BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//Central Maryland Chapter of ISSA - ECPv6.15.18//NONSGML v1.0//EN
CALSCALE:GREGORIAN
METHOD:PUBLISH
X-WR-CALNAME:Central Maryland Chapter of ISSA
X-ORIGINAL-URL:https://issa-centralmd.org
X-WR-CALDESC:Events for Central Maryland Chapter of ISSA
REFRESH-INTERVAL;VALUE=DURATION:PT1H
X-Robots-Tag:noindex
X-PUBLISHED-TTL:PT1H
BEGIN:VTIMEZONE
TZID:America/New_York
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20190310T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20191103T060000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20200308T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20201101T060000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20210314T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20211107T060000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20220313T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20221106T060000
END:STANDARD
END:VTIMEZONE
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20210318T110000
DTEND;TZID=America/New_York:20210318T120000
DTSTAMP:20260403T172222
CREATED:20210308T020829Z
LAST-MODIFIED:20210308T020829Z
UID:3779-1616065200-1616068800@issa-centralmd.org
SUMMARY:Cisco Umbrella Coffee Hour with Boston Medical Center
DESCRIPTION:Join us on Thursday\, March 18th at 8 a.m. PT | 11 a.m. ET for a chat with Lee Cullivan\, CISO at Boston Medical Center\, and Kate MacLean\, Head of Product Marketing at Cisco Umbrella\, for a real world perspective on managing security amidst the pandemic and vaccine rollout.\n\nWhat you’ll learn:\n\n\nGain insight into security trends\, challenges and unexpected findings during the vaccine rollout\nHear a CISO viewpoint on considerations for security education during the pandemic\nDiscover best practices\, lessons learned and outcomes seen from rolling out Cisco Umbrella\n\n\nDon’t miss out\, reserve your spot today. \n\n\n\n\n\n\n\n\n\n\nRegister now!
URL:https://issa-centralmd.org/calendar/cisco-umbrella-coffee-hour-with-boston-medical-center/
LOCATION:Virtual
CATEGORIES:Miscellaneous
END:VEVENT
BEGIN:VEVENT
DTSTART;VALUE=DATE:20210304
DTEND;VALUE=DATE:20210306
DTSTAMP:20260403T172222
CREATED:20210224T181005Z
LAST-MODIFIED:20210224T181005Z
UID:3738-1614816000-1614988799@issa-centralmd.org
SUMMARY:SANS ICS Security Summit & Training 2021
DESCRIPTION:ICS Security Summit & Training\nWe’re opening this virtual Summit to the global community!\nRegister now for FREE. \n\nIn-depth ICS security Summit talks & interactive sessions featuring speakers from all around the world. Sessions will be held around the clock – choose one that fits your schedule → Agenda\nFeaturing a NEW ICS Solutions Track\nImmersive ICS security courses → COURSES\nBonus sessions – an all-new CTF\, Grid NetWars\, SANS@Night talks\, and more!\n\nSANS and Dragos CTF: March 3 | Free ​Summit: March 4-5 | Training: March 8-13 | Summit CPE Credits: 12 \nCo-Chairs: Tim Conway\, Robert M. Lee \nThe most comprehensive ICS security event of the year is back — and we’re opening it up to the community!\nThe annual ICS Security Summit brings together the industry’s top practitioners and leading experts from around the globe to share actionable ideas\, methods\, and techniques for safeguarding critical infrastructures. In-depth talks and interactive panel discussions deliver proven advances and approaches that make a real difference for the individuals leading this fight every day.
URL:https://issa-centralmd.org/calendar/sans-ics-security-summit-training-2021/
LOCATION:Virtual
CATEGORIES:Miscellaneous
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20210224T170000
DTEND;TZID=America/New_York:20210224T193000
DTSTAMP:20260403T172222
CREATED:20201215T232329Z
LAST-MODIFIED:20210316T221204Z
UID:3507-1614186000-1614195000@issa-centralmd.org
SUMMARY:Membership Meeting 2/24/2021
DESCRIPTION:Chapter Business Meeting Slides: 2021-02-24 Meeting Presentation \n\nTopic: Lockpicking 101 \nMeeting Recording: Lockpicking 101 \nThe session will begin with a 15 presentation on primer on the pin picking (SPP) of pin and tumbler locks following by a 30-minute demonstration/interactive session. Participants are welcomed to purchase equipment to work along with the instructor. The simplest options to get are Number 3 Masterlocks: \nhttps://usa.banggood.com/DANIU-12Pcs-High-Quality-Lock-Picks-Tools-Set-Lock-Opener-Locksmith-Tools-p-1139437.html\nhttps://lockpicktools.com/tension-tool-2500-series-set/ \n\n\nSpeaker: Michael\,  Unallocated Space \n\n\n\n\n\nFlay is a past President of Unallocated Spaces. Unallocated Space is a technology-based community center\, based out of a 1600+ SF space located in Severn\, MD.  He has been lockpicking for years and was the 2 time winner of the GrrCon ‘Cage of shame’ lockpicking challenge. He thinks its great fun and is excited to be able to encourage others in the hobby. \nClick Here to register for the February 24th Membership Meeting.
