Oct 26 2018

Kickoff to Rocket Secure 2

  • 5

    days

  • 18

    hours

  • 36

    minutes

  • 43

    seconds

NAC-ISSA and Calhoun Community College present Rocket Secure 2 at Calhoun Community College, our Mission Control Sponsor!!

Conference Overview

NAC-ISSA and Calhoun Community College present our 2nd launch of Rocket Secure! We've decided to go big again for Cyber Security Awareness month of October. Rocket Secure 2 is a high impact and explosively fast conference held at Calhoun Community College on Friday, October 26, 2018. Tickets are limited so don't miss the launch of this event.

This conference will run from 8:00am until we run out of speakers. We will have talks and information targeting novices (soccer moms) to professionals. Speakers will present technical talks down to how to protect yourself online and at public places with wifi. There will be a cyber cafe to show people how to recognize nefarious wifi. Multiple sessions running throughout the day will be augmented with an opportunity for exhibits/sponsors/vendors in the main concourse. We will open at 8:00am for coffee and networking with sessions starting at 9:00am. There will be breaks for people to visit the exhibit tables and lunch will be provided. Submit questions to rocketsecure@nac-issa.org.

Our Schedule Track

Home Front

Introductory sessions in cyber security for the non-professional. Safety on public Wi-Fi, safe password/MFA practices, social media safety.

Store Front

Focus on small business such as small stores, lawyer offices, doctor offices, non-profits. What are your liabilities and responsibilities.

Aspiring Cyber Warrior

Introductory sessions in cyber security for the non-professional. Cyber range demo, walk through cybersecurity certification maze, raspberry pi demo and what can you do with a pi.

Practicing Professional

Palo Alto firewall demo. Talk to Palo Alto engineers one on one about firewall for your business. Do you Python? Learn all about using Python. Reverse Engineering.

Evil Genius

Block Chain deep dive. Trends in attacks and Mitigation tools.

Conference Schedule





09:30 AM
Huntsville Alabama Police Dept. Property Crimes Unit

Huntsville Alabama Police Dept. presentation that is focused toward cell phone, file system, IoT devices, and network infrastructure and end systems forensics

Presented by Inv. B. Adams #13369
Room 301
10:30 AM
Your Online Presence: A Hacker's Perspective

Your Online Presence: A Hacker's Perspective

Jamie Miller
Room 301
12:30 PM
Homeland Security - Making family information security a priority

As parents it is our job to teach our kids about life. One aspect of life we need to teach and lead them in is information security. In this talk I'll outline our family's approach to information security and why my bio mentions teaching my children how to hack in an ethical fashion. This talk will be more than encouraging parents to get their kids to eat their digital vegetables. It will also touch on some of the vexing problems our children face today including bullying and suicide.

Wes Widner
Room 301
1:30 PM
BBVA Speaker Keep it Safe

BBVA Speaker Keep it Safe

BBVA Speaker
Room 301
9:30 AM
What Do Business Owners Need to Know About Cyber Security?

What do business owners need to know about cyber security and what are the resources available to those without an IT person? Who are the local companies that can help setup a network and security.

Jason Cuneo
Room 303
10:30 AM
Resources for Reporting Cybersecurity Incidents

This presentation will introduce the audience to several Cybersecurity reporting resources available to Small Businesses in plain English.

Jeremy Blevins
Room 303
9:30 AM
Session 1
Ira Lacey
Room 305
Deloitte Speaker
Room 307
10:30 AM
Certification Confusion?

Certification Confusion - Are you confused about which certification will get you that perfect job and which is not worth the money? We will sort of the certifications for you and answer all your questions about certification!

Ben McGee
Room 305
Deloitte Speaker
Room 307
12:30 PM
Session 3
Deloitte Speaker
Room 307
1:30 PM
Session 4
Deloitte Speaker
Room 307
9:30 AM
Gamification - Or Convincing Users to Do Your Bidding

This presentation will explore using the human desire to be the best, or at least not the worst, to encourage competition between teams to remediate vulnerabilities. In a metric free environment it's easy for each IT admin group to look at themselves and think they are doing a good job while other divisions are obviously not doing enough to secure their systems. Comparative scoring, as part of a security program, helps security teams shine a light on vulnerability mitigation successes and failures. Through scoring, security teams can further help to guide teams to the areas that most need attention.

Daniel Owen
Room 309
10:30 AM
Cyber Insanity: Compliance and Risk Management Frameworks

Are these frameworks good or bad? Do they make the world a safer place or do they inhibit innovation and drive mediocracy? This talks explores whether cybersecurity is better or worse because of these frameworks? What might the world look like without the frameworks and how can frameworks be improved to better address security needs.

Joshua Crumbaugh
Room 309
12:30 PM
Persistent Hacking

Persistent hacking goes unnoticed for a long time or indefinitely, and it is easy to accomplish because of the abuses being used. AV and latest products are often signature based analysis and looking for something simple, like a hashable exploit, or key words in a program that appear malicious. The things that are always overlooked are the tools already at your fingertips. These are the built in command line tools in Windows, logic flaws in basic security systems, legacy functionality, and terrible oversight of Microsoft's handling of the registry. Even the best heuristic analysis would have a hard time recognizing the abuses being covered.

Sean Hopkins
Room 309
1:30 PM
Using Open Source Tools for forensics

Using Open Source Tools for forensics

Jason Cuneo
Room 309
9:30 AM
The Sound of Evil

Our ears are the original nexus of information security. The environments we're in are constantly streaming valuable information to us. All we have to do is listen properly. "Let he who has ears" and all that. Join me as we explore the fascinating world of audio security.

Wes Widner
Room 306
12:30 PM
Python in the network environment

Discuss how to build a TCP SYN scanner to identify open ports on a network, and how to automate the SSH protocol for building customized network security management tools

Daniel S. Robbins
Room 306
1:30 PM
Practical Pontification

This is a relatively simply talk with a focus on practical pontification about the basics of reverse engineering. The presentation begins with a definition of reverse engineering and a short discussion about common tools used in reverse engineering. Next, we dive into a short tutorial on x86 registers, x86 assembly language, and describe the disassembly process with a couple of examples.

Ben Denton, PhD
Session 4

Speakers

Check out the lineup.
Huntsville

Calhoun Campus

October

26th 2018

Attendees

300 Tickets Only