Home

Two Time Chapter of the Year

Our Goal

To be the community of choice for international cybersecurity professionals dedicated to advancing individual growth, managing technology risk and protecting critical information and infrastructure.

Our Mission
Alamo-ISSA's mission is to enhance the education and expand the knowledge and skills of its members in the interrelated fields of information systems and data processing; to encourage a free exchange of information security techniques, approaches, and problem solving; and to communicate to management and systems and information processing professionals the importance of establishing the controls necessary to ensure the security of information processing resources.

Looking for family online safety tips?  
Click here for the Child Safe Initiative, or Cyber Security Awareness sessions. 



DirectDefense

February 20th ISSA Quarterly Meeting - DirectDefense

Maggiano's Little Italy - The RIM
Noon until 4:30 PM


  • Christopher Walcutt, CISM, CISSP
  • Bio: Mr. Walcutt is the Director of Security Solutions at DirectDefense with twenty years of experience in network design, information security, risk analysis & mitigation and compliance in the energy, financial, higher education, and manufacturing sectors. He specializes in security and risk strategy in the energy sector and is involved with several research initiatives involving the University of Central Florida, Soar Technology, and DARPA as a subject matter expert for energy, smart integrated infrastructure and critical infrastructure security. He volunteers time coaching the CyberPatriot Team NetRunners, two time national finalist and 2016 National Champions.  He is a nationally recognized Cyber Security speaker and the Air Force Association’s 2016 CyberPatriot Mentor of the Year.
  • Title: Not-So-Smart Grid
  • Abstract: Smart grid owners must provide innovative, resilient solutions that encourage widespread use of IoT devices and applications while meeting security and compliance mandates. Changing regulatory standards, the security practices of third-party vendors, affiliated utility companies and network owners all stand in the way of achieving this. This presentation will discuss security and resiliency considerations.

  • Alan Orlikoski
  • Bio: He provides emergency services when a security breach occurs. He also creates and upgrades security operation centers, incident response management programs, analyzes and tests existing incident response plans, conducts forensic investigations, and provides incident response and forensics training. Mr. Orlikoski has extensive computer forensics background and has been a leader in some of the largest incident response and security operations center development programs in the history of the company.
  • With over 17 years of experience in both private and public sectors of the IT industry, Mr. Orlikoski is professionally certified in IT Security (Cyber Forensics, Penetration Testing, Protection, and Vulnerability Analysis & Defense) and Project/Program Management. He has a thorough understanding of malware, computer forensics, and tactics, techniques, and procedures that are leveraged by attackers. He is also an experienced project manager with over 10 years of experience leading cyber security related projects.
  • Mr. Orlikoski entered the security field as an US Air Force officer, and later specialized in computer forensics and architecting cyber defense solutions outside of the military. He has designed and implemented defense solutions for government and Fortune 100 companies. He has more recently participated on teams tasked to assess and advise Fortune 100 clients, with a focus on maturing an organization’s ability to more quickly and effectively detect, respond to, and contain targeted attacks.
  •  Platform Security Engineer Square, Inc
  • Title: Using Open Source Tools to Solve New DFIR Challenges
  • Abstract: The technology in business is always changing and thereby constantly creating new and interesting challenges for all Digital Forensics & Incident Response (DFIR) teams. This is seen in stunning details as companies are migrating to non-Windows and Cloud environments for virtualization and data storage. These migrations have made the current generation of IR Tools, Techniques and Procedures (TTP) either sub-optimal and/or obsolete.
  • Frequently, DFIR teams do not have the money to purchase, nor the time needed to develop a DFIR toolkit solution that meets these new requirements themselves. Although many open source solutions exist, they typically require an advanced level of skill to setup and maintain. Alternatively, custom solutions present risk should the maintainer leave or become otherwise unable to maintain it. This is where curated collection of Open Source tools such as the “CyLR, CDQR Forensics - Virtual Machine” (CCF-VM) provide value. The CCF-VM provides a conveniently packaged, easy to use platform, designed from the ground up to enable teams to collect, process, and analyze critical forensics artifacts. It works on Mac, Linux and Windows endpoints while enabling the searching across single or multiple hosts simultaneously.
  • This presentation will discuss some of the new challenges are, explain the difference between Live Response and cold disk forensics, and show, with a demo, how the CCF-VM can be used to solve them today.
  • Scott Parker
  • Bio: Scott is an Information Systems Security Association Distinguished Fellow (reserved for the top 1% members) and has 30 years of strategic and tactical information security experience across multiple control points – data centers, endpoints, and gateways with a focus on threat protection, information protection, cyber security services and security analytics.
  • Title: Living off the land
  • Abstract: Attackers are increasingly making use of tools already installed on targeted computers or are running simple scripts and shellcode directly in memory. Creating less new files on the hard disk means less chance of being detected by traditional security tools and therefore minimizes the risk of an attack being blocked.  The four main categories of living off the land and fileless attack techniques are: memory-only threats, fileless persistence, dualuse tools, and non-PE file attacks.




Connect with us on Twitter, Facebook and LinkedIn!!


Developing and Connecting Cybersecurity Leaders Globally



ą
Unknown user,
Mar 22, 2012, 8:56 AM
Comments