URL:https://issa-centralmd.org/calendar/membership-meeting-2-24-2021/
CATEGORIES:Meetings
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20210217T090000
DTEND;TZID=America/New_York:20210217T120000
DTSTAMP:20260403T172222
CREATED:20210216T003458Z
LAST-MODIFIED:20210216T003458Z
UID:3723-1613552400-1613563200@issa-centralmd.org
SUMMARY:Webinar on Human Trafficking
DESCRIPTION:I just want to remind everyone that the Infragard Maryland Member’s Alliance (IMMA) will be hosting a webinar on human trafficking next Wednesday (February 17th) at 9:00 am.  This eye-opening and informative webinar will explain how human trafficking persists in our communities and remains a largely invisible crime to most people\, while at the same time shattering the lives of numerous victims.  Our presenters will be a FBI Special Agent and a Task Force Officer from the Maryland State Police who are assigned to a FBI squad that investigates these crimes.  In this presentation you will learn what indicators you should look for and who to notify if you suspect an incident of human trafficking.  This information is especially useful for businesses in the service and hospitality industries\, but it is also useful for everyone\, as human trafficking can be occurring right in your own neighborhood.  It seems like every week there are stories in the press about how alert citizens became suspicious that a person might be the victim of a human trafficking operation\, notified the authorities and made a world of difference. \nPlease use the link below to register and I hope to see you online next week: \nhttps://www.eventbrite.com/e/infragard-maryland-february-webinar-human-trafficking-awareness-tickets-139684755865 \nSincerely\, \nSpecial Agent Mike Miller \nInfragard Coordinator \nFBI Baltimore
URL:https://issa-centralmd.org/calendar/webinar-on-human-trafficking/
LOCATION:Riggs Alumni Center – University of Maryland
CATEGORIES:Miscellaneous
END:VEVENT
BEGIN:VEVENT
DTSTART;VALUE=DATE:20210215
DTEND;VALUE=DATE:20210216
DTSTAMP:20260403T172222
CREATED:20201215T235737Z
LAST-MODIFIED:20201215T235737Z
UID:3533-1613347200-1613433599@issa-centralmd.org
SUMMARY:Presidents Day
DESCRIPTION:
URL:https://issa-centralmd.org/calendar/presidents-day/
CATEGORIES:Holidays
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20210210T170000
DTEND;TZID=America/New_York:20210210T200000
DTSTAMP:20260403T172222
CREATED:20210108T141910Z
LAST-MODIFIED:20210108T141910Z
UID:3618-1612976400-1612987200@issa-centralmd.org
SUMMARY:VMware Carbon Black Virtual Threat Hunting Challenge 
DESCRIPTION:Copper River IT has partnered with VMware Carbon Black to deliver their popular gamified Threat Hunting Challenge in a work-from-home model. \nCopper River IT cordially invites you to participate in this three-hour educational deep-dive which will allow you to gain hands-on experience threat hunting with VMware Carbon Black’s latest products. Participants of all security levels can enjoy 1:1 private in-game support from VMware Carbon Black technical experts. \nDuring this event you will: \n\nLearn how to find attacks used in actual incidents\nAdvance your skills with the latest Threat knowledge\nGet hands-on with VMware Carbon Black Cloud and discover why real-time device assessment and remediation are key for a remote workforce\nTalk to experts individually about how to uplift your organization’s SecOps strategy\nEarn a certificate of completion worth 3 CPE Credits\n\nRegister HERE
URL:https://issa-centralmd.org/calendar/vmware-carbon-black-virtual-threat-hunting-challenge/
CATEGORIES:Miscellaneous
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20210210T140000
DTEND;TZID=America/New_York:20210210T160000
DTSTAMP:20260403T172222
CREATED:20210204T211153Z
LAST-MODIFIED:20210204T211153Z
UID:3710-1612965600-1612972800@issa-centralmd.org
SUMMARY:Roger Grimes Teaches Ransomware Mitigation
DESCRIPTION:A Master Class on IT Security: Roger Grimes Teaches Ransomware Mitigation\nCyber-criminals have become thoughtful about ransomware attacks; taking time to maximize your organization’s potential damage and their payoff. Protecting your network from this growing threat is more important than ever. And nobody knows this more than Roger Grimes\, Data-Driven Defense Evangelist at KnowBe4.\nWith 30+ years experience as a computer security consultant\, instructor\, and award-winning author\, Roger has dedicated his life to making sure you’re prepared to defend against quickly-evolving IT security threats like ransomware. \nJoin Roger for this thought-provoking webinar to learn what you can do to prevent\, detect\, and mitigate ransomware. \nIn this session you’ll learn: \n\nHow to detect ransomware programs\, even those that are highly stealthy\nOfficial recommendations from the Cybersecurity & Infrastructure Security Agency (CISA)\nThe policies\, technical controls\, and education you need to stop ransomware in its tracks\nWhy a good backup (even offline backups) no longer save you from ransomware\n\nYou can learn how to identify and stop these attacks before they wreak havoc on your network. Register now and earn CPE credit for attending! \nDate/Time: Wednesday\, February 10 @ 2:00 PM ET \nSave My Spot!
