BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//NACISSA - ECPv6.15.18//NONSGML v1.0//EN
CALSCALE:GREGORIAN
METHOD:PUBLISH
X-ORIGINAL-URL:https://nac-issa.org
X-WR-CALDESC:Events for NACISSA
REFRESH-INTERVAL;VALUE=DURATION:PT1H
X-Robots-Tag:noindex
X-PUBLISHED-TTL:PT1H
BEGIN:VTIMEZONE
TZID:America/Chicago
BEGIN:DAYLIGHT
TZOFFSETFROM:-0600
TZOFFSETTO:-0500
TZNAME:CDT
DTSTART:20240310T080000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0500
TZOFFSETTO:-0600
TZNAME:CST
DTSTART:20241103T070000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0600
TZOFFSETTO:-0500
TZNAME:CDT
DTSTART:20250309T080000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0500
TZOFFSETTO:-0600
TZNAME:CST
DTSTART:20251102T070000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0600
TZOFFSETTO:-0500
TZNAME:CDT
DTSTART:20260308T080000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0500
TZOFFSETTO:-0600
TZNAME:CST
DTSTART:20261101T070000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0600
TZOFFSETTO:-0500
TZNAME:CDT
DTSTART:20270314T080000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0500
TZOFFSETTO:-0600
TZNAME:CST
DTSTART:20271107T070000
END:STANDARD
END:VTIMEZONE
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20250915T090000
DTEND;TZID=America/Chicago:20250919T170000
DTSTAMP:20260403T145536
CREATED:20250905T161351Z
LAST-MODIFIED:20250905T161352Z
UID:10000046-1757926800-1758301200@nac-issa.org
SUMMARY:Get Covenant Training CISSP Certified and Change Everything
DESCRIPTION:Covenant Training is offering both virtual and in-person options\, each of which includes access to our online coursework so participants can begin preparing in advance. \n\n\n\nThis isn’t just a course. It’s a transformation. \n\n\n\nIt’s the difference between a job and a mission. Between guessing and knowing. Between getting passed over… and getting paid what you’re worth. \n\n\n\nYou’re here because you’re ready to step into leadership. To command more respect\, more responsibility\, and more income. And we’re here to walk with you — every step of the way — until you’re certified\, confident\, and crushing it. \n\n\n\nNote:  This is not a NAC-ISSA sponsored event.
URL:https://nac-issa.org/event/get-covenant-training-cissp-certified-and-change-everything/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20250923T080000
DTEND;TZID=America/Chicago:20250925T170000
DTSTAMP:20260403T145536
CREATED:20250730T175437Z
LAST-MODIFIED:20250730T175718Z
UID:10000042-1758614400-1758819600@nac-issa.org
SUMMARY:National Cyber Summit
DESCRIPTION:National Cyber Summit is the nation’s most innovative cyber security-technology event\, offering unique educational\, collaborative and workforce development opportunities for industry visionaries and rising leaders. NCS offers more value than similar cyber conferences with diverse focus-areas\, premier speakers\, and unmatched accessibility. Our core focus is on three things: education\, collaboration and innovation. \n\n\n\nISSA members (any chapters) get a $100 discount off the full conference ticket price.
URL:https://nac-issa.org/event/national-cyber-summit/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20251001T080000
DTEND;TZID=America/Chicago:20251002T170000
DTSTAMP:20260403T145536
CREATED:20250905T142644Z
LAST-MODIFIED:20250905T160825Z
UID:10000045-1759305600-1759424400@nac-issa.org
SUMMARY:Hacker Halted
DESCRIPTION:Hacker Halted is an annual cybersecurity conference hosted by EC-Council\, bringing together industry experts\, ethical hackers\, and security professionals from around the world. The event features keynote sessions\, technical workshops\, and panel discussions focused on the latest trends\, threats\, and solutions in cybersecurity. \n\n\n\nEC-Council is offering NAC-ISSA free admission as a sponsor.
URL:https://nac-issa.org/event/hacker-halted/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20251016T053000
DTEND;TZID=America/Chicago:20251016T200000
DTSTAMP:20260403T145536
CREATED:20251007T223355Z
LAST-MODIFIED:20251007T224003Z
UID:10000051-1760592600-1760644800@nac-issa.org
SUMMARY:Kickoff Rocket Secure with Beers for Engineers
DESCRIPTION:October is National Cyber Security Awareness month with multiple events at NAC-ISSA.  Kick it off with Beers for Engineers at InnerSpace Brewing.  We’ve invited the speakers for Rocket Secure\, which happens the next day\, to come and network with us.
URL:https://nac-issa.org/event/kickoff-rocket-secure-with-beers-for-engineers/
LOCATION:InnerSpace Brewing\, 2414 Clinton Ave W\, Huntsville\, 35805-3014\, United States
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20251017T080000
DTEND;TZID=America/Chicago:20251017T170000
DTSTAMP:20260403T145536
CREATED:20250516T181327Z
LAST-MODIFIED:20250901T184606Z
UID:10000030-1760688000-1760720400@nac-issa.org
SUMMARY:RocketSecure 2025
DESCRIPTION:Rocket Secure is an annual event dedicated to exploring the latest cybersecurity trends\, technologies\, and best practices.  It is scheduled in October as NAC-ISSA’s celebration of National Cybersecurity Awareness month. \n\n\n\nThis conference attracts cyber professionals\, industry experts\, researchers\, vendors\, and sponsors from around the Tennessee Valley.
