Loading…
Please register for each session that you plan to attend.
The registration link is included in the description of the session.
Details to access each of the sessions that you register for will be sent to the email address provided during registration.

Sign up or log in to bookmark your favorites and sync them to your phone or calendar.

Training Session [clear filter]
Wednesday, July 22
 

8:30am EDT

ISSA Fayetteville-Ft. Bragg - Carlos Valencia, Managed Print Analyst, Digital Document Solns - MFD Overview, Hardening & Basics
Register for this session HERE​​​

Abstract
  • Presentation will consist of an overview of various types of Multifunction devices.
  • A review of the basic setting used for hardening activating security features to protect end user’s data.
  • Demonstrate the basic setting to utilize SMTP and SMB.
  • Presentation will provide attendees confidence in navigating the MFD menu and securing their device. 






Speakers
avatar for Carlos Valencia

Carlos Valencia

Managed Print Analyst, Digital Document Solutions


Wednesday July 22, 2020 8:30am - 10:00am EDT
GoToWebinar Room D

8:30am EDT

VerSprite Application Security Workshop: Open Technologies, Tools, and Techniques for Running a Successful InfoSec Program
Register for this session HERE​​​

About This Presentation:
When teams start considering application security, it can feel like you are being thrown into the open ocean without a lifeboat. Security threats can hit you like waves from all sides, while you are just looking for a navigation system to help guide you through each step of securing your code.
In this presentation, Tony UcedaVélez, CEO of VerSprite cybersecurity consulting and leader of OWASP Atlanta, will steer attendees through the developer benefits, helpful security guides, and break from the storm that collaboratives like OWASP offer. He will also share some trade-favorite technologies, security tools, and techniques that you and your team can use to inject security into every stage of your development lifecycle.
All attendees will receive CEUs through ISSA and receive a copy of Tony’s presentation, complete with tools and resource links you can take back to the office.

Presentation Overview:
  • Security Challenges
  • What is OWASP (Open Web Application Security Project)
  • Why There is a Need for Governance and Standardization in Software Development
  • What does OWASP have to offer?
  • The OWASP Application Security Verification Standard (ASVS) Security Assurance Methodology
  • OWASP Top Ten
  • Developer Guides
  • Security Cheat Sheets for Developers, AppSec, and InfoSec
  • Open SAMM (Software Assurance Maturity Model)
  • S-SDLC – Building Security-In
  • OWASP AntiSamy API
  • CSRFGuard
  • ESPI (Enterprise Security API)
  • Security Testing & OWASP – Prescriptive Advice for Testing
  • VerSprite’s Top Security Tools for Developers and Security Professionals
  • Open Source Tools for More Nefarious Voyages in AppSec Testing
  • Let’s Dock This Discussion & Take It Online


Speakers
avatar for Tony UcedaVélez

Tony UcedaVélez

CEO & Founder, VerSprite
Tony UcedaVélez is the CEO of VerSprite, an Atlanta based security services firm assisting global multi-national corporations on various areas of cyber security, secure software development, threat modeling, application security, security governance, and security risk management... Read More →



Wednesday July 22, 2020 8:30am - 10:00am EDT
GoToWebinar Room C

10:30am EDT

ISSA Fayetteville-Ft. Bragg Chapter - Mike Curnow, CEO, Experienced SOC Architect, Defiant Networks "Ballin On A Budget: Deploying SIEMple SecOps"
Register for this session HERE​​​

Presentation Abstract:
Hyper-connectivity is at an all-time high considering advances in Industry 4.0 coupled with increased remote workload migration in recent day. It’s safe for one to surmise that security operations has yet to catch up with some innovations that’ve been pushed out the door too fast. A lot of these innovative measures are employed by businesses to essentially save themselves by crafting new services or simply enabling more internet driven accessibility to handle an already existing service.

This drives need to increase deployment of what’s arguably the weakest point in many security strategies (at least those I’ve consulted with), which is enacting a Security Operations Center (SOC) to enable insight to existing threats and keep constant measure of the organization’s security posture.

