NAC-ISSA and Calhoun Community College presents Rocket Secure 2 at Calhoun Community College, our Mission Control Sponsor!!
NAC-ISSA and Calhoun Community College presents our 2nd launch of Rocket Secure! We've decided to go big again for Cyber Security Awareness month of October. Rocket Secure 2 is a high impact and explosively fast conference held at Calhoun Community College on Friday October the 26th! Tickets are limited so don't miss the launch of this event.
This conference will run from 8:00 until we run out of speakers. We will have talks and information targeting novices (soccer moms) to professionals. Speakers will present technical talks down to how to protect yourself online and at public places with wifi. There will be a cyber cafe to show people how to recognize nefarious wifi. Multiple sessions running throughout the day will be augmented with an opportunity for exhibits/sponsors/vendors in the main concourse. We will open at 8:00 for coffee and networking with sessions starting at 9:00. There will be breaks for people to visit the exhibit tables and we will have lunch. Submit questions to firstname.lastname@example.org.
Our Schedule Track
Track lineup and schedule coming soon!
Introductory sessions in cyber security for the non-professional. Safety on public Wi-Fi, safe password/MFA practices, social media safety.
Focus on small business such as small stores, lawyer offices, doctor offices, non-profits. What are your liabilities and responsibilities.
Aspiring Cyber Warrior
Introductory sessions in cyber security for the non-professional. Cyber range demo, walk through cybersecurity certification maze, raspberry pi demo and what can you do with a pi.
Palo Alto firewall demo. Talk to Palo Alto engineers one on one about firewall for your business. Do you Python? Learn all about using Python. Reverse Engineering.
Block Chain deep dive. Trends in attacks and mitigation tools.
Is your iPhone really safe or is it all just an ad? We're told that iOS is much more stable than Android but recent studies claim that iOS apps crash more than Android apps*. On the other hand, some have pointed to the FBI compromising the iPhones of the San Bernardino killers as evidence that Apple's product is riddled with security flaws. For those of us who have spent some time studying iOS security the truth is much more interesting.
Ever since watching the movie Her I'm firmly convinced that voice interaction with our devices will be the next big thing in human computer interaction. The Echo family of devices were the best selling tech gadget for Christmas 2017. Pretty much everyone in my family got one. That's a lot of devices that are always listening to the sound space around them. That got me to wondering, what is the state of audio security these days? In this talk I'll provide you with what I've found on the current state of audio security. I'll show you how what sort of attacks can be made against audio assistants and then we'll talk about how we can protect against those attacks and harden our audio security perimeter. I'll wrap up with a discussion about the future of audio security and what big challenges still await us.
Cyber Insanity: Compliance and Risk Management Frameworks
Are these frameworks good or bad? Do they make the world a safer place or do they inhibit innovation and drive mediocracy? This talks explores whether cybersecurity is better or worse because of these frameworks? What might the world look like without the frameworks and how can frameworks be improved to better address security needs.
Gamification - Or Convincing Users to Do Your Bidding
This presentation will explore using the human desire to be the best, or at least not the worst, to encourage competition between teams to remediate vulnerabilities. In a metric free environment it's easy for each IT admin group to look at themselves and think they are doing a good job while other divisions are obviously not doing enough to secure their systems. Comparative scoring, as part of a security program, helps security teams shine a light on vulnerability mitigation successes and failures. Through scoring, security teams can further help to guide teams to the areas that most need attention.
This is a relatively simply talk with a focus on practical pontification about the basics of reverse engineering. The presentation begins with a definition of reverse engineering and a short discussion about common tools used in reverse engineering. Next, we dive into a short tutorial on x86 registers, x86 assembly language, and describe the disassembly process with a couple of examples.
Practical pontification about the basics of reverse engineering
Early Liftoff Sponsor Opportunities
These Early Fueling Prices will end soon! Cyber Security companies and organizations, do you want to get the word out in the Rocket City? We will have a hundreds of dedicated highly motivated technical experts all converging in one spot for a few hours. They all want to learn, and you want them to learn about your products and capabilities. We have limited availability for sponsorships on a first come basis. You can reserve a spot to share your message where everyone will see and hear. We will also post your logo right on the Rocket Secure page so every ticket holder and agenda gawker will see it. So reserve today we have limited sponsorships available.