January 2018

*This meeting is on January 11*

Sponsor: FireEye

Speaker: Terry Boedeker

Title: Battlefield 2018: Insights & Predictions for an Evolving Threat Landscape

BIO: Terry Boedeker is an award-winning, consultative solutions architect and sales engineering manager with a strong technical acumen and over 15 years of success in the high-tech sector. He has a proven ability to mentor and motivate high-performance technical teams and boasts a track record of achievement in delivering reduced costs, increased operational efficiency and delivering effective cybersecurity strategies and controls.

Terry regularly demonstrates strong relationship and team building abilities, is an excellent trainer and a highly-sought orator in the subjects of technology, cybersecurity, geopolitics and data governance.

Register

Lunch is $15 for non members, cash or check only.

Professional Credit: 1.5 CPE

Hope to see you soon!

Vince Skinner, President

If you have any questions or need to cancel please email Rachel.

PLEASE RSVP 48 HOURS BEFORE THE EVENT SO WE HAVE AN ACCURATE HEAD COUNT FOR FOOD!!!

If you are a maybe please respond with a yes.

December 2017

Sponsor: Trace3

Speaker: Josh McCarthy

BIO:Josh is a security industry veteran with over 15 year’s experience helping enterprises defend against emerging threats. He started with FireEye during their inception and led their engineering team for 8 years through their IPO. He left FireEye to join Crowdstrike to work with strategic accounts, and recently joined Demisto to lead the SE Team.

Title: Hacks for Hacking Attacks: Automate Threat Hunting & Response to Ransomware, Phishing

Abstract: 

Do you spend hours threat hunting and responding to phishing and ransomeware attacks?

Why not save some time and learn a few tips, tricks, and hacks by using Demisto’s interactive playbooks? They are so easy to build, it’s like playing a game. A game that’s fun and easy and more effective than ever to reduce the number of alerts that require human review.

Oh, and they save you tons of time. Literally from hours to minutes. So you can focus more of your time on the big, hairy, scary, and most interesting attacks that need your expert attention.

Attend this luncheon demo to see how easy it is to build a playbook in Demisto. You’ll snap workflows together to automate manual-intensive tasks and see how the product’s machine learning suggestions will help you resolve real-world, complex threats. Product details you’ll see in the demo include:

Threat hunting enrichment playbook,

Phishing playbook, and a

Level 3 interactive investigation using DBot’s machine learning suggestions.

See how you’ll get smarter and more efficient with every incident – as all knowledge acquired is kept within the product for future reference.

Lunch is $15 for non members, cash or check only.

Register

Novemeber 2017

November 2017

Sponsor: Carbon Black

Speaker: Jason Madey

Title: “Evolving your security to defend against modern attacks”

Abstract: We will discuss the impact of the changing threat landscape, issues Administrators are seeing, what is needed today to better defend, and what can be done to mature your response processes.

Lunch is $15 for non members, cash or check only.

Register

October 2017

Sponsor: McAfee

Speaker: Pete Hebner
Pete has over 23 years of expereience in the telecommunications, data communications and Security industry. He has been with McAfee/Intel since 2003 starting as a senior security engineer and moving into the sales engineer manger position over the Western Region.

Title: Security Automation

Abstract: Driving the shift from Protection-only to an Integrated Threat Defense Lifecycle reducing business, operational, & financial risks.

Register

Lunch is $15 cash or check if you are not a member

September 2017

Sponsor: ForeScout

Speaker: Tony Velada

Title:

The Internet of Things is not Coming. It is here!

Abstract:

Discover What Your Peers Think about the State of IoT Security.The Internet of Things (IoT) is rapidly expanding the attack surface on corporate networks. Every “agentless” IoT device presents serious risk to the network, as it can serve as a potential attack or reconnaissance point.  How common are IoT devices on enterprise networks? How many unknown IoT devices exist? What are IT staffs doing to secure them? IT professionals responsible for enterprise networks were surveyed regarding their view about the prevalence and security of the Internet of Things (IoT).

Register

 

Lunch is $15 for non members, cash or check only.

 

Professional Credit: 1.5 CPE

Hope to see you soon!

Vince Skinner, President

If you have any questions or need to cancel please email Rachel.

February 2017

February 2017

Sponsor: ASG

Speaker: Jeff Hooper, Systems Engineer at Gemalto (formerly SafeNet)

Topic: Digital Certificates and Key Management.  He will cover new laws requiring key management, give examples of specific breaches and how the solutions helped them recover or prevent the attacks.  

Register

 

Lunch is $15 for non members, cash or check only.

December 2016

December 2016

Sponsor: Boise ISSA

Moderator: Vince Skinner, VP of Security, D.A. Davidson & Boise ISSA President 

Topic: Round Table Discussion. Topics to include: malware protections, incident response, penetration testing, Senior Management Support, and other related topics.

Register

November 2016

Sponsor: Tanium

Topic: Know your environment better than your adversary

Presenter: Jesse Harris, Director of Technical Account Management

Summary: 

  • Assumption of breach. We are existing in a world where the adversary is significantly better equipped than most security teams. Most only know what is supposed to be in the environment, the winning party will know what is actually in the environment
  • Good Hygiene: 99% of breaches come from known vulnerabilities. Seek a source of truth for patching, privileged credentials, autoruns, processes with md5’s, etc.
  • Know the outliers: applications, new files, changed files, 50 writes per second to a drive, etc
  • Script well – VBScript, Python, Powershell, etc.
  • IR at Scale – Basic anatomy of a mimikatz memory credential dump, how’d we get here??
  • Building an IOC for scalability, MD5 (message digest algorithm 5)
  • Our widgets have to play nice, don’t architect in silos, try to have a built in vs bolt on security architecture/strategy
  • There is a light at the end of the tunnel, but we can’t reinvent the wheel. We need to focus on ways to reinvent the road.

Register

Lunch is $15 for non members, cash or check only.

 

 

Professional Credit: 1.5 CPE
Hope to see you soon!

Vince Skinner, President

If you have any questions or need to cancel please email Rachel.
PLEASE RSVP 48 HOURS BEFORE THE EVENT SO WE HAVE AN ACCURATE HEAD COUNT FOR FOOD!!!

If you are a maybe please respond with a yes.