URL:https://nac-issa.org/event/rocketsecure-2025/
LOCATION:Calhoun Community College\, 102 Wynn Dr NW\, Huntsville\, 35805\, United States
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20251021T113000
DTEND;TZID=America/Chicago:20251021T123000
DTSTAMP:20260403T145536
CREATED:20250730T161658Z
LAST-MODIFIED:20251015T000102Z
UID:10000038-1761046200-1761049800@nac-issa.org
SUMMARY:NAC-ISSA October 2025 lunch with Andrew Staton
DESCRIPTION:Our regularly scheduled sponsor\, Insight Assurance\, had to reschedule to 2026.  Thank you to Andrew Staton for stepping into the gap and bringing us an update on CMMC. \n\n\n\nThis talk will provide a concise overview of the shifts to CyberSecurity requirements with regards to CMMC with the 48 CFR going into effect on November 10th.   It includs an overview/briefing of the CyberSecurity Risk Management Construct which was unveiled by the DoW/DoD and is intended to replacement RMF. 
URL:https://nac-issa.org/event/insight-assurance-sponsors-nac-issa-october-2025-lunch/
LOCATION:Auburn University Research and Innovation Campus\, 345 Voyager Way\, Huntsville\, AL\, 345 Voyager Way\, Huntsville\, United States
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20251028T173000
DTEND;TZID=America/Chicago:20251028T200000
DTSTAMP:20260403T145536
CREATED:20251027T130343Z
LAST-MODIFIED:20251027T134036Z
UID:10000053-1761672600-1761681600@nac-issa.org
SUMMARY:Beers for Engineers with Palo Alto Networks
DESCRIPTION:Join NAC-ISSA and Palo Alto Networks for an impromptu Beers for Engineers.   We will be at InnerSpace Brewing.  Beer and Pizza on Palo Alto\, networking on you!  Come meet Ramiro Pascual.  Register if you can but feel free to join us regardless.
URL:https://nac-issa.org/event/beers-for-engineers-with-palo-alto-networks/
LOCATION:InnerSpace Brewing\, 2414 Clinton Ave W\, Huntsville\, 35805-3014\, United States
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20251030T080000
DTEND;TZID=America/Chicago:20251030T160000
DTSTAMP:20260403T145536
CREATED:20251013T192504Z
LAST-MODIFIED:20251027T182118Z
UID:10000052-1761811200-1761840000@nac-issa.org
SUMMARY:SCADA STORM presented by CyberProtex
DESCRIPTION:CyberProtex regrets to announce the SCADA STORM Tabletop Exercise (TTX) originally scheduled for Thursday\, October 30th\, 2025 has been postponed indefinitely\, with the goal of rescheduling it for January. \n\n\n\nThis decision was made to ensure stronger participation\, particularly from our government partners. Given the ongoing government shutdown\, we believe postponing will allow for better coordination and higher overall attendance once normal operations resume. \n\n\n\nWe sincerely apologize for any inconvenience this change may cause and greatly appreciate your understanding and flexibility. We will share the new date and details as soon as they are confirmed. \n\n\n\nThank you for your continued interest and support of the SCADA STORM initiative. \n\n\n\nFor more from CyberProtex:  https://www.cyberprotex.com/
URL:https://nac-issa.org/event/scada-storm-presented-by-cyberprotex/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20251104T073000
DTEND;TZID=America/Chicago:20251104T180000
DTSTAMP:20260403T145536
CREATED:20250909T142200Z
LAST-MODIFIED:20250909T142203Z
UID:10000048-1762241400-1762279200@nac-issa.org
SUMMARY:Cyber Brews presents Cyber Hiring Event and Career Expo
DESCRIPTION:Cyber Brews invites you to the Cyber Hiring Event & Career Expo\, on Tuesday\, November 4\, 2025\, at the brand-new Trilogy Hotel in downtown Huntsville. This one-day experience brings together top cybersecurity employers\, job seekers\, and industry leaders for hiring\, networking\, and learning—all in one place. \n\n\n\nWhy attend\n\n\n\n\nMeet hiring companies actively recruiting cyber talent\n\n\n\nHear 4 expert talks on resumes\, certifications\, strategy\, and 2025 hiring trends\n\n\n\nNetwork with professionals across government\, defense\, and industry\n\n\n\nResume Drop & Hiring Digest keeps the conversation going after the event\n\n\n\n\nQuick agenda (Central Time)\n\n\n\n7:30–8:30 AM – Welcome & Registration (coffee + light breakfast) \n\n\n\n8:30 AM – Exhibit Hall Opens \n\n\n\n10:00–3:45 PM – Speaker Sessions (4 talks\, half-ballroom theater setup) \n\n\n\n4:30–6:00 PM – Networking Social (light appetizers) \n\n\n\nNOTE:  This is not a NAC-ISSA sponsored event
URL:https://nac-issa.org/event/cyber-brews-presents-cyber-hiring-event-and-career-expo/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20251106T173000
DTEND;TZID=America/Chicago:20251106T200000
DTSTAMP:20260403T145536
CREATED:20250915T162825Z
LAST-MODIFIED:20250915T163141Z
UID:10000049-1762450200-1762459200@nac-issa.org
SUMMARY:AFCEA Autumn Gala: Harvesting Innovation
DESCRIPTION:Celebrate fall with an evening of food\, music\, community\, and giving back. This annual fundraiser brings together professionals and community members to support local STEM scholarships and educational programs. Enjoy a silent auction\, DJ entertainment\, a dynamic speaker (to be announced) and the presentation of scholarship awards. \n\n\n\n**SPEAKER: COL Joseph Heyman\, CIO (G6) Deputy Director** \n\n\n\nNAC-ISSA members can use the AFCEA membership rate!