URL:https://issa-centralmd.org/calendar/roger-grimes-teaches-ransomware-mitigation/
CATEGORIES:Miscellaneous,Training
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20210129T120000
DTEND;TZID=America/New_York:20210129T133000
DTSTAMP:20260403T172222
CREATED:20210114T233721Z
LAST-MODIFIED:20210114T233721Z
UID:3638-1611921600-1611927000@issa-centralmd.org
SUMMARY:AFCEA Virtual Lunch and Learn
DESCRIPTION:RAD for Small Business Panel \nDiscuss lessons learned and best practices to help Small Businesses take on Independent Research & Development as a way to advance innovative solutions and improve their outreach to their customers.\n\nPanel Moderator: Robert Parlock – Vice President of Engineering\, Engineering Solutions\, Inc. (ESi)\n\nPanel Members:\n\nJoe Karolchik – President\, Nteligen\nStephen Kahmann – Technical Director\, iNovex Information Systems\nDustin Zepp – President/CEO\, Clarity Innovations\nWayne Johnson – President\, Ashton-Group Service\nKathryn Shamleffer – Chief Operating Officer\, Helm Point Solutions\n\nClick Here to Register for FREE!
URL:https://issa-centralmd.org/calendar/afcea-virtual-lunch-and-learn/
LOCATION:Virtual
CATEGORIES:Miscellaneous
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20210128T090000
DTEND;TZID=America/New_York:20210128T123000
DTSTAMP:20260403T172222
CREATED:20210106T025118Z
LAST-MODIFIED:20210106T025118Z
UID:3614-1611824400-1611837000@issa-centralmd.org
SUMMARY:Red Team Workshop
DESCRIPTION:Join the ISSA Central Maryland for a Red Team Workshop\, an educational lab where individuals can better understand the skills and tactics of the adversary.  Participants will learn about critical attack vectors and how attackers plot\, ploy and work their way into enterprise vulnerabilities. Participants will then take training wheels off for an open play as a “Red Team” attacker. Attendees will reconvene for a working session\, walking through the live attacks from the morning and how blue teams\, or the threat hunters\, actually identify\, detect and respond to advanced threats. \nParticipant Requirements: \n\nSkill level: novice to intermediate\nBasic attacking skills (i.e. Threat Hunters\, Security Analysts\, etc)\nBasic knowledge with Linux/Kali systems\nVPN installation required\n\n\n\n\nReceive 3.5 CPE credits and a digital certificate upon completion. The deadline to register is January 21st and is open to the first 30 participants.
URL:https://issa-centralmd.org/calendar/red-team-workshop/
LOCATION:Virtual
CATEGORIES:Training
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20210127T170000
DTEND;TZID=America/New_York:20210127T193000
DTSTAMP:20260403T172222
CREATED:20201215T232054Z
LAST-MODIFIED:20210128T202619Z
UID:3505-1611766800-1611775800@issa-centralmd.org
SUMMARY:Membership Meeting 1/27/2021
DESCRIPTION:Chapter Business Meeting Slides: 2021-01-27 Membership Meeting \n\n\n\nSpeaker Slides: 2021-01-27 Red Canary Threat Detection ReportTBD \n\n\nMITRE ATT&CK home page: https://attack.mitre.org/\nGithub repo of Atomic Red Team: https://github.com/redcanaryco/atomic-red-team\nGithub Repo for Atomic Red Team execution fraemwork\, Invoke-Atomic: https://github.com/redcanaryco/invoke-atomicredteam\nGithub repo for variation testing tool\, AtomicTestHarnesses: https://github.com/redcanaryco/AtomicTestHarnesses\nInstallation wiki for Invoke-Atomic: https://github.com/redcanaryco/invoke-atomicredteam/wiki\nInvoke-Atomic video tutorials: https://www.youtube.com/watch?v=-HEx-qfd54M&list=PL92eUXSF717W9TCfZzLca6DmlFXFIu8p6\nAbout Atomic Red Team: https://github.com/redcanaryco/atomic-red-team/wiki/About-Atomic-Red-Team\nAtomic Red Team microsite: https://atomicredteam.io/\nAtomic Red Team Slack: https://slack.atomicredteam.io/\nAtomic Test Harnesses Blog series:\nPt. 1: https://redcanary.com/blog/introducing-atomictestharnesses/\nPt. 2: ‌https://redcanary.com/blog/threat-research-questions/\n2020 Threat Detection Report: https://redcanary.com/threat-detection-report/introduction/\nPreviewing the 2021 Threat Detection Report: https://redcanary.com/blog/2021-threat-detection-report-preview/\nSomeone asked about the difference between Caldera and Atomic Red Team: https://redcanary.com/blog/comparing-red-team-platforms/\nHere’s some information on mapping to ATT&CK (both on the context of Atomic Red Team and in the context of behavioral analytics): https://redcanary.com/blog/mitre-sub-techniques/ \nTopic: Simulating Adversary Tradecraft with Atomic Red Team and the Red Canary Threat Detection Report \nWe plan to discuss two important resources that leading teams are using to improve their security: \n\n2020 Threat Detection Report: Red Canary’s annual in-depth analysis of of the top techniques for tens of thousands of threats seen in the wild. For each technique\, we include detection\, prevention\, and testing strategies.\n\n\n\n\nAtomic Red Team: An open-source tool mapped to ATT&CK techniques valuable for benignly simulating specific adversary behaviors\n\n\n\nSpeaker: Brian Donohue\, Red Canary \nBrian has been writing about and researching information security for the last decade. He started his career as a journalist covering security and privacy. He later consulted as a threat intelligence analyst\, researching adversaries and techniques for a variety of major banks\, retailers\, and manufacturers. At Red Canary\, Brian helps guide research publication and technical messaging efforts.
