Oct 26 2018

Kickoff to Rocket Secure 2

  • -23

    days

  • 28

    hours

  • 15

    minutes

  • 21

    seconds

NAC-ISSA and Calhoun Community College present Rocket Secure 2 at Calhoun Community College, our Mission Control Sponsor!!

Conference Overview

NAC-ISSA and Calhoun Community College present our 2nd launch of Rocket Secure! We've decided to go big again for Cyber Security Awareness month of October. Rocket Secure 2 is a high impact and explosively fast conference held at Calhoun Community College on Friday, October 26, 2018. Tickets are limited so don't miss the launch of this event.

This conference will run from 8:00am until we run out of speakers. We will have talks and information targeting novices (soccer moms) to professionals. Speakers will present technical talks down to how to protect yourself online and at public places with wifi. There will be a cyber cafe to show people how to recognize nefarious wifi. Multiple sessions running throughout the day will be augmented with an opportunity for exhibits/sponsors/vendors in the main concourse. We will open at 8:00am for coffee and networking with sessions starting at 9:00am. There will be breaks for people to visit the exhibit tables and lunch will be provided. We will have a networking event afterwards, please gather in the Keynote room for closing ceremony. Submit questions to rocketsecure@nac-issa.org.

Our Schedule Track

Home Front

Introductory sessions in cyber security for the non-professional. Safety on public Wi-Fi, safe password/MFA practices, social media safety.

Store Front

Focus on small business such as small stores, lawyer offices, doctor offices, non-profits. What are your liabilities and responsibilities.

Aspiring Cyber Warrior

Introductory sessions in cyber security for the non-professional. Cyber range demo, walk through cybersecurity certification maze, raspberry pi demo and what can you do with a pi.

Practicing Professional

Focuses on topics aimed at the cyber professional looking to expand their knowledge and learn more about the tools available for cyber security practitioners.

Evil Genius

Deep dive sessions for seasoned cyber security professionals or take a hands on test drive with Palo Alto's Traps endpoint protection.

Conference Schedule





09:30 AM
Session 1

Huntsville Alabama Police Dept. presentation that is focused toward cell phone, file system, IoT devices, and network infrastructure and end systems forensics

Presented by Neal Jenkins
Room 303
10:30 AM
Session 2

Though most of us in attendance are Cyber professionals, we are all called upon at times to teach the basics to those that are still confused about Cyber Security. Whether they are parents, neighbors, or a possibly a group of seniors, we need the tools to communicate effectively with those that are need these skills in order to safely go online. I run the Technology Training Center at Huntsville/Madison County Library and have taught scores of basic PC skills and basic internet classes. Let me make this task easier by sharing my experiences and discussing what I have found to be the most effective ways to reach out to those who are still putting themselves at risk.

Anthony Hale
Room 303
12:30 PM
Session 3

As parents it is our job to teach our kids about life. One aspect of life we need to teach and lead them in is information security. In this talk I'll outline our family's approach to information security and why my bio mentions teaching my children how to hack in an ethical fashion. This talk will be more than encouraging parents to get their kids to eat their digital vegetables. It will also touch on some of the vexing problems our children face today including bullying and suicide.

Wes Widner
Room 303
1:30 PM
Session 4

BBVA Speaker Keep it Safe

Sean Plouse
Room 303
9:30 AM
Session 1

This presentation will introduce the audience to several Cybersecurity reporting resources available to Small Businesses in plain English.

Jeremy Blevins
Room 305
10:30 AM
Session 2

Your Online Presence: A Hacker's Perspective

Jamie Miller
Room 305
12:30 PM
Session 3

What do business owners need to know about cyber security and what are the resources available to those without an IT person? Who are the local companies that can help setup a network and security.

Jason Cuneo
Room 305
1:30 PM
Session 4

What do business owners need to know about cyber security and what are the resources available to those without an IT person? Who are the local companies that can help setup a network and security.

Mark Wensyel
Room 305
9:30 AM
Session 1
Stevan Bias & Hudson Carr - Cyber Soft Skills
Keynote Room
Ira Lacey - Why Should I Study Cyber Security
Room 306
10:30 AM
Session 2
Michael Portera - Cyber Security Career Paths
Keynote Room
12:30 PM
Session 3
Jason Brown - Cyber Situational Awareness
Keynote Room
Stan Lozovsky - Focus On Cyber
Room 306
1:30 PM
Session 4
Mark Wensyel, Bill Bruns &, Dr. Ravi Patnayakuni
Keynote Room
Jartinez Boston - Certification Confusion
Room 306
9:30 AM
Session 1

PowerShell for red teams and attackers living off the land has been a popular topic for a few years but, far too few defensive security professionals (blue teams) have taken up the mantle of supplementing tools with their own scripts. In this presentation I will discuss why every blue team security professional should be using and writing their own PowerShell scripts to audit and defend their environment. Put simply, to compete the blue teamer must be able to script to survive in the modern IT environment.

Daniel Owen
Room 301
10:30 AM
Session 2

Are these frameworks good or bad? Do they make the world a safer place or do they inhibit innovation and drive mediocracy? This talks explores whether cybersecurity is better or worse because of these frameworks? What might the world look like without the frameworks and how can frameworks be improved to better address security needs.

Joshua Crumbaugh
Room 301
12:30 PM
Session 3

Persistent hacking goes unnoticed for a long time or indefinitely, and it is easy to accomplish because of the abuses being used. AV and latest products are often signature based analysis and looking for something simple, like a hashable exploit, or key words in a program that appear malicious. The things that are always overlooked are the tools already at your fingertips. These are the built in command line tools in Windows, logic flaws in basic security systems, legacy functionality, and terrible oversight of Microsoft's handling of the registry. Even the best heuristic analysis would have a hard time recognizing the abuses being covered.

Sean Hopkins
Room 301
1:30 PM
Session 4

Using Open Source Tools for forensics

Jason Cuneo
Room 301
9:30 AM
Session 1

Our ears are the original nexus of information security. The environments we're in are constantly streaming valuable information to us. All we have to do is listen properly. "Let he who has ears" and all that. Join me as we explore the fascinating world of audio security.

Wes Widner
Room 307
10:30 AM
Session 2

PKI with Rae Barton - Product Manager, Identity and Access Management, Gemalto Saas and Safenet Trusted Access (cloud based authentication) with Andrew Arnott - Sales Engineer, Gemalto

Viperline/Gemalto Speakers
Room 307
12:30 PM
Session 3

Discuss how to build a TCP SYN scanner to identify open ports on a network, and how to automate the SSH protocol for building customized network security management tools.

Daniel Robbins
Room 307
1:30 PM
Session 4

This is a relatively simply talk with a focus on practical pontification about the basics of reverse engineering. The presentation begins with a definition of reverse engineering and a short discussion about common tools used in reverse engineering. Next, we dive into a short tutorial on x86 registers, x86 assembly language, and describe the disassembly process with a couple of examples.

Ben Denton, PhD
Room 307

Speakers

Check out the lineup.
Huntsville

Calhoun Campus

October

26th 2018

Attendees

300 Tickets Only