory\, co-lead the REnigma project\, and invented Guard Lines\, a patented CPU-based technology designed to prevent memory corruption exploits in real time. He holds a B.S. in Computer Engineering from the University of Kansas\, an M.S. in Computer Science from the University of Arkansas-Fayetteville\, and is a Ph.D. candidate in Computer Science at the University of Maryland-College Park.
URL:https://issa-centralmd.org/calendar/membership-meeting-06272018/
LOCATION:Parsons\, 110 Samuel Morse Drive\, Suite 200\, Columbia\, MD\, 21046\, United States
CATEGORIES:Meetings
END:VEVENT
BEGIN:VEVENT
DTSTART;VALUE=DATE:20180601
DTEND;VALUE=DATE:20180602
DTSTAMP:20260403T152036
CREATED:20180219T163013Z
LAST-MODIFIED:20180219T163110Z
UID:1940-1527811200-1527897599@issa-centralmd.org
SUMMARY:2018 Mid-Atlantic Information Security Conference
DESCRIPTION:ISSA Mid-Atlantic Information Security Conference  \nSave the date for the ISSA Mid-Atlantic Information Security one day conference on Friday\, June 1\, 2018 at the Universities at Shady Grove Conference Center\, Building II. The event will feature a spectacular line up of speakers\, a capture the flag contest and some great networking opportunities. Sponsor opportunities are still available. The cost to attend is $130 for Early Registration and $100 for Students. The agenda will be posted within the next couple of weeks. Register online at: https://www.fbcinc.com/e/ISSA-ISC/attendeereg.aspx 
URL:https://issa-centralmd.org/calendar/2018-maisc/
LOCATION:Universities at Shady Grove\, 9630 Gudelsky Dr.\, Rockville\, MD\, 20850
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20180528T000000
DTEND;TZID=America/New_York:20180528T000000
DTSTAMP:20260403T152036
CREATED:20160927T155329Z
LAST-MODIFIED:20160927T170847Z
UID:523-1527465600-1527465600@issa-centralmd.org
SUMMARY:Memorial Day
DESCRIPTION:
URL:https://issa-centralmd.org/calendar/memorial-day-7/
CATEGORIES:Holidays
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20180523T170000
DTEND;TZID=America/New_York:20180523T193000
DTSTAMP:20260403T152036
CREATED:20171112T230809Z
LAST-MODIFIED:20180523T222701Z
UID:1779-1527094800-1527103800@issa-centralmd.org
SUMMARY:Membership Meeting 05/23/2018
DESCRIPTION:Monthly ISS Meeting Slides: Click Here \nSpeaker Slides: Risk Management Framework 2.0 \nTitle: Risk Management Framework Version 2.0 \n\nThe NIST special publication on RMF was updated in September.  We will see how 800-37 can be used a blue print. RMF promotes the concept of near real-time risk management and ongoing system authorization through the implementation of continuous monitoring processes; provides senior leaders and executives with the necessary information to make cost-effective\, risk management decisions about the systems supporting their missions and business functions; and integrates security and privacy controls into the system development life cycle. Applying the RMF tasks enterprise-wide helps to link essential risk management processes at the system level to risk management processes at the organization level. \n\nSpeaker: Tom Volpe Sr.\, CEO of Volpe Information Technology Group \nWith over 26 years of commercial industry and governmental experience in information security\, software assurance and development\, network systems security\, project and program management\, secure application development\, system engineering and testing\, a B.S. degree in computer science from Loyola College in Baltimore\, and specialized experience in secure application development. Mr. Volpe has performed efforts that focused on ensuring the confidentiality\, integrity\, and availability of systems\, networks\, and data through the planning\, analysis\, development\, implementation\, maintenance\, and enhancement of information systems security programs\, policies\, procedures\, and tools. As a Risk Analyst and Sr. Security Assessment and Authorization (SA&A) Principal on various projects\, Mr. Volpe has excelled in security package preparation and review process for many government and commercial clients. Mr. Volpe has lead multiple software security assurance efforts at various government agencies and produced developer-oriented process frameworks for integrating secure code review scanning and analysis into the systems development lifecycle. \n 