URL:https://nac-issa.org/event/afcea-autumn-gala-harvesting-innovation/
LOCATION:The Roundhouse\, Huntsville\, AL\, 320 Church Street\, Huntsville\, 35801\, United States
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20251118T113000
DTEND;TZID=America/Chicago:20251118T123000
DTSTAMP:20260403T145536
CREATED:20250730T165847Z
LAST-MODIFIED:20251117T024529Z
UID:10000040-1763465400-1763469000@nac-issa.org
SUMMARY:Cloudflare sponsors NAC-ISSA November 2025 lunch
DESCRIPTION:Join NAC-ISSA as Cloudflare sponsors our November 2025 Chapter lunch.  The event takes place at the Auburn Research and Innovation Center on Voyager Way in Research Park. \n\n\n\nAdam Shattuck will present “Identifying and preventing bad actors in the current cybersecurity landscape”. \n\n\n\nAt Cloudflare\, we have our eyes set on an ambitious goal — to help build a better Internet. We believe that with our talented team\, smart technology and engaged users we can solve some of the biggest problems on the Internet. Just how big?
URL:https://nac-issa.org/event/cloudflare-sponsors-nac-issa-november-2025-lunch/
LOCATION:Auburn University Research and Innovation Campus\, 345 Voyager Way\, Huntsville\, AL\, 345 Voyager Way\, Huntsville\, United States
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20251121T180000
DTEND;TZID=America/Chicago:20251121T200000
DTSTAMP:20260403T145536
CREATED:20251105T161115Z
LAST-MODIFIED:20251105T225954Z
UID:10000056-1763748000-1763755200@nac-issa.org
SUMMARY:DC256 presents Bluetooth Low Energy (BLE) Hacking Workshop with Matthew McDougal
DESCRIPTION:DC256 is proud to host Matthew McDougal AKA Doogie presenting BLUETOOTH LOW ENERGY HACKING WORKSHOP.   The event is being sponsored by the North Alabama Chapter of ISSA (NAC-ISSA). \n\n\n\nEver wonder how your fitness tracker\, smart bulb\, or IoT device talks to your phone? Ever want to see if you could hack into it? Join us for a fun\, beginner-friendly workshop on Bluetooth Low Energy (BLE). We’ll break down how BLE devices connect & communicate. You’ll learn to use free tools to interact with devices\, spot common security flaws\, and explore how hackers might exploit them. No experience needed\, just curiosity!  \n\n\n\nAfter the presentation\, test your skills in a CTF-style challenge where you’ll hack simulated BLE devices. Bring an Android or iOS device with the LightBlue app installed\, and we’ll provide the targets. By the end\, you’ll have a new perspective on how BLE works—and maybe even hack your first device! We will be providing hardware to hack on so just bring your phone and laptop! \n\n\n\nBe sure to join us at Gigaparts on Hwy72/University Drive. This is a free cyber community event with food provided. For more information\, find DC256 on Discord or visit dc256.org.
URL:https://nac-issa.org/event/dc256-presents-bluetooth-low-energy-ble-hacking-workshop-with-matthew-mcdougal/
LOCATION:Gigaparts\, Address 6123 University Drive\, Huntsville\, 35806\, United States
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20251209T180000
DTEND;TZID=America/Chicago:20251209T203000
DTSTAMP:20260403T145536
CREATED:20250730T170318Z
LAST-MODIFIED:20251208T182210Z
UID:10000041-1765303200-1765312200@nac-issa.org
SUMMARY:NAC-ISSA Christmas Party
DESCRIPTION:Members and a guest are invited to attend the annual NAC-ISSA Christmas Party.  Join us for an evening of networking\, good food and great door prizes!  This year\, we will be at the Electic Belle in the Stovehouse event center.
