NAC-ISSA and Calhoun Community College present Rocket Secure 2 at Calhoun Community College, our Mission Control Sponsor!!
NAC-ISSA and Calhoun Community College present our 2nd launch of Rocket Secure! We've decided to go big again for Cyber Security Awareness month of October. Rocket Secure 2 is a high impact and explosively fast conference held at Calhoun Community College on Friday, October 26, 2018. Tickets are limited so don't miss the launch of this event.
This conference will run from 8:00am until we run out of speakers. We will have talks and information targeting novices (soccer moms) to professionals. Speakers will present technical talks down to how to protect yourself online and at public places with wifi. There will be a cyber cafe to show people how to recognize nefarious wifi. Multiple sessions running throughout the day will be augmented with an opportunity for exhibits/sponsors/vendors in the main concourse. We will open at 8:00am for coffee and networking with sessions starting at 9:00am. There will be breaks for people to visit the exhibit tables and lunch will be provided. We will have a networking event afterwards, please gather in the Keynote room for closing ceremony. Submit questions to firstname.lastname@example.org.
Our Schedule Track
Introductory sessions in cyber security for the non-professional. Safety on public Wi-Fi, safe password/MFA practices, social media safety.
Focus on small business such as small stores, lawyer offices, doctor offices, non-profits. What are your liabilities and responsibilities.
Aspiring Cyber Warrior
Introductory sessions in cyber security for the non-professional. Cyber range demo, walk through cybersecurity certification maze, raspberry pi demo and what can you do with a pi.
Focuses on topics aimed at the cyber professional looking to expand their knowledge and learn more about the tools available for cyber security practitioners.
Deep dive sessions for seasoned cyber security professionals or take a hands on test drive with Palo Alto's Traps endpoint protection.
Though most of us in attendance are Cyber professionals, we are all called upon at times to teach the basics to those that are still confused about Cyber Security. Whether they are parents, neighbors, or a possibly a group of seniors, we need the tools to communicate effectively with those that are need these skills in order to safely go online. I run the Technology Training Center at Huntsville/Madison County Library and have taught scores of basic PC skills and basic internet classes. Let me make this task easier by sharing my experiences and discussing what I have found to be the most effective ways to reach out to those who are still putting themselves at risk.
As parents it is our job to teach our kids about life. One aspect of life we need to teach and lead them in is information security. In this talk I'll outline our family's approach to information security and why my bio mentions teaching my children how to hack in an ethical fashion. This talk will be more than encouraging parents to get their kids to eat their digital vegetables. It will also touch on some of the vexing problems our children face today including bullying and suicide.
PowerShell for red teams and attackers living off the land has been a popular topic for a few years but, far too few defensive security professionals (blue teams) have taken up the mantle of supplementing tools with their own scripts. In this presentation I will discuss why every blue team security professional should be using and writing their own PowerShell scripts to audit and defend their environment.
Put simply, to compete the blue teamer must be able to script to survive in the modern IT environment.
Are these frameworks good or bad? Do they make the world a safer place or do they inhibit innovation and drive mediocracy? This talks explores whether cybersecurity is better or worse because of these frameworks? What might the world look like without the frameworks and how can frameworks be improved to better address security needs.
Persistent hacking goes unnoticed for a long time or indefinitely, and it is easy to accomplish because of the abuses being used. AV and latest products are often signature based analysis and looking for something simple, like a hashable exploit, or key words in a program that appear malicious. The things that are always overlooked are the tools already at your fingertips. These are the built in command line tools in Windows, logic flaws in basic security systems, legacy functionality, and terrible oversight of Microsoft's handling of the registry. Even the best heuristic analysis would have a hard time recognizing the abuses being covered.
Our ears are the original nexus of information security. The environments we're in are constantly streaming valuable information to us. All we have to do is listen properly. "Let he who has ears" and all that. Join me as we explore the fascinating world of audio security.
This is a relatively simply talk with a focus on practical pontification about the basics of reverse engineering. The presentation begins with a definition of reverse engineering and a short discussion about common tools used in reverse engineering. Next, we dive into a short tutorial on x86 registers, x86 assembly language, and describe the disassembly process with a couple of examples.
These Early Fueling Prices will end soon! Cyber Security companies and organizations, do you want to get the word out in the Rocket City? We will have a hundreds of dedicated highly motivated technical experts all converging in one spot for a few hours. They all want to learn, and you want them to learn about your products and capabilities. We have limited availability for sponsorships on a first come basis. You can reserve a spot to share your message where everyone will see and hear. We will also post your logo right on the Rocket Secure page so every ticket holder and agenda gawker will see it. So reserve today we have limited sponsorships available.
Not seeing what you need? Want to take your sponsorships to the far reaches of the galaxy? Contact us and ask about additional sponsorships!
Cyber Security companies and organizations, do you want to get the word out in the Huntsville area? We will have a few hundred dedicated highly motivated technical experts all converging in one spot for a few hours. They all want to learn, and you want them to learn about your products and capabilities. We have limited availability for sponsorships on a first come basis. For less than $2 per attendee you can reserve a spot to share your message where everyone will see and hear. We will also post your logo right on the BSides page so every ticket holder and agenda gawker will see it. So reserve today we have limited sponsorships available. Become A Sponsor!