URL:https://issa-centralmd.org/calendar/membership-meeting-05232018/
END:VEVENT
BEGIN:VEVENT
DTSTART;VALUE=DATE:20180517
DTEND;VALUE=DATE:20180518
DTSTAMP:20260403T152036
CREATED:20180503T135157Z
LAST-MODIFIED:20180503T135157Z
UID:2057-1526515200-1526601599@issa-centralmd.org
SUMMARY:WomenHack Baltimore
DESCRIPTION:WomenHack Baltimore event on May 17th. Event will be held at Softrams and could be a great opportunity to meet 15-20 companies within two hours as well network with other top women developers\, designers and product managers in the area. \nIf interested\, please register here: https://womenhack-baltimore-may2018-dev.eventbrite.com?discount=ALLACCESS
URL:https://issa-centralmd.org/calendar/womenhack-baltimore/
END:VEVENT
BEGIN:VEVENT
DTSTART;VALUE=DATE:20180515
DTEND;VALUE=DATE:20180516
DTSTAMP:20260403T152036
CREATED:20180313T132831Z
LAST-MODIFIED:20180313T132831Z
UID:2021-1526342400-1526428799@issa-centralmd.org
SUMMARY:CSA Federal Summit 2018
DESCRIPTION:CSA Federal Summit 2018\nCloud Security Alliance\nMAY 15\, 2018\nWashington D.C.\, United States \nFREE to Government employees—bring government ID to event for verification at check-in\n$150 for non-government employees until April 2\n$175 for non-government employees after April 2\n$50 students –bring student id for verification at check-in\n+ CCSK & CCM Training (not included in Summit registration) \nhttps://csacongress.org/event/csa-federal-summit-2018/ \nTuesday\, May 15\, 2018 at the Marriott Metro Center\, 775 12th street\, NW\, Washington DC. \nTheme:  Agencies Can Shift to a Secure Cloud for Mission Critical Systems \nJoin your information security colleagues from civilian and defense agencies and from innovators in cloud security to share case studies\, lessons learned and new technologies that support secure implementation of cloud computing to support agency missions. \nRegister NOW at https://csacongress.org/event/csa-federal-summit-2018/#registration \nA world-class program of speakers and panelists will provide perspectives on the Federal cloud computing strategy\, civilian and defense agency cloud security standards\, and real-world implementation experience with state-of-the-art cloud security architectures. \nTraining ONLY:\nCCSK Foundation Training: $795 – Does not include Summit registration.\nCCM Foundation Training Course: $695 – Does not include Summit registration.
URL:https://issa-centralmd.org/calendar/csa-federal-summit-2018/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20180515T000000
DTEND;TZID=America/New_York:20180515T000000
DTSTAMP:20260403T152036
CREATED:20180220T162230Z
LAST-MODIFIED:20180220T162232Z
UID:1988-1526342400-1526342400@issa-centralmd.org
SUMMARY:CISSP certification study group
DESCRIPTION:
URL:https://issa-centralmd.org/calendar/cissp-certification-study-group-22/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20180508T000000
DTEND;TZID=America/New_York:20180508T000000
DTSTAMP:20260403T152036
CREATED:20180220T162230Z
LAST-MODIFIED:20180220T162232Z
UID:1987-1525737600-1525737600@issa-centralmd.org
SUMMARY:CISSP certification study group
DESCRIPTION:
URL:https://issa-centralmd.org/calendar/cissp-certification-study-group-21/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20180501T000000
DTEND;TZID=America/New_York:20180501T000000
DTSTAMP:20260403T152036
CREATED:20180220T162229Z
LAST-MODIFIED:20180220T162231Z
UID:1986-1525132800-1525132800@issa-centralmd.org
SUMMARY:CISSP certification study group
DESCRIPTION:
URL:https://issa-centralmd.org/calendar/cissp-certification-study-group-20/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20180426T080000
DTEND;TZID=America/New_York:20180426T170000
DTSTAMP:20260403T152036
CREATED:20171026T190250Z
LAST-MODIFIED:20171026T190250Z
UID:1721-1524729600-1524762000@issa-centralmd.org
SUMMARY:Data Connections Baltimore Cyber Security Conference 2018
DESCRIPTION:Data Connectors will be hosting the Baltimore Cyber Security Conference on Thursday\, April 26th. The event will start at 8:15 AM with a check-in and opening introductions before presentation sessions begin at 8:45. Between the educational sessions that go throughout the day\, there will be time to visit vendor booths to obtain information regarding product and service offerings. Click here for more information.