URL:https://issa-centralmd.org/calendar/membership-meeting-1-27-2021/
CATEGORIES:Meetings
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20210121T113000
DTEND;TZID=America/New_York:20210121T130000
DTSTAMP:20260403T172222
CREATED:20210114T233258Z
LAST-MODIFIED:20210114T233258Z
UID:3636-1611228600-1611234000@issa-centralmd.org
SUMMARY:AFCEA January Luncheon
DESCRIPTION:Featured Speakers: GEN Keith Alexander (Ret.)\, Founder\, Chairman & Co-CEO of IronNet Cybersecurity\, is one of the foremost authorities on cybersecurity in the world. A four-star Army general\, GEN Alexander was previously the highest-ranked military official of USCYBERCOM\, NSA/CSS\, where he led these DoD agencies during the conflicts in Afghanistan and Iraq.\n\n\n\n\n\n\n\n\n\n\n\nRegistration Page Here
URL:https://issa-centralmd.org/calendar/afcea-january-luncheon/
LOCATION:Virtual
CATEGORIES:Miscellaneous
END:VEVENT
BEGIN:VEVENT
DTSTART;VALUE=DATE:20210118
DTEND;VALUE=DATE:20210119
DTSTAMP:20260403T172222
CREATED:20201215T235708Z
LAST-MODIFIED:20201215T235708Z
UID:3531-1610928000-1611014399@issa-centralmd.org
SUMMARY:Martin Luther King Day
DESCRIPTION:
URL:https://issa-centralmd.org/calendar/martin-luther-king-day/
CATEGORIES:Holidays
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20210113T080000
DTEND;TZID=America/New_York:20210113T093000
DTSTAMP:20260403T172222
CREATED:20201216T141121Z
LAST-MODIFIED:20210316T222818Z
UID:3580-1610524800-1610530200@issa-centralmd.org
SUMMARY:Morning Membership Meeting 01/13/2021
DESCRIPTION:Chapter Business Meeting Slides: 2021-01-13 Breakfast Meeting Presentation \n\n\n\nSpeaker Slides: 2021-01-13 Sepio HAC Solution for ISSA \nSepio Whitre Paper: 2021-01-13 Sepio CMMC White Paper \n\n\nTopic: Reducing The Risk of Unapproved and Rogue Devices \nMeeting Recording: Reducing The Risk of Unapproved and Rogue Devices \nSepio delivers a Hardware Access Control (HAC) platform that reduces the risk of unapproved and rogue devices by providing complete visibility\, control\, and mitigation of all hardware assets. Sepio’s hardware fingerprinting\, augmented by machine learning\, discovers all managed\, unmanaged\, and hidden devices that are invisible to all other security tools. Sepio’s solution supports CMMC hardware controls\, NNDA section 889 and also enhances zero trust\, insider threat\, BYOD\, IT\, OT\, and IoT security programs. \nSpeaker: Jay Smilyk\, Chief Revenue Officer\, Sepio \n\n\nJay Smilyk is the Chief Revenue Officer for Sepio.  He oversees the firm’s strategic operations including its growth\, recruitment and channel development efforts.   Previously\, Smilyk served as vice president of North American sales at Safend/Supercom and held similar sales leadership positions at Cynet\, RSA and Check Point Software Technologies.
