BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//NACISSA - ECPv6.15.18//NONSGML v1.0//EN
CALSCALE:GREGORIAN
METHOD:PUBLISH
X-WR-CALNAME:NACISSA
X-ORIGINAL-URL:https://nac-issa.org
X-WR-CALDESC:Events for NACISSA
REFRESH-INTERVAL;VALUE=DURATION:PT1H
X-Robots-Tag:noindex
X-PUBLISHED-TTL:PT1H
BEGIN:VTIMEZONE
TZID:America/Chicago
BEGIN:DAYLIGHT
TZOFFSETFROM:-0600
TZOFFSETTO:-0500
TZNAME:CDT
DTSTART:20250309T080000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0500
TZOFFSETTO:-0600
TZNAME:CST
DTSTART:20251102T070000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0600
TZOFFSETTO:-0500
TZNAME:CDT
DTSTART:20260308T080000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0500
TZOFFSETTO:-0600
TZNAME:CST
DTSTART:20261101T070000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0600
TZOFFSETTO:-0500
TZNAME:CDT
DTSTART:20270314T080000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0500
TZOFFSETTO:-0600
TZNAME:CST
DTSTART:20271107T070000
END:STANDARD
END:VTIMEZONE
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20260226T080000
DTEND;TZID=America/Chicago:20260226T093000
DTSTAMP:20260403T175518
CREATED:20260205T230951Z
LAST-MODIFIED:20260205T230952Z
UID:10000063-1772092800-1772098200@nac-issa.org
SUMMARY:CMMC Coffee & Compliance Series Presented by CyberProtex
DESCRIPTION:Join us for coffee and discussions on practical automation strategies to simplify CMMC readiness. You’re not alone. Thousands of SMBs in the DIB face the same challenge. \n\n\n\n \n\n\n\nMeeting CMMC requirements doesn’t have to mean overbuilding your security program or blowing your budget. CMMC Without the Chaos is a practical\, executive-friendly session designed specifically for small and mid-sized contractors looking to use automation to simplify compliance.In this Coffee & Compliance event\, we’ll break down what automation realistically means for CMMC\, where it delivers the most value\, and where manual processes are still required. Attendees will learn how to reduce time spent on documentation and evidence collection\, avoid common overengineering mistakes\, and better leverage Microsoft tools they may already own. \n\n\n\nThis session focuses on doing enough—without doing too much—so organizations can stay contract-eligible while remaining efficient and audit-ready. \n\n\n\nYou’ll walk away with: \n\n\n\n\nA realistic understanding of automation’s role in CMMC compliance\n\n\n\nPractical ways to automate evidence collection and compliance tasks\n\n\n\nGuidance on leveraging Microsoft 365 and Azure security capabilities\n\n\n\nInsight into common automation pitfalls seen by assessors\n\n\n\nA clear roadmap for simplifying CMMC readiness without chaos\n\n\n\n\nWho Should Attend:Small and mid-sized defense contractors\, subcontractors\, IT leaders\, security managers\, compliance owners\, and business leaders responsible for CMMC readiness. \n\n\n\nNOTE:  This is not a NAC-ISSA event.  Registration is through CyberProtex.
URL:https://nac-issa.org/event/cmmc-coffee-compliance-series-presented-by-cyberprotex/
LOCATION:UAH Invention to Innovation Center (I2C)\, 850 Ben Graves Drive Northwest\, Huntsville\, 35816\, United States
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20260226T173000
DTEND;TZID=America/Chicago:20260226T200000
DTSTAMP:20260403T175518
CREATED:20260216T200004Z
LAST-MODIFIED:20260216T200006Z
UID:10000067-1772127000-1772136000@nac-issa.org
SUMMARY:Beers for Engineers with NAC-ISSA
DESCRIPTION:It has been far too long since we gathered to network over a fine craft beer and wood fired oven pizza!  Members and friends of the North Alabama Chapter of ISSA are invited to join us at InnerSpace Brewing on Thursday\, February 26.  Membership not required!   \n\n\n\nThis event is sponsored by NAC-ISSA.  Registration not required but appreciated to help plan for the attendance.