URL:https://nac-issa.org/event/nac-issa-christmas-party/
LOCATION:Stovehouse 3414 Governors Drive\, AL\, 3414 Governors Drive\, Huntsville\, 35805\, United States
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20251211T090000
DTEND;TZID=America/Chicago:20251211T170000
DTSTAMP:20260403T145536
CREATED:20251104T203451Z
LAST-MODIFIED:20251107T231448Z
UID:10000054-1765443600-1765472400@nac-issa.org
SUMMARY:CyberSecurity Day at UAH with Palo Alto Networks
DESCRIPTION:Due to goverment shutdown impacts\, this event has been rescheduled from November 13 to a new date of December 11. \n\n\n\nPalo Alto Networks is establishing an office on the campus of UAH in the I2C building. As a kickoff\, they are inviting all interested in cybersecurity to a cybersecurity day event on Nov 13. \n\n\n\nRegister to attend for an exclusive\, full-day event combining high-level thought leadership discussions with intensive\, practical hands-on workshops\, designed to equip your team with the skills and strategies needed to defend against modern threats in an evolving digital landscape.In today’s cybersecurity landscape\, organizations face accelerating digital transformation and growing risks from sophisticated cyberattacks. This meeting provides the critical guidance and practical experience needed to proactively secure your networks and applications\, moving beyond legacy models to embrace a machine-led\, human-empowered defense platform. \n\n\n\nFor maximum\, role-specific value across your entire team\, the day is split into three areas of engagement opportunities: \n\n\n\n\nStrategic Thought Leadership | These are high level briefs to drive thought leadership discussions among C-Level executives and security leaders\, focusing on proactive measures and emerging security requirements.\n\n\n\nHands-On Workshops for Technical Mastery | Gain firsthand\, interactive experience with solutions in a live\, instructor-led lab environment. These concurrent Ultimate Test Drives (UTDs) are ideal for security analysts\, incident responders\, and SecOps staff.\n\n\n\nSpend the Day with Experts | Engage directly with experts in an open format environment to discuss your specific security challenges and explore new ideas.\n\n\n\n\nUltimate Test Drive Course Descriptions: \n\n\n\n\nCortex Security Operations | In this section\, we’ll showcase how our endpoint solutions and automation frameworks allow you to start your zero trust journey with knowledge of the device status and do so with fewer analysts.\n\n\n\nCloud-Delivered Security Services |  A deep dive into our firewalls to show the subscriptions needed for STIG requirements. We’ll also bring in an identity service like Active Directory to enrich all of your data with the User-ID.\n\n\n\nNext-Generation Firewall | This will cover how we enable Post Quantum Resistant cyphers today for all of your IPSEC tunnels on the firewall.\n\n\n\nCybersecurity Portfolio | Browsers are where 99% of our work is done today and we will show our browser with built in security equal to having a VPN and completely isolated browsing.\n\n\n\n\nBe sure to register now to secure a spot.  \n\n\n\nNOTE:  This event is not sponsored by NAC-ISSA.  Registration is via the sponsor’s registration link below.
URL:https://nac-issa.org/event/cybersecurity-day-at-uah-with-palo-alto-networks/
LOCATION:UAH Invention to Innovation Center (I2C)\, 850 Ben Graves Drive Northwest\, Huntsville\, 35816\, United States
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20260115T180000
DTEND;TZID=America/Chicago:20260115T200000
DTSTAMP:20260403T145536
CREATED:20251216T163658Z
LAST-MODIFIED:20260112T002437Z
UID:10000057-1768500000-1768507200@nac-issa.org
SUMMARY:Tech Thursday  Inside the Shark Tank
DESCRIPTION:DC256 and NAC-ISSA kick off our first “Tech Thursday” hands on workshop with “Inside the Shark Tank”.  See inside of network traffic with the Wireshark network protocol analyzer. Pick apart packets piece by piece as we analyze networking traffic to tell a story of how different network devices talk between one another. Covering tips and tricks to quickly identify and troubleshoot networking issues\, Attendees will learn how to capture and perform basic analysis on network traffic. \n\n\n\nAttendees will learn how to capture and perform basic analysis on network traffic. Attendees should already understand networking basics\, such as the OSI model\, IP addresses\, MAC addresses\, the client and server relationship\,the differences between TCP and UDP\, and the concept of port numbers.  DC256 posted a link for the event\, which includes the download for Wireshark and PCAPs that we’ll be covering: https://dc256.org/tt/wireshark.  The event supports anything on Windows\, Mac\, and Linux\, although Windows is preferred.   \n\n\n\nDC256 requests attendees download the files in advance so that we can get everything rolling quickly.   \n\n\n\nOur instructor goes by the name Oyster.  Oyster has been working as a cybersecurity professional for over a decade. His first love of computers started with networking fifteen years ago\, and hasn’t slowed down since. Over the years\, Oyster has held three Cisco Certified Networking Associate (CCNA)-level certifications. Oyster enjoys hacking on various objects in his spare time. His favorite shark is a hammerhead.
URL:https://nac-issa.org/event/tech-thursday-inside-the-shark-tank/
LOCATION:Gigaparts\, Address 6123 University Drive\, Huntsville\, 35806\, United States
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20260116T180000
DTEND;TZID=America/Chicago:20260116T200000
DTSTAMP:20260403T145536
CREATED:20251229T194814Z
LAST-MODIFIED:20251229T194815Z
UID:10000059-1768586400-1768593600@nac-issa.org
SUMMARY:Ignition Under Fire: Exploring Cybersecurity Attack Vectors in Rocket Propulsion
DESCRIPTION:The increasing reliance on digital systems in modern rocketry\, from design and manufacturing to launch operations and in-flight control\, introduces significant cybersecurity vulnerabilities. Presentation\, “Ignition Under Fire\,” by Paul Coggin\, explores the diverse attack vectors targeting rocket propulsion systems\, examining potential consequences ranging from mission delays and data breaches to catastrophic failures. We will analyze the complex interplay of software\, hardware\, and network components within propulsion systems\, identifying key weaknesses susceptible to exploitation. The presentation will delve into specific attack scenarios\, software manipulation\, sensor spoofing\, and network intrusion\, highlighting the potential impact on critical rocket equation parameters like delta V\, thrust\, fuel flow\, and combustion stability. Furthermore\, we will discuss the unique challenges in securing these complex systems. We will explore how a Zero Trust architecture can be implemented to enhance security by enforcing strict access control\, micro-segmentation\, and continuous authentication and authorization throughout the propulsion system. \n\n\n\nNote:  This is a DC256 event and registration or details handled through their website and on discord.
