ISSA-NOVA Chapter Meetings

[August] Chapter Meeting – Security for Industrial Control Systems (ICS) by Jack Oden, Principal Manager at Parsons

ISSA-NOVA Chapter Meeting Security for Industrial Control Systems (ICS) Presented By   Jack Oden ICS Cybersecurity SME, US Army, Principal Manager at Parsons Thursday, August 16, 2018  5:30 PM – Networking & Dinner, 6:00 PM – ISSA-NOVA Program Introduction to Industrial Control Systems (ICS) Security As IT security practitioners we seldom consider the security, reliability, and…

[April] Chapter Meeting – Architecting your Cybersecurity Workforce for Blockchain, IoT, Big Data, and Everything Digital by David Foote, Co-Founder of Foote Partners, LLC

Technology’s role as an engine of enterprise, innovation, and competitiveness has caught many IT leaders unprepared. For years they’ve been slow to address persistent human capital problems: tech skill deficits, hiring/retention issues, pay levels, and murky career paths. This is strongly affecting cyber/data security organizations as cybersecurity threats continue to stun the industry regularly and…

[March] Chapter Meeting – Incorporating Security Practices into Business Processes by Ira Winkler, Renowned Speaker/Author, NSA Analyst, ISSA Intl President, and by Dr. Tracy Celaya, President of Go Consulting Intl, USAF Electronic Intelligence

Thursday, March 15, 2018 5:30 PM – Networking & Dinner 6:00 PM – ISSA-NOVA Program 8:00 PM – Book Signing by Ira Winkler When there are security problems, there is a natural tendency to look to apply blame to some person or process. The underlying problem is however that security is proverbially bolted onto an organization,…

[February] Chapter Meeting – The 3rd Face of Insider Threat by Carl Willis-Ford, CSRA Senior Principal

Thursday, February 15, 2018 5:30 PM – Networking & Dinner 6:00 PM – ISSA-NOVA Program While many Insider Threat assessments only include two categories (malicious and unintentional), there exists a strong argument to include a third category, the nonmalicious insider, employees that knowingly violate security policy, but not for malicious purposes. These employees present significant risk…

[December] Chapter Meeting – Using Application Control to Stop Ransomware and other Malware by Steven (Ziggy) Shanklin, Founder and CEO of White Cloud Security

Thursday, December 21, 2017 5:30 PM – Networking & Dinner 6:00 PM – ISSA-NOVA Program The Power of Trust: How Application Control Stops Ransomware and Other Malware Homeland Security’s US-CERT recommends “App Control” as the #1 Malware Mitigation Strategy. What is this technology, and how does it block what Antivirus can’t? Hackers are winning the…

[August] Chapter Meeting – NIST Creates the OSCAL Standard for Synchronizing Security Controls Between Cloud Organizations by Dr. Michaela Iorga, Program Director at NIST

Thursday, August 17, 2017 5:30 PM – Networking & Dinner 6:00 PM – ISSA-NOVA Program Michaela Iorga, PhD Director of ITL SURG Program at NIST Co-Chair at both Security & Forensic Science NIST Cloud Working Groups Dr. Michaela Iorga at the National Institute of Standards and Technology (NIST) has created the Open Security Controls Assessment Language…

[June] Chapter Meeting – Artificial Intelligence and Cybersecurity by Randy V. Sabett, Vice Chair at Cooley LLP

Thursday, June 15, 2017 5:30 PM – Networking & Dinner 6:00 PM – ISSA-NOVA Program Randy V. Sabett, J.D., CISSP         ISSA-NOVA Member Vice Chair and Attorney at Cooley LLP, former NSA crypto engineer, prolific writer Artificial Intelligence (AI) creates some very interesting and compelling opportunities when applied to CyberSecurity. – Various AI techniques, including neural…

[April] Chapter Meeting – Extracting Threat Data from the World’s Most Hostile Territories by Cynthia James, GM of Kaspersky Gov Sec Solutions

Thursday, April 20, 2017 5:30 PM – Networking and Dinner 5:50 PM – The ISSA-NOVA Program Cynthia James – General Manager of Kaspersky Government Security Solutions How can U.S. businesses and government agencies get relevant cybersecurity data as quickly as needed from hostile regions where malware campaigns are currently being developed?  Advanced Persistent Threat (APT)…