URL:https://issa-centralmd.org/calendar/morning-membership-meeting-01-13-2021/
LOCATION:Virtual via Zoom\, MD
CATEGORIES:Meetings
END:VEVENT
BEGIN:VEVENT
DTSTART;VALUE=DATE:20210101
DTEND;VALUE=DATE:20210102
DTSTAMP:20260403T172222
CREATED:20201215T235620Z
LAST-MODIFIED:20201215T235620Z
UID:3529-1609459200-1609545599@issa-centralmd.org
SUMMARY:New Years Day
DESCRIPTION:
URL:https://issa-centralmd.org/calendar/new-years-day/
CATEGORIES:Holidays
END:VEVENT
BEGIN:VEVENT
DTSTART;VALUE=DATE:20201225
DTEND;VALUE=DATE:20201226
DTSTAMP:20260403T172222
CREATED:20160927T155333Z
LAST-MODIFIED:20160930T125811Z
UID:549-1608854400-1608940799@issa-centralmd.org
SUMMARY:Christmas Day
DESCRIPTION:
URL:https://issa-centralmd.org/calendar/christmas-day-9/
CATEGORIES:Holidays
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20201216T170000
DTEND;TZID=America/New_York:20201216T193000
DTSTAMP:20260403T172222
CREATED:20191214T143442Z
LAST-MODIFIED:20210316T223344Z
UID:2986-1608138000-1608147000@issa-centralmd.org
SUMMARY:Membership Meeting 12/16/2020
DESCRIPTION:December meeting is sponsored:  \n \nhttps://redcanary.com/\nClick Here for more information about on meeeting sponsor. \n\nChapter Business Meeting Slides: 2020-12-16 Membership Meeting \n\n\n\nSpeaker Slides: Least Privilege with PowerShell JEA \n\n\nSpeaker Recording: Least Privilege with PowerShell JEA \nTopic: PowerShell JEA \nPowerShell JEA allows us Systems Administrators to empower our fellow admins\, developers\, and security personal to accomplish what they need to on our systems. Give them just enough administrative permissions to accomplish their duties without interrupting your day or night. This talk shows how to assign roles and give the appropriate permissions to those roles. \nSpeaker: James Honeycutt \n\n\nJames is a dedicated cybersecurity professional who enjoys scripting and participating in capture the flags. He has served over 20 years in the military in various technical and leadership positions. He is part of a Cyber Protection Team and serve as the Microsoft Windows Expert.  In past assignments\, he served as the OIC (Officer in Charge) of both the battalion IT shop and brigade logistics IT shop\, he was the “technology adviser to the Commander”. He has  also served as a systems administrator\, helpdesk manager\, and classroom support tech.  Some of his additional duties included being an Information Assurance Manager Alternate and Network Admin backup. \n​James is working as a SANs Mentor and TrilogyEd TA.  For SANs\, he is mentoring SEC505 (Securing Windows and PowerShell Automation) and SEC511 (Continuous Monitoring and Security Operations) and for TrilogyEd\, He is TA’ing a Cyber Security Bootcamp \nDuring his career\, James has been known as the “go-to guy” for IT questions and problems by his directors\, commanders\, and peers. He has received numerous awards for his work and knowledge\, to include several Meritorious Service Medals and Company Grade Officer of the Year for the state of Arkansas.  He has a Bachelors of Science in Management in Information Systems.  James holds the following certifications: CISSP\, VCP5-DCV\, GWAPT\, GPYC\, GMON\, GCWN\, GPEN\, GCIA\, GCIH\, GCFA\, GSEC\, GSNA\, SEC +\, C|EH
URL:https://issa-centralmd.org/calendar/membership-meeting-12-16-2020/
LOCATION:Virtual via Zoom\, MD
CATEGORIES:Meetings
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20201216T120000
DTEND;TZID=America/New_York:20201216T130000
DTSTAMP:20260403T172222
CREATED:20201117T234508Z
LAST-MODIFIED:20201117T235451Z
UID:3475-1608120000-1608123600@issa-centralmd.org
SUMMARY:December 2020 "Lunch and Learn"
DESCRIPTION:O365 Lunch and Learn Abstract: We’ll navigate through uncharted security territory by analyzing the attack lifecycle in the cloud and dissecting a real-world attack. The same technology that makes the cloud dynamic can have the opposite effect on an organization’s ability to implement detection and response in cloud environments. This includes the adding additional layer of preventative controls in addition to MFA\, because it’s increasingly being bypassed in O365 as an example. Chris Morales\, Head of Analytics with Vectra\, will help us navigate through the uncharted security territory by analyzing the attack lifecycle in the cloud\, reviewing the top cloud security threats\, and dissecting a real-world cloud attack. Additionally\, he’ll provide key takeaways for managing access\, detection and response\, and security operations. \nThis event is sponsored by Vectra. \n \nClick Here to register for this event. Thanks.