URL:https://nac-issa.org/event/ignition-under-fire-exploring-cybersecurity-attack-vectors-in-rocket-propulsion/
LOCATION:Gigaparts\, Address 6123 University Drive\, Huntsville\, 35806\, United States
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20260127T113000
DTEND;TZID=America/Chicago:20260127T123000
DTSTAMP:20260403T145536
CREATED:20251218T213943Z
LAST-MODIFIED:20260126T171833Z
UID:10000058-1769513400-1769517000@nac-issa.org
SUMMARY:Insight Assurance sponsors NAC-ISSA Jan 2026 chapter lunch
DESCRIPTION:Join us for the first NAC-ISSA chapter lunch as Insight Assurance comes to discuss some of the common pitfalls and issues that they have observed in dealing with clients on their CMMC journey.   The “view from the trenches” is to be an engaging discussion that isn’t just a rehash of generic CMMC information. Attendees will walk away with some lessons learned that they can put into practice as they achieve certification for themselves.  \n\n\n\nInsight Assurance helps take the Complexity Out of Compliance.  Regulatory requirements are evolving. Cyber threats are increasing.  Insight Assurance helps you stay compliant\, secure\, and audit-ready — without the headaches. \n\n\n\nNote the lunch is not on our usual third Tuesday due to holidays but will be held Tuesday\, January 27. The venue is the Auburn Research and Innovation Center in Research Park and catering is by Rosies.  This month’s door prize will be noise cancelling BOSE QuietComfort SC headphones. \n\n\n\nRegister today to get this on your calendar so you won’t miss the kickoff lunch for 2026.
URL:https://nac-issa.org/event/insight-assurance-sponsors-nac-issa-jan-2026-chapter-lunch/
LOCATION:Auburn University Research and Innovation Campus\, 345 Voyager Way\, Huntsville\, AL\, 345 Voyager Way\, Huntsville\, United States
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20260213T083000
DTEND;TZID=America/Chicago:20260213T123000
DTSTAMP:20260403T145536
CREATED:20260205T232204Z
LAST-MODIFIED:20260205T232205Z
UID:10000064-1770971400-1770985800@nac-issa.org
SUMMARY:Cyber Tabletop Exercise Training by Cyber Brews
DESCRIPTION:Cybersecurity Tabletop Exercise (TTX) Design & Facilitation Workshop \n\n\n\nThis in-person tabletop exercise (TTX) training workshop is designed for professionals who want to do more than participate in tabletop exercises—they want to run their own. \n\n\n\nParticipants will experience a facilitated cyber incident tabletop while also learning how to design\, conduct\, and document tabletop exercises that support incident response readiness and CMMC Level 1 and Level 2 assessment objectives. \n\n\n\nThis workshop blends hands-on participation with practical instruction\, giving attendees the tools and confidence to take tabletop exercises back to their own organizations. \n\n\n\nWhat You’ll Learn\n\n\n\nParticipants will learn how to: \n\n\n\n\nDesign tabletop exercises aligned to organizational size\, mission\, and risk\n\n\n\nBuild realistic scenarios and injects that drive meaningful discussion\n\n\n\nFacilitate tabletop exercises across technical and non-technical roles\n\n\n\nCapture decisions\, assumptions\, and gaps during an exercise\n\n\n\nConduct effective hot washes and after-action discussions\n\n\n\nUse tabletop exercises to support CMMC Level 1 and Level 2 practices\, including incident response and operational readiness\n\n\n\n\nYou’ll see how a tabletop unfolds in real time\, then break down why it was structured that way and how to replicate it. \n\n\n\nWhat You’ll Experience\n\n\n\n\nA guided\, facilitator-led cyber incident scenario\n\n\n\nSmall-group participation with progressive injects\n\n\n\nReal-time discussion and decision-making\n\n\n\nInstructor walkthroughs of scenario design and facilitation techniques\n\n\n\nPractical guidance on documentation and lessons learned\n\n\n\nTemplates and approaches you can reuse for your own exercises\n\n\n\n\nThis is not a lecture-only workshop. Active participation is encouraged\, but no prior tabletop experience is required. \n\n\n\nNOTE:  This is not a NAC-ISSA event.  Registration is handled through the Cyber Brews registration page.