The hard truth is that a lot of orgs cannot afford an expensive SIEM tool or justify on boarding of a full-fledged SOC team, yet their relative security are crucial to their operations. All the while a majority of security compliance standards require “eyes on events & data” measures. This becomes a hindrance on some businesses and organizations to which they might begrudgingly employ a half-hearted attempt with minimal effort, or they might not even know where to start. This is where the introduction to open-source solutions come in. In this presentation I will cover:
  1. What is SOC? - Processes, People & Technology
  2. Open Source - Gathering proper tools to build a SIEM solution purpose-built just for you
  3. Considerations & Procedures - Tailoring the pieces to fit your use case(es)
  4. Resilience - Strategizing best practices to keep your SOC up and running through thick and thin



Speakers
avatar for Mike Curnow

Mike Curnow

CEO, Experienced SOC Architect, Defiant Networks, Inc.
Mike is a trusted cybersecurity professional with experience in the financing, health, industrial controls, and automotive sectors. Equipped with his experience as a former software engineer and skills on offensive & defensive security. He's been trusted to perform penetration tests... Read More →


Wednesday July 22, 2020 10:30am - 12:00pm EDT
GoToWebinar Room D

10:30am EDT

Versprite Threat Hunting Workshop: Utilizing Threat Intelligence to Hunt the Unknown in Your Network
Register for this session HERE​​​

In today’s world, most security teams use threat intelligence reactively, reacting to each sign compromise. While this method is common, we want to pose a question to the attendees – why? Why wait for the unknown to hit you first?

In this presentation, we will be exploring what it would mean to be proactive in your security measures. We will discuss threat hunting and utilizing Threat Intel produced by a threat library built around your environment to hunt the unknowns in your network.

All attendees will receive CEUs through ISSA and receive a downloadable copy of the presentation to take back to the office.

Speakers
avatar for Jake Niederer

Jake Niederer

Consulting Manager, VerSprite
Jake Niederer is a Managing Consultant for the Threat Intelligence Team at VerSprite. He is a decorated former Marine, awarded with the Navy Achievement Medal, a Combat Distinguishing Device V for Valor, and the Purple Heart for his actions in OEF Afghanistan. Aside from the military... Read More →
avatar for Jordan Young

Jordan Young

Jr. Security Consultant, VerSprite
Jordan Young is a Security Consultant for the Geopolitical Risk Team (GPR) of VerSprite; a team that specializes in understanding how geopolitical occurrences, such as protests, can lead to changes in threat landscapes. Jordan graduated from the University of Chicago with a Master’s... Read More →



Wednesday July 22, 2020 10:30am - 12:00pm EDT
GoToWebinar Room C

12:30pm EDT

BlueTeamAssess – OSINT “Sorting Through Breadcrumbs to Determine Your Internet Exposure"
Register for this session HERE​​​

Open Source Intelligence (OSINT)
Sorting through the breadcrumbs on the Internet to Determine Your Exposure

How much data can be found on you or your company on the Internet? The unfortunate answer in today’s world is often far too much. Further, this data can often be used by malicious actors to cause damage to individuals or organizations through cyber attacks or social vendettas.

This short workshop will give attendees an introduction to OSINT by walking through the OSINT Framework available on GitHub. As part of that introduction, we’ll see examples of how tools like SHODAN, Google Dorks, and Recon-ng can be used to collect data on your target. Even better, how can you defend against a potential attackers efforts to find stuff on you?

The instructor will help frame the exposure and risk that the different types of information present, and attendees will have an opportunity to perform some investigation of a subject of their choosing during the hands-on exercises that make up the majority of the workshop.

Among the topics covered during this workshop include:
•    Goals of OSINT
•    OSINT Frameworks
•    Free tools to perform OSINT investigations
•    Searching for data on companies
•    People searching on social media
•    Monitoring to protect you and your business
•   Where to go for more extensive application

Conducting an OSINT exercise should be an expected part of the preparation for any vulnerability assessment or penetration test. It is through these queries that the potential aggressor learns about possible chinks in the armor worn by the target. At the completion of this workshop, the attendees should have a much deeper appreciation of how very true is the statement – “Nothing is ever really deleted from the Internet.”

