March 2019

Sponsor: Digital Shadows

Date: March 7, 2019

Speaker: Stephen Muller

Topic: Business Email Compromise Made Easy

Abstract: Well-resourced actors typically access business email accounts through targeted phishing campaigns or using information-stealing malware. The barriers to entry, however, have fallen dramatically, with cybercriminals able to gain access to inboxes in other ways. In this talk, attendees will learn how cybercriminals access inboxes without the need to phish, including: Business Email Compromise-as-a-service offerings sold on criminal forums; reusing credentials available in breaches or third-party leaks; and through the 12.5 million email archive files exposed across online file stores. The talk will also cover security measures and processes to help organisations avoid becoming victims of these campaigns

Please REGISTER to ensure an accurate head count for lunch.  

Lunch is $15 for non members.

Professional Credit: 1.5 CPE

February 2019

Sponsor: Structured

Date: February 7, 2019

 

Speaker: TBA

Topic: Endpoint Risk Management & Security

Lunch is $15 for non members.

Please Register to ensure an accurate head count for lunch.

 

Professional Credit: 1.5 CPE

Hope to see you soon!

Boise ISSA President

If you have any questions or need to cancel please email Rachel.

January 2019

Sponsor: Palo Alto

Speaker: Simon Conant

“Just Another Day on the Internet”

Simon Conant, Principal Researcher in the Unit 42 Threat Intelligence team, will discuss the current threat landscape. Simon will highlight several campaigns and review advances in malware, tactics, and cyber threats, that adversaries are using to breach modern enterprise networks.

Bio:

“Simon is a Principal Researcher in Palo Alto Network’s Unit 42 threat research group. He draws upon a quarter-century of international experience in the fields of malware & infrastructure analysis, networking, and information security, including several years in the Microsoft Security Response Center. He was involved in founding Microsoft’s CSS Security & Internet Crime Investigation teams, and the International Botnet Task Force. A native of New Zealand, Simon is based out of Seattle.”

Register

Lunch is $15 for non members.

Professional Credit: 1.5 CPE

December 2018

Sponsor: ISSA & ISACA

**Date: December 19, 2018**

 

 *disclaimer* This lunch is NOT free. All members/non members, are required to bring a new unwrapped toy to donate to Toys for Tots, or $15 (cash, check, card accepted at the door) to donate to Toys for Tots. 

 

Speaker: Justin Courtial, Justin Courtial (CISSP) is a Cyber Security Lead for a publicly traded utility in Idaho. He is currently focused on Incident Response, Host/Network Forensics, Enterprise Security Architecture and Enterprise Security policy. He has a BBA from Washington State University in Management Information Systems.

Title: Nation States, Hackers, and Squirrels – The threats facing US Critical Infrastructure

Summary: Join Justin Courtial, as he takes his audience on the captivating journey that is Industrial Control System Security! Come away with some new conversation starters for your holiday parties as you drop some knowledge on your fellow revelers with terms like ICS, SCADA, HMI, RTU, and PLC! If that wasn’t enough, get ready to dazzle everyone that hasn’t walked away from you pretending to answer a phone call with some highlights about some of the attacks against Critical Infrastructure. We will top it all off with security suggestions you have undoubtedly heard before but maybe ignored, and of course, squirrels.

 

This lunch is NOT free. All members/non members, are required to bring a new unwrapped toy to donate to Toys for Tots, or $15 (cash, check, card accepted at the door) 

 

Register

2018-19 Schedule

Our new officers have been working hard to bring to you this new schedule, with lots of exciting updates for us as we move forward on our objective of increased networking and personal growth opportunities for each member of Boise ISSA:

November 1 – Carbon Black, Endpoint and Threat Hunting.  CB has just released ThreatHunter, a new cloud solution, which will likely be discussed in part during this meeting.

December 19 – Holiday Mixer with ISACA.  We’ll ask for a donation for Toys for Tots or payment for lunch to support those in need.  Two speakers are planned including Industrial Control Systems (ICS) and Internet of Things (IoT) risk management.

January 10 – Palo Alto Unit 42 emerging threats

February 7 – Structured, Endpoint Risk Management

March 7 – Digital Shadows, Darkweb

April 15-1618th Annual Boise ISSA Infosec conference.  Monday, the 15th, will be hands-on training.  The main conference is on Tuesday the 16th with a more compressed focused schedule and lunch provided for maximum networking and value as you attend this important regional event.

May – Voting for officers for the next year of service.  Consider joining.  The duty is light, CPEs are many, and we need you to give back to the community!

June 6 – Members only meeting with fun TBA!  This year we will conduct annual business events and transition of officers.