URL:https://nac-issa.org/event/cyber-tabletop-exercise-training-by-cyber-brews/
LOCATION:Five Stones Research Corporation\, 401 Wynn Dr NW\, Huntsville\, 35805\, United States
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20260217T113000
DTEND;TZID=America/Chicago:20260217T123000
DTSTAMP:20260403T145536
CREATED:20260130T135238Z
LAST-MODIFIED:20260206T001548Z
UID:10000062-1771327800-1771331400@nac-issa.org
SUMMARY:Securing the Connected Transit Ecosystem: Why Next-Generation Systems Demand Next-Generation Testing
DESCRIPTION:The NAC-ISSA February 2026 lunch will be chapter sponsored.  We are proud to present our chapter member and former chapter president\, Jason Cuneo.  Jason has worked with large municipalities in the US to secure their mass transit systems.  Join us for a look into a different segment of cybersecurity than you may typically think about. \n\n\n\nMass transit systems are rapidly adopting interconnected vehicle\, infrastructure\, and control technologies to improve safety\, efficiency\, and situational awareness. While these advances enable powerful new operational capabilities\, they also introduce attack surfaces that traditional security testing approaches were never designed to evaluate. This presentation reviews prior research and recent security test events conducted on mass transit platforms\, highlighting how enterprise-centric vulnerability assessment methodologies fall short in highly dynamic\, V2X-enabled environments.  \n\n\n\nAdditionally\, we will discuss new testing methods including realistic traffic generation scenarios\, protocol-aware threat emulation\, and understand how attackers conduct modern vehicular platform attacks. This talk will conclude with recommendations for developing a more robust\, reconfigurable testing environment that can keep pace with next-generation transit technologies. \n\n\n\nWalton’s Southern Table will provide the catering.  Door prize to be announced.
URL:https://nac-issa.org/event/securing-the-connected-transit-ecosystem-why-next-generation-systems-demand-next-generation-testing/
LOCATION:Auburn University Research and Innovation Campus\, 345 Voyager Way\, Huntsville\, AL\, 345 Voyager Way\, Huntsville\, United States
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20260219T180000
DTEND;TZID=America/Chicago:20260219T200000
DTSTAMP:20260403T145536
CREATED:20260126T202950Z
LAST-MODIFIED:20260126T202951Z
UID:10000060-1771524000-1771531200@nac-issa.org
SUMMARY:Tech Thursday: Making Your Own Wireshark Dissector for Mysterious and Unknown Protocols
DESCRIPTION:Presenter: Doogie \n\n\n\nNAC-ISSA and DC256 present our second Tech Thursday of 2026 at Gigaparts on Feb 19 at 6:00PM.   This hands-on workshop moves beyond filtering and display into the craft of understanding undocumented protocols and using that knowledge to create a reusable Wireshark dissector. \n\n\n\nAttendees will walk away with their own network protocol dissector that can be used in any Wireshark instance. \n\n\n\nAttendees should already understand networking basics\, such as the OSI model\, IP addresses\, MAC addresses\, the differences between TCP and UDP\, and the concept of port numbers. Familiarity with Wireshark is recommended. \n\n\n\nThe event is open to anyone interested in cyber security\, is free and pizza will be provided.
URL:https://nac-issa.org/event/tech-thursday-making-your-own-wireshark-dissector-for-mysterious-and-unknown-protocols/
LOCATION:Gigaparts\, Address 6123 University Drive\, Huntsville\, 35806\, United States
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20260220T180000
DTEND;TZID=America/Chicago:20260220T200000
DTSTAMP:20260403T145536
CREATED:20260213T184109Z
LAST-MODIFIED:20260213T184110Z
UID:10000066-1771610400-1771617600@nac-issa.org
SUMMARY:DC256 Presents: Artificial Doubt: The Collapse of Trust in Digital Materiel
DESCRIPTION:Join DC256 at GigaParts on February 20th @ 6:00PM! Rodney V. will be giving a presentation — Digital Trust: The Collapse of Trust in Digital Materiel. We will also be making a special announcement at the event\, so stay tuned! \n\n\n\nFor decades\, digital evidence has quietly relied on a fragile assumption that authenticity could be inferred after the fact. Hashes\, metadata\, chain-of-custody forms\, and expert testimony were “good enough” when fabricating convincing images\, video\, or audio was expensive and rare. Generative AI shattered that assumption and we need better means of security against threats that exploit this ambiguity. \n\n\n\nThis month’s presentation is sponsored by the North Alabama Chapter – Information Systems Security Association (NAC-ISSA).  The event is free to attend\, registration not required.