Cybersecurity specialists and business owners should pay close attention to the amount of information about an organization or individual that exists on the web. This information is often exploited by hackers and other malicious actors bent on doing damage to the reputations of individuals or the integrity of business organizations.



Speakers
avatar for Mike Parsons

Mike Parsons

Senior CyberSecurity Architect and Mentor, BlueTeamAssess LLC
Mike holds the CISSP, PCIP, IAM, IEM and is HIPAA certified.  He is a 6 year veteran of USMC and resides in eastern North Carolina. Mike is the principal at BlueTeamAssess LLC and is a Senior CyberSecurity Architect and Mentor. He believes information security has a tactical and... Read More →



Wednesday July 22, 2020 12:30pm - 2:00pm EDT
GoToWebinar Room F

12:30pm EDT

Netwrix – AD Changes/Best Practices for Securing Sensitive Data

Speakers
avatar for Jeff Melnick

Jeff Melnick

Director, Global Solutions Engineering, Netwrix



Wednesday July 22, 2020 12:30pm - 2:00pm EDT
GoToWebinar Room C

12:30pm EDT

Teneo and Silver Peak – De-Risk Your SD-WAN Project: Technology Workshop
Register for this session HERE​​​

Technology Workshop Abstract:
There are three big considerations that often go unnoticed in SD-WAN projects. They’re linked to technology fit, people and process. Failure to select the best technology fit, align the right people and execute a smooth process are the reasons why over 50% of IT projects fail.

Leveraging Silver Peak Unity EdgeConnect™ SD-WAN and Teneo Inc.’s years of technical SD-WAN knowledge, practical and real-life experience, this workshop will give you a clear look inside the adoption of a secure SD-WAN.  Teneo Inc. will discuss the why, when and how to adopt a secure SD-WAN taking in to consideration the challenges that other organizations have faced in regards to people and process. In regards to selecting the technology, Teneo Inc. will introduce the best in class, Silver Peak Unity EdgeConnect™ SD-WAN.

Silver Peak will allow to look inside their Silver Peak Unity EdgeConnect™ SD-WAN. The demo will give an overview of architecting and operating an SD-WAN, as well as dive into core features, capabilities and security components of Silver Peak Unity EdgeConnect™ SD-WAN.

Still have questions? We will save time to answer your questions during the workshop or we will be happy to arrange a time to discuss your organization’s secure SD-WAN project.

De-risk your SD-WAN project by learning directly from Teneo Inc. and Silver Peak’s years of experience and best in class technology.


Speakers
avatar for Steve Evans

Steve Evans

Senior VP of Solutions Engineering, Teneo, Inc.
Steve Evans is Sr. VP of Solutions Engineering globally for Teneo Inc. He has over 20 years of experience in network and security engineering, architecture and design. Steve came to Teneo from the public sector where he was the network administrator for 10 years for a 60- site, 30,000... Read More →
avatar for John Campbell

John Campbell

Senior Systems Engineer, Silver Peak
John Campbell is a Senior Systems Engineer and trusted technical advisor for the Silver Peak Software Defined WAN (SD-WAN) and WAN optimization solutions.  John is an advocate for all things SD-WAN for customers currently evaluating Silver Peak and other WAN technologies.  His... Read More →

Sponsors

Wednesday July 22, 2020 12:30pm - 2:00pm EDT
GoToWebinar Room D

2:30pm EDT

ISSA Fayetteville-Ft. Bragg: Nia Luckey, Security Operations Manager, Cisco, "Not Another Framework: Cutting Through the Noise"
Register for this session HERE​​​

Not Another Framework: Cutting Through the Noise

In the world of cybersecurity, we love our frameworks: ISO, NIST, RMF, SOC1, SOC2, COBIT, HITRUST, and many more.  But these different frameworks often complicate areas like maturity modeling, operational readiness, and threat modeling! The struggle is finding the common areas of overlap.  So instead of doing that, the question becomes, how do we elevate all of them under a simplified process? By leveraging common language cutting through the minutiae, we can start to build progress. 