URL:https://issa-centralmd.org/calendar/december-2020-lunch-and-learn/
LOCATION:Virtual via Zoom\, MD
CATEGORIES:Miscellaneous
END:VEVENT
BEGIN:VEVENT
DTSTART;VALUE=DATE:20201126
DTEND;VALUE=DATE:20201127
DTSTAMP:20260403T172222
CREATED:20160927T155333Z
LAST-MODIFIED:20160930T125831Z
UID:548-1606348800-1606435199@issa-centralmd.org
SUMMARY:Thanksgiving Day
DESCRIPTION:
URL:https://issa-centralmd.org/calendar/thanksgiving-day-9/
CATEGORIES:Holidays
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20201118T170000
DTEND;TZID=America/New_York:20201118T193000
DTSTAMP:20260403T172222
CREATED:20191214T143303Z
LAST-MODIFIED:20201202T174304Z
UID:2984-1605718800-1605727800@issa-centralmd.org
SUMMARY:Membership Meeting 11/18/2020
DESCRIPTION:Chapter Business Meeting Slides: 2020-11-18 – Meeting Presentastion.pdf\n\n\n\nSpeaker Slides: Roles of Artificial Intelligence and Deep Learning in Detecting Data Exfiltration \nTopic: Roles of Artificial Intelligence and Deep Learning in Detecting Data Exfiltration \nEssential Internet services are vital for many aspects of modern living\, yet those services remain valuable to threat actors who use them for network intrusions and data exfiltration. Dr. Pena completed a quantitative research study analyzing the ability of a Convolutional Neural Network (CNN) to detect Domain Name System (DNS) covert communications generated by the DNSExfiltrator open source tool. The results showed the CNN model had100% accuracy when exfiltrated file sizes exceeded 2 Kilobytes (KB) using the default (maximum) transmission packet size\, but its performance fell dramatically for files below 1 KB in size. \nAs AI/ML solutions become more prevalent in cybersecurity tools\, professionals must understand where a model’s strengths and weaknesses lay in order to apply appropriate risk mitigations\, such as tuning complimentary detection systems. \nSpeaker: Dr. Tomas Pena\, L3 Harris Technologies \n\n\nDr. Tomas Pena is the Chief Technologist for Cyber Operations at L3Harris Technologies’ Space and Airborne Systems Segment. In that role\, he’s responsible for cyber innovation and improving the resiliency of company products spanning land\, sea\, air\, space\, and cyber domains. He’s been in cyber-related systems engineering and defense contracting positions since 2013. Prior to that time\, he completed 20 years of service in the United States Air Force as a Cyberspace Operations Officer where he organized\, planned\, executed full-spectrum cyberspace operations\, stood up the United States Cyber Command’s 24/7 Joint Operations Center\, and led Air Force Business Transformation Initiatives at the Pentagon. Dr. Pena has also filled roles such as managing the Global Positioning System satellite control systems\, managing theater communications during Operations IRAQI FREEDOM and ENDURING FREEDOM. He is also the Founder and President of Parallax Cyber LLC\, a small business focused on training and educating the workforce in Cybersecurity and Cyber Conflict\, and the current Editor-in-Chief of the Military Cyber Professional Associations’ Military Cyber Affairs Journal. \n\n\nClick Here to register for the November 18\, 2020 General Membership Meeting
URL:https://issa-centralmd.org/calendar/membership-meeting-11-18-2020/
LOCATION:Virtual via Zoom\, MD
CATEGORIES:Meetings
END:VEVENT
BEGIN:VEVENT
DTSTART;VALUE=DATE:20201116
DTEND;VALUE=DATE:20201119
DTSTAMP:20260403T172222
CREATED:20200721T233623Z
LAST-MODIFIED:20200721T233623Z
UID:3327-1605484800-1605743999@issa-centralmd.org
SUMMARY:(ISC)² Security Congress
DESCRIPTION:Join thousands of leading cybersecurity professionals virtually at (ISC)² Security Congress 2020 November 16-18. You will hear expert insights into the latest security challenges\, and share best practices for combating threats\, building teams and implementing the latest processes and procedures to better defend your organizations’ critical assets. We will discuss the latest issues facing the workforce\, explore pathways for career advancement and discover new tools and solutions together. \nAttend (ISC)² Security Congress from home and take advantage of the powerful collaboration that you can only find at a conference of your peers who are dedicated to helping one another solve the challenges we all face. \nEarly Bird pricing to (ISC)² members and associates of just $295 for an All-Access pass. Non-members will also benefit with Early Bird pricing of $395. Registration details will be announced when open. The Early Bird window will close on September 30. Registration and more information can be found Here!