URL:https://issa-centralmd.org/calendar/data-connections-baltimore-cyber-security-conference-2018/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20180425T170000
DTEND;TZID=America/New_York:20180425T193000
DTSTAMP:20260403T152036
CREATED:20171112T225453Z
LAST-MODIFIED:20180425T221748Z
UID:1775-1524675600-1524684600@issa-centralmd.org
SUMMARY:Membership Meeting 04/25/2018
DESCRIPTION:ISSA Chapter Business Meeting Presentation: Click Here \nSpeaker Presentation:  Click Here \nTopic: Maryland CyberSecurity initiatives \nIn the cybersecurity industry\, the most significant barrier to growth is a critical mass of expert\, experienced\, and talented cybersecurity professionals at all skill levels.  Maryland\, perhaps uniquely among all states\, has that critical mass of talent and we are investing significantly to further broaden the pool of qualified workers for the government and cybersecurity companies to draw upon.  In my presentation to the ISSA Central Maryland group\, I will discuss the current state of the workforce and initiatives underway to grow it to meet the demand.  I would like to hear the members’ thoughts and ideas on the subject as well! \n\n\n\nSpeaker: Ken McCreedy\, MD Department of Commerce \nColonel (Ret.) Kenneth O. McCreedy\, Senior Director of Cybersecurity and Aerospace in the Maryland Department of Commerce\, is a 1980 Distinguished Military Graduate of the University of California\, Berkeley. Commissioned as a military intelligence officer\, he served overseas in Panama\, Germany\, Kuwait\, and Bosnia. He commanded a scout platoon\, a counterintelligence/ interrogation company\, a signals intelligence battalion\, and finally\, he took command of Fort George G. Meade\, Maryland in June\, 2005 and served in that capacity until July 2008. Since his retirement in 2008\, McCreedy has worked as a defense contractor and led a non-profit organization that provides therapeutic horseback riding to people with disabilities.. \nIn his current position\, Col. McCreedy is charged with growing and retaining cybersecurity and aerospace companies in Maryland and attracting new business to the state. He is also working to educate people about the cyber threat and encouraging them to take steps to protect themselves and their businesses.. \n\nLocation: Parsons Cyber\, Address: 7110 Samuel Morse Dr.\, Suite #200\, Columbia\, MD\nTime: 5:00 PM to 7:00 PM
URL:https://issa-centralmd.org/calendar/membership-meeting-04252018/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20180424T000000
DTEND;TZID=America/New_York:20180424T000000
DTSTAMP:20260403T152036
CREATED:20180220T162226Z
LAST-MODIFIED:20180220T162226Z
UID:1985-1524528000-1524528000@issa-centralmd.org
SUMMARY:CISSP certification study group
DESCRIPTION:
URL:https://issa-centralmd.org/calendar/cissp-certification-study-group-19/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20180417T000000
DTEND;TZID=America/New_York:20180417T000000
DTSTAMP:20260403T152036
CREATED:20180220T162226Z
LAST-MODIFIED:20180220T162226Z
UID:1984-1523923200-1523923200@issa-centralmd.org
SUMMARY:CISSP certification study group
DESCRIPTION:
URL:https://issa-centralmd.org/calendar/cissp-certification-study-group-18/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20180410T000000
DTEND;TZID=America/New_York:20180410T000000
DTSTAMP:20260403T152036
CREATED:20180220T162226Z
LAST-MODIFIED:20180220T162226Z
UID:1983-1523318400-1523318400@issa-centralmd.org
SUMMARY:CISSP certification study group
DESCRIPTION:
URL:https://issa-centralmd.org/calendar/cissp-certification-study-group-17/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20180403T000000
DTEND;TZID=America/New_York:20180403T000000
DTSTAMP:20260403T152036
CREATED:20180220T162225Z
LAST-MODIFIED:20180220T162225Z
UID:1982-1522713600-1522713600@issa-centralmd.org
SUMMARY:CISSP certification study group
DESCRIPTION:
URL:https://issa-centralmd.org/calendar/cissp-certification-study-group-16/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20180328T170000
DTEND;TZID=America/New_York:20180328T193000
DTSTAMP:20260403T152036
CREATED:20171112T225317Z
LAST-MODIFIED:20180328T222642Z
UID:1773-1522256400-1522265400@issa-centralmd.org
SUMMARY:Membership Meeting 03/28/2018
DESCRIPTION:Meeting Presentations Slides: March 28 Meeting Slides \nSpeaker Presentation Slides: Privacy and IOT in the Infrastructure \nTopic: Privacy and IOT in the Critical Infrastructure for the Energy Sector \nDiane will present information on the exposure of consumer privacy data through smart meters\, smart grids\, and the internet of things. The issue of privacy is essential knowledge to anyone who uses Internet-connected devices in the home\, vehicle\, and on the body. Diane will discuss privacy of data transmitted via the smart meters\, smart grids\, and the Internet of Things. She will also address the Energy Critical Infrastructures. \nSpeaker: Diane Groth\, President and CEO\, Laetare Cybersecurity\, LLC \n\nDiane Groth has worked in the fields of security\, information assurance\, information security\, network security\, systems security\, and cybersecurity for the past 30 years. She has worked as a defense contractor\, GG15 systems security engineer\, worked in industry security\, and as a cybersecurity university professor. She has taught cybersecurity classes at the US Naval Academy\, University of Maryland\, The Catholic University of America\, and Webster University primarily Master’s Degree and PHD students. She has her own woman-owned cybersecurity firm focusing on cybersecurity for the Energy Critical Infrastructure. She teaches cybersecurity in the Schools of Engineering and the Schools of Business. She is pursuing a PHD and her topic of interest is privacy in the Smart Grid\, Energy Grid\, and the Internet of Things for the Energy Critical Infrastructure. \n\nIf you are a non-US citizen\, you MUST send a follow-up email to president@centralmarylandc-y5eorcwrmb.live-website.com and v_p_operations@centralmarylandc-y5eorcwrmb.live-website.com.   \nAll attendees are required to show a government-issued ID for admittance to the chapter meeting.  Failure to do so will prevent admission to the meeting. \n 
URL:https://issa-centralmd.org/calendar/membership-meeting-03282018/
LOCATION:Parsons\, 110 Samuel Morse Drive\, Suite 200\, Columbia\, MD\, 21046\, United States
END:VEVENT
END:VCALENDAR