NAC-ISSA and Calhoun Community College present Rocket Secure 2 at Calhoun Community College, our Mission Control Sponsor!!
NAC-ISSA and Calhoun Community College present our 2nd launch of Rocket Secure! We've decided to go big again for Cyber Security Awareness month of October. Rocket Secure 2 is a high impact and explosively fast conference held at Calhoun Community College on Friday, October 26, 2018. Tickets are limited so don't miss the launch of this event.
This conference will run from 8:00am until we run out of speakers. We will have talks and information targeting novices (soccer moms) to professionals. Speakers will present technical talks down to how to protect yourself online and at public places with wifi. There will be a cyber cafe to show people how to recognize nefarious wifi. Multiple sessions running throughout the day will be augmented with an opportunity for exhibits/sponsors/vendors in the main concourse. We will open at 8:00am for coffee and networking with sessions starting at 9:00am. There will be breaks for people to visit the exhibit tables and lunch will be provided. Submit questions to email@example.com.
Our Schedule Track
Introductory sessions in cyber security for the non-professional. Safety on public Wi-Fi, safe password/MFA practices, social media safety.
Focus on small business such as small stores, lawyer offices, doctor offices, non-profits. What are your liabilities and responsibilities.
Aspiring Cyber Warrior
Introductory sessions in cyber security for the non-professional. Cyber range demo, walk through cybersecurity certification maze, raspberry pi demo and what can you do with a pi.
Palo Alto firewall demo. Talk to Palo Alto engineers one on one about firewall for your business. Do you Python? Learn all about using Python. Reverse Engineering.
Block Chain deep dive. Trends in attacks and Mitigation tools.
Homeland Security - Making family information security a priority
As parents it is our job to teach our kids about life. One aspect of life we need to teach and lead them in is information security. In this talk I'll outline our family's approach to information security and why my bio mentions teaching my children how to hack in an ethical fashion. This talk will be more than encouraging parents to get their kids to eat their digital vegetables. It will also touch on some of the vexing problems our children face today including bullying and suicide.
Certification Confusion - Are you confused about which certification will get you that perfect job and which is not worth the money? We will sort of the certifications for you and answer all your questions about certification!
Gamification - Or Convincing Users to Do Your Bidding
This presentation will explore using the human desire to be the best, or at least not the worst, to encourage competition between teams to remediate vulnerabilities. In a metric free environment it's easy for each IT admin group to look at themselves and think they are doing a good job while other divisions are obviously not doing enough to secure their systems. Comparative scoring, as part of a security program, helps security teams shine a light on vulnerability mitigation successes and failures. Through scoring, security teams can further help to guide teams to the areas that most need attention.
Cyber Insanity: Compliance and Risk Management Frameworks
Are these frameworks good or bad? Do they make the world a safer place or do they inhibit innovation and drive mediocracy? This talks explores whether cybersecurity is better or worse because of these frameworks? What might the world look like without the frameworks and how can frameworks be improved to better address security needs.
Persistent hacking goes unnoticed for a long time or indefinitely, and it is easy to accomplish because of the abuses being used. AV and latest products are often signature based analysis and looking for something simple, like a hashable exploit, or key words in a program that appear malicious. The things that are always overlooked are the tools already at your fingertips. These are the built in command line tools in Windows, logic flaws in basic security systems, legacy functionality, and terrible oversight of Microsoft's handling of the registry. Even the best heuristic analysis would have a hard time recognizing the abuses being covered.
Our ears are the original nexus of information security. The environments we're in are constantly streaming valuable information to us. All we have to do is listen properly. "Let he who has ears" and all that. Join me as we explore the fascinating world of audio security.
This is a relatively simply talk with a focus on practical pontification about the basics of reverse engineering. The presentation begins with a definition of reverse engineering and a short discussion about common tools used in reverse engineering. Next, we dive into a short tutorial on x86 registers, x86 assembly language, and describe the disassembly process with a couple of examples.
These Early Fueling Prices will end soon! Cyber Security companies and organizations, do you want to get the word out in the Rocket City? We will have a hundreds of dedicated highly motivated technical experts all converging in one spot for a few hours. They all want to learn, and you want them to learn about your products and capabilities. We have limited availability for sponsorships on a first come basis. You can reserve a spot to share your message where everyone will see and hear. We will also post your logo right on the Rocket Secure page so every ticket holder and agenda gawker will see it. So reserve today we have limited sponsorships available.