URL:https://nac-issa.org/event/dc256-presents-artificial-doubt-the-collapse-of-trust-in-digital-materiel/
LOCATION:GigaParts\, 6123 University Dr NW\, Huntsville\, 35806\, United States
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20260226T080000
DTEND;TZID=America/Chicago:20260226T093000
DTSTAMP:20260403T145536
CREATED:20260205T230951Z
LAST-MODIFIED:20260205T230952Z
UID:10000063-1772092800-1772098200@nac-issa.org
SUMMARY:CMMC Coffee & Compliance Series Presented by CyberProtex
DESCRIPTION:Join us for coffee and discussions on practical automation strategies to simplify CMMC readiness. You’re not alone. Thousands of SMBs in the DIB face the same challenge. \n\n\n\n \n\n\n\nMeeting CMMC requirements doesn’t have to mean overbuilding your security program or blowing your budget. CMMC Without the Chaos is a practical\, executive-friendly session designed specifically for small and mid-sized contractors looking to use automation to simplify compliance.In this Coffee & Compliance event\, we’ll break down what automation realistically means for CMMC\, where it delivers the most value\, and where manual processes are still required. Attendees will learn how to reduce time spent on documentation and evidence collection\, avoid common overengineering mistakes\, and better leverage Microsoft tools they may already own. \n\n\n\nThis session focuses on doing enough—without doing too much—so organizations can stay contract-eligible while remaining efficient and audit-ready. \n\n\n\nYou’ll walk away with: \n\n\n\n\nA realistic understanding of automation’s role in CMMC compliance\n\n\n\nPractical ways to automate evidence collection and compliance tasks\n\n\n\nGuidance on leveraging Microsoft 365 and Azure security capabilities\n\n\n\nInsight into common automation pitfalls seen by assessors\n\n\n\nA clear roadmap for simplifying CMMC readiness without chaos\n\n\n\n\nWho Should Attend:Small and mid-sized defense contractors\, subcontractors\, IT leaders\, security managers\, compliance owners\, and business leaders responsible for CMMC readiness. \n\n\n\nNOTE:  This is not a NAC-ISSA event.  Registration is through CyberProtex.
URL:https://nac-issa.org/event/cmmc-coffee-compliance-series-presented-by-cyberprotex/
LOCATION:UAH Invention to Innovation Center (I2C)\, 850 Ben Graves Drive Northwest\, Huntsville\, 35816\, United States
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20260226T173000
DTEND;TZID=America/Chicago:20260226T200000
DTSTAMP:20260403T145536
CREATED:20260216T200004Z
LAST-MODIFIED:20260216T200006Z
UID:10000067-1772127000-1772136000@nac-issa.org
SUMMARY:Beers for Engineers with NAC-ISSA
DESCRIPTION:It has been far too long since we gathered to network over a fine craft beer and wood fired oven pizza!  Members and friends of the North Alabama Chapter of ISSA are invited to join us at InnerSpace Brewing on Thursday\, February 26.  Membership not required!   \n\n\n\nThis event is sponsored by NAC-ISSA.  Registration not required but appreciated to help plan for the attendance.
URL:https://nac-issa.org/event/beers-for-engineers-with-nac-issa-2/
LOCATION:InnerSpace Brewing\, 2414 Clinton Ave W\, Huntsville\, 35805-3014\, United States
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20260317T113000
DTEND;TZID=America/Chicago:20260317T123000
DTSTAMP:20260403T145536
CREATED:20260305T225638Z
LAST-MODIFIED:20260314T133045Z
UID:10000069-1773747000-1773750600@nac-issa.org
SUMMARY:Automating Exploitation with Agentic Systems presented by Jason Kearns.  NAC-ISSA's March chapter lunch
DESCRIPTION:Abstract: This session explores the emerging role of agentic AI in modern offensive cybersecurity operations. Through a guided presentation and discussion\, we will examine how AI-driven agents can be used to automate elements of reconnaissance\, web enumeration\, and vulnerability discovery within red team workflows. \n\n\n\n\nAgentic AI for reconnaissance and vulnerability discovery: How autonomous agents can assist in identifying attack surface\, enumerating web assets\, and surfacing potential vulnerabilities.\n\n\n\nCollaborative agent architectures: Designing systems where multiple specialized agents coordinate tasks to augment traditional security testing approaches.\n\n\n\nOperational implications for red teams and defenders: How AI-enabled automation is changing the pace\, scale\, and accessibility of offensive security capabilities.\n\n\n\n\nAttendees will leave with a practical understanding of how agentic AI systems can be structured\, the opportunities and risks they introduce\, and how these technologies may reshape both offensive and defensive cyber operations.
URL:https://nac-issa.org/event/automating-exploitation-with-agentic-systems-presented-by-jason-kearns-nac-issas-march-chapter-lunch/
LOCATION:Auburn University Research and Innovation Campus\, 345 Voyager Way\, Huntsville\, AL\, 345 Voyager Way\, Huntsville\, United States
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20260319T180000
DTEND;TZID=America/Chicago:20260319T200000
DTSTAMP:20260403T145536
CREATED:20260126T204033Z
LAST-MODIFIED:20260128T211838Z
UID:10000061-1773943200-1773950400@nac-issa.org
SUMMARY:Tech Thursday presents Shell Sorcery: The Magic of the Linux Command Line
DESCRIPTION:NAC-ISSA and DC256 continue the Tech Thursday series with Shell Sorcery: The Magic of the Linux Command Line. \n\n\n\nLinux isn’t as scary as it seems! This crash course uses gamification to introduce you to the command line. Instead of rote memorization\, you will solve logic puzzles to master the three pillars of daily Linux work: secure access\, file navigation\, and data extraction.  \n\n\n\nThere is no pre-requisite knowledge for attendees\, but an open and curious mind is encouraged! \n\n\n\nParticipants will need to have an SSH client installed before class begins. We recommend PuTTY: https://www.chiark.greenend.org.uk/~sgtatham/putty/ 
URL:https://nac-issa.org/event/tech-thursday-presents-shell-sorcery-the-magic-of-the-linux-command-line/
LOCATION:Gigaparts\, Address 6123 University Drive\, Huntsville\, 35806\, United States
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20260326T173000
DTEND;TZID=America/Chicago:20260326T193000
DTSTAMP:20260403T145536
CREATED:20260305T203251Z
LAST-MODIFIED:20260305T203252Z
UID:10000068-1774546200-1774553400@nac-issa.org
SUMMARY:Beers for Engineers with NAC-ISSA
DESCRIPTION:As of Sunday\, March 8\, Daylight Saving Time returns and the days get longer.   Come celebrate the longer\, warmer days with NAC-ISSA and the North Alabama cybersecurity community at InnerSpace Brewing.  Beers and Pizza on NAC-ISSA; networking on YOU!