October 2018

October 2018

Sponsor: ISSA

Speaker: Ken Dunham, Optiv, MSS Technical Director

Abstract: 

Orchestration and Automation in the Real World

With a massive gap in available talent and scale challenges in a big data world the industry is starting to embrace orchestration and automation as a solution.  There is no easy fix.  There is no affordable off the shelf solution.  Orchestration and automation, in the real world, involves real challenges, pitfalls, and opportunities to grow and mature as an organization.  Ken will introduce the concepts of O&A and share how Optiv has navigated application of these principles and solutions within MSS, with some failure and some success.  

Register

2018-2019 Kick Off

Boise ISSA 2018-2019 is an exciting year for our chapter as we revise our bylaws and operating procedures, improve conference flow and logistics to maximize value, and focus on our core values of connection and personal growth.  We are working on maturing a new mentor and educational support program here at Boise ISSA along with notable changes for our annual InfoSec Conference.  Leadership is strong with veteran leaders at the helm rounding out the following board members for this coming year:

Ken Dunham
President
president@boiseissa.org
Justin Courtial

Vice President

vp@boiseissa.org
Fuli Chavez

Education

education@boiseissa.org
Rachel Zahn

Communications

communications@boiseissa.org
Dave Reis

Membership

membership@boiseissa.org
Vince Skinner

Webmaster

webmaster@boiseissa.org
Michael Stanton

Treasurer

treasurer@boiseissa.org

March 2018

Sponsor: NCC Group

Speaker: Vic Bhatia, Regional Director for the RMG practice at NCC Group

Title: HITRUST CSF – Introduction, Critical Success Factors, and Key Gotchas

Abstract:  HIPAA is not prescriptive, which makes it open to interpretation and difficult to apply. Organizations must necessarily reference additional standards for guidance on how to implement the requirements specified by HIPAA. It is also not the only set of security requirements healthcare organizations need to address (e.g., PCI, state, business partner requirements etc.).

The Health Information Trust Alliance (HITRUST) exists to ensure that information security becomes a core pillar of, rather than an obstacle to, the broad adoption of health information systems and exchanges. It has developed a CSF framework that addresses specific challenges such as concern over current breaches, numerous and sometimes inconsistent requirements and standards, compliance issues, and the growing risk and liability associated with information security in the healthcare industry. Organizations can use this CSF framework to create, access, store, or exchange Protected Health Information (PHI) safely and securely.

This presentation will give an introduction to the HITRUST CSF framework and how to implement it; and also, an overview of some of the critical success factors and ‘gotchas’ that NCC Group has encountered in its work as a HITRUST CSF Assessor.

BIO: Vic’s background is industry operator turned consultant. Earlier on in his career, Vic was the CISO of a global Fortune 500 company. He subsequently switched to consulting about 10 or so years ago; leveraging his  C | CISO leadership experience and board-level management skills to assist clients in the areas of information security, enterprise risk management, business continuity, compliance and governance.

Vic’s area of expertise is working with companies where “security fatigue” has set in – and executives are questioning the vision, value-add, execution, and ROI for security. Vic is a trusted advisor to the board and CISO-coach to “right-size”, align and fix under-performing security programs.

Vic is also a frequent speaker at various conferences and seminars, and the author of an upcoming book “CISO Essentials: Your First 90 Days”.

Lunch is $15 for non members, cash or check only.

Professional Credit: 1.5 CPE

 

Register

February 2018

Sponsor: Intrinium

Speaker: Kylie Martonik, Manager, Security Consulting

Title: “Don’t turn off that computer!”  The Top Mistakes That Will Disrupt a Forensic Investigation

 Abstract:  The most difficult aspect of Forensics Investigations is that MOST ALL well-intentioned remediation tactics like running virus scans, shutting off the suspect computer, disconnecting from the internet, moving devices to another network – are LIKELY THE WRONG STEPS TO TAKE and can severely impact the forensic investigation. The correct steps can be very counterintuitive, which makes trusting your instincts a risky proposition.

Handling a Forensic Investigation correctly requires a disciplined process executed by technical staff that have the appropriate expertise. From initial discovery to delivery of the findings, every step of an investigation should be meticulously planned and followed.

In this interactive conversation, Intrinium’s Security Consulting Manager, Kylie Martonik, will explore several actions that are often taken by well-intentioned personnel that will compromise your investigation. We will discuss what you and your company can start doing now to ensure you are prepared to CORRECTLY handle incidents in the future.

BIO: As a key penetration tester for Intrinium, Kylie has deep experience in ethical hacking and vulnerability analysis at institutions of all size throughout the Northwest and beyond. Kylie is adamant about information security and ensuring the so called “crown jewels” of a company are properly protected from both outsider and insider threats. She has been a first responder and investigator in forensic investigations ranging from small businesses to larger firms such as retail and financial institutions. Additionally, Kylie is an expert on a range of standards set forth by NIST, the NSA, HIPAA, and the SANS Institute. Kylie is a graduate of Eastern Washington University with a Bachelor’s degree in Computer Information Systems focused in the field of cyber security including Network Security and Information Warfare.

 

Register