BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//NACISSA - ECPv6.15.20//NONSGML v1.0//EN
CALSCALE:GREGORIAN
METHOD:PUBLISH
X-WR-CALNAME:NACISSA
X-ORIGINAL-URL:https://nac-issa.org
X-WR-CALDESC:Events for NACISSA
REFRESH-INTERVAL;VALUE=DURATION:PT1H
X-Robots-Tag:noindex
X-PUBLISHED-TTL:PT1H
BEGIN:VTIMEZONE
TZID:America/Chicago
BEGIN:DAYLIGHT
TZOFFSETFROM:-0600
TZOFFSETTO:-0500
TZNAME:CDT
DTSTART:20250309T080000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0500
TZOFFSETTO:-0600
TZNAME:CST
DTSTART:20251102T070000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0600
TZOFFSETTO:-0500
TZNAME:CDT
DTSTART:20260308T080000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0500
TZOFFSETTO:-0600
TZNAME:CST
DTSTART:20261101T070000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0600
TZOFFSETTO:-0500
TZNAME:CDT
DTSTART:20270314T080000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0500
TZOFFSETTO:-0600
TZNAME:CST
DTSTART:20271107T070000
END:STANDARD
END:VTIMEZONE
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20260421T113000
DTEND;TZID=America/Chicago:20260421T123000
DTSTAMP:20260415T081806
CREATED:20260401T162023Z
LAST-MODIFIED:20260410T142729Z
UID:10000071-1776771000-1776774600@nac-issa.org
SUMMARY:Chapter lunch with Jason Cuneo and Digital Forensics
DESCRIPTION:Join NAC-ISSA for our April chapter lunch with Jason Cuneo presenting on Digital Forensics.  \n\n\n\nIn this lunch-and-learn session\, Jason will draw on years of hands-on experience leading digital forensics projects\, as well as teaching courses at both the undergraduate and graduate levels\, to provide a practical introduction to modern digital forensics. The session will explore the techniques and tools used to conduct deep-level analysis of information systems across both Windows and Linux environments.  \n\n\n\nAttendees will gain a broad survey of investigative approaches\, including operating system analysis\, file system examination\, process and memory analysis\, protocol inspection\, and the identification and interpretation of operating system–specific digital artifacts. Throughout the session\, Jason will demonstrate several classes of digital forensics tools\, connecting foundational theory with real-world use cases. The goal is to equip participants with actionable insights and methodologies that can be directly applied within everyday work environments. \n\n\n\nCatering is by Ted’s with a potato bar\, pulled pork and pulled chicken.  This month’s door prize is a SwissGear laptop bag.
URL:https://nac-issa.org/event/chapter-lunch-with-jason-cuneo-and-digital-forensics/
LOCATION:Auburn University Research and Innovation Campus\, 345 Voyager Way\, Huntsville\, AL\, 345 Voyager Way\, Huntsville\, United States
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20260423T163000
DTEND;TZID=America/Chicago:20260423T193000
DTSTAMP:20260415T081806
CREATED:20260325T221327Z
LAST-MODIFIED:20260325T221328Z
UID:10000070-1776961800-1776972600@nac-issa.org
SUMMARY:Beers for Engineers with Women in Defense
DESCRIPTION:Join the North Alabama Chapter of ISSA and the Tennessee Valley Chapter of Women in Defense as we co-host Beers for Engineers in April.  Both organizations seek to grow the cyber community throughout North Alabama.  We’ll run this event from 4:30 to 7:30 at InnerSpace Brewing.  Come join us to meet new friends and help make our cybersecurity community even stronger!
URL:https://nac-issa.org/event/beers-for-engineers-with-women-in-defense/
LOCATION:InnerSpace Brewing\, 2414 Clinton Ave W\, Huntsville\, 35805-3014\, United States
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20260519T113000
DTEND;TZID=America/Chicago:20260519T123000
DTSTAMP:20260415T081806
CREATED:20251104T222317Z
LAST-MODIFIED:20260413T224541Z
UID:10000055-1779190200-1779193800@nac-issa.org
SUMMARY:WallArm sponsors May 2026 NAC-ISSA lunch
DESCRIPTION:TOPIC: Business Logic Abuse: Technology Agnostic Mapping of Attack Types \n\n\n\nOWASP’s technology specific top 10 lists have provided a ton of value\, but it’s time for a different approach to business logic abuse. The rise of APIs and complex business logic attacks requires a new taxonomy that isn’t tied to a specific technology. \n\n\n\nOur Speaker is Johanns Quiroz.  Johanns Quiroz is a seasoned cybersecurity and technology professional with over two decades of experience helping organizations design\, secure\, and scale modern digital environments. Currently serving as a Sr. Sales Engineer at Wallarm\, Johanns supports customers across the Southeast\, LATAM\, and Caribbean\, where he focuses on application and API security\, pre-sales strategy\, and partner enablement. Prior to Wallarm\, he held senior technical sales and engineering roles at Horizon3.ai\, where he specialized in offensive security and helping organizations proactively identify and mitigate risk. Johanns also brings deep expertise in enterprise infrastructure\, having spent over 20 years as a solutions architect designing complex environments across storage\, virtualization\, and cloud technologies. Known for his consultative approach and ability to bridge business and technical stakeholders\, Johanns is passionate about helping organizations stay ahead of evolving cyber threats while enabling innovation and growth.
URL:https://nac-issa.org/event/wallarm-sponsors-april-2026-nac-issa-lunch-april-2026/
LOCATION:Auburn University Research and Innovation Campus\, 345 Voyager Way\, Huntsville\, AL\, 345 Voyager Way\, Huntsville\, United States
END:VEVENT
END:VCALENDAR