URL:https://nac-issa.org/event/beers-for-engineers-with-nac-issa-3/
LOCATION:InnerSpace Brewing\, 2414 Clinton Ave W\, Huntsville\, 35805-3014\, United States
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20260415T080000
DTEND;TZID=America/Chicago:20260416T170000
DTSTAMP:20260403T145536
CREATED:20260206T001454Z
LAST-MODIFIED:20260206T001456Z
UID:10000065-1776240000-1776358800@nac-issa.org
SUMMARY:Southeast Cybersecurity Summit
DESCRIPTION:The Central Alabama Information Systems Security Association (CA-ISSA)\, InfraGard Birmingham Member Alliance (IBMA) and TechBirmingham are jointly hosting a cybersecurity conference in April and invite anyone interested to attend.  BSides Huntsville will return in 2027 so NAC-ISSA.  Chapter members and guests are encouraged to fill their 2026 need for content this spring with the Southeast Cybersecurity Summit. \n\n\n\nAbout the Summit\n\n\n\nThe purpose of the Summit is to strengthen and promote the internet security profession in the southeastern United States region. That goal is achieved through event activities which result in relationship building\, information sharing\, and ongoing education and training focused on current technology challenges and solutions.The Summit will highlight the strength\, diversity and economic impact of the technology companies and talent working and living in the southeast. \n\n\n\nNOTE:  This is not a NAC-ISSA event.  Registration is handled via the event website.
URL:https://nac-issa.org/event/southeast-cybersecurity-summit/
LOCATION:Birmingham Jefferson Convention Center\, 2100 Richard Arrington Jr Blvd N\, Birmingham\, 35203\, United States
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20260421T113000
DTEND;TZID=America/Chicago:20260421T123000
DTSTAMP:20260403T145536
CREATED:20260401T162023Z
LAST-MODIFIED:20260401T162117Z
UID:10000071-1776771000-1776774600@nac-issa.org
SUMMARY:Chapter lunch with Jason Cuneo and Digital Forensics
DESCRIPTION:Join NAC-ISSA for our April chapter lunch with Jason Cuneo.  Jason will present on Digital Forensics.  Catering and door prize to be announced.
URL:https://nac-issa.org/event/chapter-lunch-with-jason-cuneo-and-digital-forensics/
LOCATION:Auburn University Research and Innovation Campus\, 345 Voyager Way\, Huntsville\, AL\, 345 Voyager Way\, Huntsville\, United States
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20260423T163000
DTEND;TZID=America/Chicago:20260423T193000
DTSTAMP:20260403T145536
CREATED:20260325T221327Z
LAST-MODIFIED:20260325T221328Z
UID:10000070-1776961800-1776972600@nac-issa.org
SUMMARY:Beers for Engineers with Women in Defense
DESCRIPTION:Join the North Alabama Chapter of ISSA and the Tennessee Valley Chapter of Women in Defense as we co-host Beers for Engineers in April.  Both organizations seek to grow the cyber community throughout North Alabama.  We’ll run this event from 4:30 to 7:30 at InnerSpace Brewing.  Come join us to meet new friends and help make our cybersecurity community even stronger!
URL:https://nac-issa.org/event/beers-for-engineers-with-women-in-defense/
LOCATION:InnerSpace Brewing\, 2414 Clinton Ave W\, Huntsville\, 35805-3014\, United States
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20260519T113000
DTEND;TZID=America/Chicago:20260519T123000
DTSTAMP:20260403T145536
CREATED:20251104T222317Z
LAST-MODIFIED:20260219T195309Z
UID:10000055-1779190200-1779193800@nac-issa.org
SUMMARY:WallArm sponsors May 2026 NAC-ISSA lunch
DESCRIPTION:TOPIC: Business Logic Abuse: Technology Agnostic Mapping of Attack Types \n\n\n\nOWASP’s technology specific top 10 lists have provided a ton of value\, but it’s time for a different approach to business logic abuse. The rise of APIs and complex business logic attacks requires a new taxonomy that isn’t tied to a specific technology.
URL:https://nac-issa.org/event/wallarm-sponsors-april-2026-nac-issa-lunch-april-2026/
LOCATION:Auburn University Research and Innovation Campus\, 345 Voyager Way\, Huntsville\, AL\, 345 Voyager Way\, Huntsville\, United States
END:VEVENT
END:VCALENDAR