URL:https://issa-centralmd.org/calendar/isc%c2%b2-security-congress/
LOCATION:Virtual
CATEGORIES:Training
END:VEVENT
BEGIN:VEVENT
DTSTART;VALUE=DATE:20201111
DTEND;VALUE=DATE:20201112
DTSTAMP:20260403T172222
CREATED:20160927T155332Z
LAST-MODIFIED:20160930T125850Z
UID:547-1605052800-1605139199@issa-centralmd.org
SUMMARY:Veterans Day
DESCRIPTION:
URL:https://issa-centralmd.org/calendar/veterans-day-10/
CATEGORIES:Holidays
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20201028T170000
DTEND;TZID=America/New_York:20201028T193000
DTSTAMP:20260403T172222
CREATED:20191214T143204Z
LAST-MODIFIED:20201111T151355Z
UID:2982-1603904400-1603913400@issa-centralmd.org
SUMMARY:Membership Meeting 10/28/2020
DESCRIPTION:Chapter Business Meeting Slides: 2020-10-28- Meeting Presentastion.pdf \nSpeaker Slides: 30 Years 20-10-28.pdf \nTopic: Lessons Learned from 30 Years of Security Awareness Efforts \nOrganisations acknowledge that employees are often the weakest link\, yet efforts to improve ‘user awareness’ tend to rely upon available tools and not true experience. Drawing on three decades of awareness efforts and experience improving true security behaviours\, Ira Winkler will dispel many commonly held beliefs about security awareness\, detailing what consistently works and what does not. \nLearning Objectives:\n1: Learn and apply what works consistently across hundreds of organisational awareness efforts.\n2: Learn from research in other disciplines that improves awareness efforts.\n3: Learn how to create a security culture that drives individual security behaviours. \nSpeaker: Ira Winkler\, President\, Secure Mentem \n\n\nIra Winkler\, CISSP\, is the President of Secure Mentem and Author of Advanced Persistent Security\, and the forthcoming books\, You Can Stop Stupid and Security Awareness for Dummies. He is considered one of the world’s most influential security professionals and was named “The Awareness Crusader” by CSO magazine in receiving their CSO COMPASS Award. He also received the ISSA Hall of Fame award. He has designed and implemented and supported security awareness programs at organizations of all sizes\, in all industries\, around the world. Ira began his career at the National Security Agency\, where he served in various roles as an Intelligence and Computer Systems Analyst. He has since served in other positions supporting the cybersecurity programs in organizations of all sizes. Ira’s new book can be preordered here: https://tiny.cc/stupidbook
URL:https://issa-centralmd.org/calendar/membership-meeting-10-28-2020/
LOCATION:Virtual via Zoom\, MD
CATEGORIES:Meetings
END:VEVENT
BEGIN:VEVENT
DTSTART;VALUE=DATE:20201019
DTEND;VALUE=DATE:20201024
DTSTAMP:20260403T172222
CREATED:20200722T101510Z
LAST-MODIFIED:20200722T101510Z
UID:3334-1603065600-1603497599@issa-centralmd.org
SUMMARY:EC-Council - Hacker Halted Virtual Cyber Security Training and Conference 2020
DESCRIPTION:Hacker Halted is a global series of computer and information security conferences presented by EC-Council. Hacker Halted is a global series of computer and information security conferences presented by EC-Council. The objective of the hacker halted conferences is to raise international awareness towards increased education and ethics in IT security.
URL:https://issa-centralmd.org/calendar/ec-council-hacker-halted-virtual-cyber-security-training-and-conference-2020/
LOCATION:Virtual
END:VEVENT
BEGIN:VEVENT
DTSTART;VALUE=DATE:20201012
DTEND;VALUE=DATE:20201013
DTSTAMP:20260403T172222
CREATED:20160927T155332Z
LAST-MODIFIED:20160930T125753Z
UID:546-1602460800-1602547199@issa-centralmd.org
SUMMARY:Columbus Day
DESCRIPTION:
URL:https://issa-centralmd.org/calendar/columbus-day-10/
CATEGORIES:Holidays
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20201008T100000
DTEND;TZID=America/New_York:20201008T160000
DTSTAMP:20260403T172222
CREATED:20200922T211257Z
LAST-MODIFIED:20200922T211404Z
UID:3407-1602151200-1602172800@issa-centralmd.org
SUMMARY:Virtual Threat Defense Challenge
DESCRIPTION:Join our security experts for a hands-on learning experience as you navigate a simulated cyberattack in real-time. Learn to “think like a hacker” and then respond to and defend valuable assets. Whether you are a novice or a skilled security professional\, this experience has something for everyone. \nCompete in teams alongside your peers to run cyberattacks in a controlled environment. Premium prizes will be given to the team with the most points. \nJoin this action-packed session and learn to:  \n\nUnderstand the tools and techniques used by hackers\nIdentify infrastructure security gaps\nPlan and implement security measures\n\nThere’s no cost to attend. Just bring your best game! \nRegister Here; https://resources.trendmicro.com/2020-Q4-NE-MA_TDC_OCT8.html
URL:https://issa-centralmd.org/calendar/virtual-threat-defense-challenge/
LOCATION:Virtual
CATEGORIES:Training
