February 2018

Sponsor: Intrinium Speaker: Kylie Martonik, Manager, Security Consulting Title: “Don’t turn off that computer!”  The Top Mistakes That Will Disrupt a Forensic Investigation  Abstract:  The most difficult aspect of Forensics Investigations is that MOST ALL well-intentioned remediation tactics like running virus scans, shutting off the suspect computer, disconnecting from the internet, moving devices to another network – are LIKELY THE WRONG STEPS TO TAKE and can severely impact the…

January 2018

*This meeting is on January 11* Sponsor: FireEye Speaker: Terry Boedeker Title: Battlefield 2018: Insights & Predictions for an Evolving Threat Landscape BIO: Terry Boedeker is an award-winning, consultative solutions architect and sales engineering manager with a strong technical acumen and over 15 years of success in the high-tech sector. He has a proven ability to mentor and motivate high-performance technical teams and boasts a track record of…

December 2017

Sponsor: Trace3 Speaker: Josh McCarthy BIO:Josh is a security industry veteran with over 15 year’s experience helping enterprises defend against emerging threats. He started with FireEye during their inception and led their engineering team for 8 years through their IPO. He left FireEye to join Crowdstrike to work with strategic accounts, and recently joined Demisto to lead the SE Team. Title: Hacks for Hacking Attacks: Automate Threat…

Novemeber 2017

November 2017 Sponsor: Carbon Black Speaker: Jason Madey Title: “Evolving your security to defend against modern attacks” Abstract: We will discuss the impact of the changing threat landscape, issues Administrators are seeing, what is needed today to better defend, and what can be done to mature your response processes. Lunch is $15 for non members, cash or check only. Register

October 2017

Sponsor: McAfee Speaker: Pete Hebner Pete has over 23 years of expereience in the telecommunications, data communications and Security industry. He has been with McAfee/Intel since 2003 starting as a senior security engineer and moving into the sales engineer manger position over the Western Region. Title: Security Automation Abstract: Driving the shift from Protection-only to an Integrated Threat Defense Lifecycle reducing business, operational, & financial risks. Register Lunch…

September 2017

Sponsor: ForeScout Speaker: Tony Velada Title: The Internet of Things is not Coming. It is here! Abstract: Discover What Your Peers Think about the State of IoT Security.The Internet of Things (IoT) is rapidly expanding the attack surface on corporate networks. Every “agentless” IoT device presents serious risk to the network, as it can serve as a potential attack or reconnaissance point.  How common are IoT devices…

February 2017

February 2017 Sponsor: ASG Speaker: Jeff Hooper, Systems Engineer at Gemalto (formerly SafeNet) Topic: Digital Certificates and Key Management.  He will cover new laws requiring key management, give examples of specific breaches and how the solutions helped them recover or prevent the attacks.   Register   Lunch is $15 for non members, cash or check only.

January 2017

Sponsor: Boise ISSA Moderator: Vince Skinner and Fuli Chavez Topic: Overcoming the difficulties of implementing effective protections Register Lunch is $15 for non members, cash or check only.

December 2016

December 2016 Sponsor: Boise ISSA Moderator: Vince Skinner, VP of Security, D.A. Davidson & Boise ISSA President  Topic: Round Table Discussion. Topics to include: malware protections, incident response, penetration testing, Senior Management Support, and other related topics. Register

November 2016

Sponsor: Tanium Topic: Know your environment better than your adversary Presenter: Jesse Harris, Director of Technical Account Management Summary:  Assumption of breach. We are existing in a world where the adversary is significantly better equipped than most security teams. Most only know what is supposed to be in the environment, the winning party will know what is actually in the environment Good Hygiene: 99% of breaches come…

October 2016

Sponsors: RSA & Datashield Topic: Exposing the Terracotta VPN – Anatomy of an Advanced Campaign Summary: In August 2015, RSA uncovered details of a massive malware-supported VPN network being used as a launch platform for APT activity, dubbed “Terracotta”.   This malicious service gave nation-state actors a way to obscure their true origin when acting on their objectives by tunneling their activities through VPN nodes silently…