Speakers
avatar for Nia Luckey

Nia Luckey

Security Operations Manager, Cisco
Nia Luckey is a true innovator. She doesn't see obstacles but rather opportunities for growth, improvement, and alignment. As an industry leader, she has established two 501c3 affiliate chapters in her local area of North Carolina. The Information Systems Security Association of Fayetteville... Read More →



Wednesday July 22, 2020 2:30pm - 4:00pm EDT
GoToWebinar Room D

2:30pm EDT

TCDI - IT Security Changes During Quarantine: Leveraging Existing Infrastructure against Remote Cyber Threats
Register for this session HERE​​​

Description:

The remote work that began as a temporary solution to various stay-at-home orders has now become the new normal for many organizations. While this transition can be beneficial in many ways, it does create further complications for IT departments tasked with maintaining the security and integrity of critical systems. 
During this presentation, cybersecurity experts from TCDI will dive into issues and solutions related to remote access and incident response investigations, as well as how organizations can leverage their existing infrastructure to protect data while supporting their remote employees. 


Agenda: 
• Remote Work Considerations 
• Remote Incident Response Investigations 
• Supporting Remote Employees 
• Common Cybersecurity Attacks and Strategies 
• Key Takeaways


Speakers
avatar for Eric Vanderburg

Eric Vanderburg

Vice President, Cybersecurity, TCDI
Eric Vanderburg is considered a thought leader in the industry and is a continual learner who has earned over 40 technology and security certifications. He is the author of several books and he frequently writes articles for magazines, journals, and other publications.Eric regularly... Read More →
avatar for Bogdan Salamakha

Bogdan Salamakha

Senior Cybersecurity Engineer, TCDI
Bogdan Salamakha is an experienced cybersecurity professional who helps protect companies from cyber threats, comply with regulations, test security controls, and gain assurance in their information security. He serves as a cybersecurity subject matter expert in penetration testing... Read More →

Sponsors


Wednesday July 22, 2020 2:30pm - 4:00pm EDT
GoToWebinar Room B

2:30pm EDT

Triaxiom – Matt Miller, Principal Security Engineer, “An Introduction to Pen Testing & Red Teaming”
Register for this session HERE​​​

Whether you are considering a career as a penetration tester, if your organization would benefit from a penetration test, or just want to learn more this workshop is for you. This workshop will serve as an introduction to penetration testing, what separates a penetration test from a vulnerability scan, an overview of the different types of penetration testing, and the pros and cons of a red team engagement. Finally, we will be sure to include plenty of stories from past penetration tests to keep it interesting.

Speakers
avatar for Matt Miller

Matt Miller

Principal Security Engineer, Triaxiom
Matthew Miller began his career in information security as a Cyberspace Control Officer in the United States Air Force. His first tour was to the United Kingdom as part of Europe’s special operations tactical communication unit. In this role, Matt would often lead a team to deploy... Read More →


Wednesday July 22, 2020 2:30pm - 4:00pm EDT
GoToWebinar Room F

4:30pm EDT

TEKsystems – CyberSecurity Careers: Securing Your Path
Register for this session HERE​​​

“Teron Foster and Nolan Myrick from TEKsystems will provide insights (and opinions) regarding career mapping & development, interview skills, resume writing and job market data.”

Speakers
avatar for Nolan Myrick

Nolan Myrick

Infrastructure Optimization, Risk & Security Services Division Lead, TEKsystems
Nolan Myrick – BizTech geek. Family man. Lover of Basketball & Golf.Nolan currently serves as a Division Lead for TEKsystems, the leading IT Services & Staffing company in North America. His external focus is working with clients to evaluate and address a broad spectrum of Risk... Read More →
avatar for Teron Foster

Teron Foster

University Relations Recruiter, TEKsystems
Teron Foster is a native of Reidsville, NC, and currently resides in Greensboro NC. Teron graduated from North Carolina Agricultural & Technical State University with a Bachelor’s degree in Marketing and Sales in 2016. After graduation he joined TEKsystems where he worked as a Technical... Read More →

Sponsors


Wednesday July 22, 2020 4:30pm - 6:00pm EDT
GoToWebinar Room A
 
Filter sessions
Apply filters to sessions.