END:VEVENT
BEGIN:VEVENT
DTSTART;VALUE=DATE:20200930
DTEND;VALUE=DATE:20201001
DTSTAMP:20260403T172222
CREATED:20200225T230013Z
LAST-MODIFIED:20200827T233628Z
UID:3146-1601424000-1601510399@issa-centralmd.org
SUMMARY:Data Connectors Baltimore 2020
DESCRIPTION:Capital Region:\nVirtual Cybersecurity Summit\nA live\, interactive experience!\nWednesday\, September 30th\nMore than 70\,000 members of the Data Connectors Cybersecurity Community are in the DC area. The Virtual Summit will be conducted in real time\, with the same panels\, presentations and solution provider exhibits and demonstrations \nComplimentary Registration Includes:\n\nKeynote presentation\nCIO/CISO Panel Discussion\nCybersecurity expert presentations\nVirtual exhibits from solution providers with chat capability\nCPE Credits\nPrizes such as Air Pods\, XBox\, Amazon Gift Cards and lots more…\n\nRegister Here
URL:https://issa-centralmd.org/calendar/data-connectors-baltimore-2020/
CATEGORIES:Miscellaneous
END:VEVENT
BEGIN:VEVENT
DTSTART;VALUE=DATE:20200928
DTEND;VALUE=DATE:20200929
DTSTAMP:20260403T172222
CREATED:20191214T143949Z
LAST-MODIFIED:20191214T143949Z
UID:2990-1601251200-1601337599@issa-centralmd.org
SUMMARY:Yom Kippur Jewish Holiday
DESCRIPTION:
URL:https://issa-centralmd.org/calendar/yom-kippur-jewish-holiday/
CATEGORIES:Holidays
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20200923T170000
DTEND;TZID=America/New_York:20200923T193000
DTSTAMP:20260403T172222
CREATED:20191214T143109Z
LAST-MODIFIED:20200923T224911Z
UID:2980-1600880400-1600889400@issa-centralmd.org
SUMMARY:Membership Meeting 9/23/2020
DESCRIPTION:Chapter Business Meeting Slides: 2020-09-23-Meeting-Presentation.pdf \nSpeaker Slides: UAS-Forensics-Framework-2020-09-23.pdf \nTopic: A Study on Drone Forensics Framework \nAs consumer unmanned aircraft systems (UAS) or drones are used more commonly in public areas\, an approach for a drone forensics framework is needed to guide forensics investigators in analyzing recovered drones that entered the unauthorized national airspace system (NAS). The presentation is based on a doctoral research study focused on whether a single framework and multiple frameworks for drone forensics. The data collected through an online survey provided detailed descriptions of the participants’ most commonly used forensics frameworks or guidelines. The data collected from participants in the United States measured the occurrences of the type of guidelines forensics examiners used. The results of the study identified a need for a standard drone forensic framework across digital forensic disciplines and aircraft accident investigation for use by investigators to produce admissible evidence for litigation in the U.S. courts. The research led to a proposed basic drone forensics framework\, which can be improved upon in future research. \nSpeaker: Nagi Mei\, D.Sc. \n\nDr. Nagi Mei has over 14 years in management and technology consulting service offerings to the commercial and health industries\, and federal\, state\, and local governments. She has extensive experience in strategic initiatives and operational responsibilities grounded in information security management. Dr. Mei is a project manager where she leads teams in implementing information security projects. Dr. Mei received a Doctor of Science in Cybersecurity from the Capitol Technology University. She holds a Master in Business Administration\, a Master of Science in Information and Telecommunications Systems from the Johns Hopkins Carey Business School\, and a Bachelor of Science in Information Systems concentrating in Digital Forensics from the Johns Hopkins University. She holds certifications in Sec+\, PMP\, PMI-ACP\, SSM\, CSM\, and ITILv3.
URL:https://issa-centralmd.org/calendar/membership-meeting-9-23-2020/
LOCATION:Virtual via Zoom\, MD
CATEGORIES:Meetings
END:VEVENT
BEGIN:VEVENT
DTSTART;VALUE=DATE:20200919
DTEND;VALUE=DATE:20200920
DTSTAMP:20260403T172222
CREATED:20191214T143827Z
LAST-MODIFIED:20191214T143827Z
UID:2988-1600473600-1600559999@issa-centralmd.org
SUMMARY:Rosh Hashanah Jewish Holiday
DESCRIPTION:
URL:https://issa-centralmd.org/calendar/rosh-hashanah-jewish-holiday/
CATEGORIES:Holidays
END:VEVENT
BEGIN:VEVENT
DTSTART;VALUE=DATE:20200908
DTEND;VALUE=DATE:20200910
DTSTAMP:20260403T172222
CREATED:20200413T022408Z
LAST-MODIFIED:20200413T022408Z
UID:3207-1599523200-1599695999@issa-centralmd.org
SUMMARY:Billington CyberSecurity Summit
DESCRIPTION:Following a sold-out Summit in 2019\, the 11th Annual CyberSecurity Summit promises to continue the proud tradition of convening the top “who’s who” in cybersecurity leadership for an unparalleled two days of high-level networking and knowledge-sharing to advocate cyber mission in the U.S. and among allied countries.
URL:https://issa-centralmd.org/calendar/billington-cybersecurity-summit/
CATEGORIES:Miscellaneous
END:VEVENT
END:VCALENDAR