URL:https://nac-issa.org/event/beers-for-engineers-with-nac-issa-2/
LOCATION:InnerSpace Brewing\, 2414 Clinton Ave W\, Huntsville\, 35805-3014\, United States
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20260317T113000
DTEND;TZID=America/Chicago:20260317T123000
DTSTAMP:20260403T175518
CREATED:20260305T225638Z
LAST-MODIFIED:20260314T133045Z
UID:10000069-1773747000-1773750600@nac-issa.org
SUMMARY:Automating Exploitation with Agentic Systems presented by Jason Kearns.  NAC-ISSA's March chapter lunch
DESCRIPTION:Abstract: This session explores the emerging role of agentic AI in modern offensive cybersecurity operations. Through a guided presentation and discussion\, we will examine how AI-driven agents can be used to automate elements of reconnaissance\, web enumeration\, and vulnerability discovery within red team workflows. \n\n\n\n\nAgentic AI for reconnaissance and vulnerability discovery: How autonomous agents can assist in identifying attack surface\, enumerating web assets\, and surfacing potential vulnerabilities.\n\n\n\nCollaborative agent architectures: Designing systems where multiple specialized agents coordinate tasks to augment traditional security testing approaches.\n\n\n\nOperational implications for red teams and defenders: How AI-enabled automation is changing the pace\, scale\, and accessibility of offensive security capabilities.\n\n\n\n\nAttendees will leave with a practical understanding of how agentic AI systems can be structured\, the opportunities and risks they introduce\, and how these technologies may reshape both offensive and defensive cyber operations.
URL:https://nac-issa.org/event/automating-exploitation-with-agentic-systems-presented-by-jason-kearns-nac-issas-march-chapter-lunch/
LOCATION:Auburn University Research and Innovation Campus\, 345 Voyager Way\, Huntsville\, AL\, 345 Voyager Way\, Huntsville\, United States
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20260319T180000
DTEND;TZID=America/Chicago:20260319T200000
DTSTAMP:20260403T175518
CREATED:20260126T204033Z
LAST-MODIFIED:20260128T211838Z
UID:10000061-1773943200-1773950400@nac-issa.org
SUMMARY:Tech Thursday presents Shell Sorcery: The Magic of the Linux Command Line
DESCRIPTION:NAC-ISSA and DC256 continue the Tech Thursday series with Shell Sorcery: The Magic of the Linux Command Line. \n\n\n\nLinux isn’t as scary as it seems! This crash course uses gamification to introduce you to the command line. Instead of rote memorization\, you will solve logic puzzles to master the three pillars of daily Linux work: secure access\, file navigation\, and data extraction.  \n\n\n\nThere is no pre-requisite knowledge for attendees\, but an open and curious mind is encouraged! \n\n\n\nParticipants will need to have an SSH client installed before class begins. We recommend PuTTY: https://www.chiark.greenend.org.uk/~sgtatham/putty/ 
URL:https://nac-issa.org/event/tech-thursday-presents-shell-sorcery-the-magic-of-the-linux-command-line/
LOCATION:Gigaparts\, Address 6123 University Drive\, Huntsville\, 35806\, United States
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20260326T173000
DTEND;TZID=America/Chicago:20260326T193000
DTSTAMP:20260403T175518
CREATED:20260305T203251Z
LAST-MODIFIED:20260305T203252Z
UID:10000068-1774546200-1774553400@nac-issa.org
SUMMARY:Beers for Engineers with NAC-ISSA
DESCRIPTION:As of Sunday\, March 8\, Daylight Saving Time returns and the days get longer.   Come celebrate the longer\, warmer days with NAC-ISSA and the North Alabama cybersecurity community at InnerSpace Brewing.  Beers and Pizza on NAC-ISSA; networking on YOU!
URL:https://nac-issa.org/event/beers-for-engineers-with-nac-issa-3/
LOCATION:InnerSpace Brewing\, 2414 Clinton Ave W\, Huntsville\, 35805-3014\, United States
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20260415T080000
DTEND;TZID=America/Chicago:20260416T170000
DTSTAMP:20260403T175518
CREATED:20260206T001454Z
LAST-MODIFIED:20260206T001456Z
UID:10000065-1776240000-1776358800@nac-issa.org
SUMMARY:Southeast Cybersecurity Summit
DESCRIPTION:The Central Alabama Information Systems Security Association (CA-ISSA)\, InfraGard Birmingham Member Alliance (IBMA) and TechBirmingham are jointly hosting a cybersecurity conference in April and invite anyone interested to attend.  BSides Huntsville will return in 2027 so NAC-ISSA.  Chapter members and guests are encouraged to fill their 2026 need for content this spring with the Southeast Cybersecurity Summit. \n\n\n\nAbout the Summit\n\n\n\nThe purpose of the Summit is to strengthen and promote the internet security profession in the southeastern United States region. That goal is achieved through event activities which result in relationship building\, information sharing\, and ongoing education and training focused on current technology challenges and solutions.The Summit will highlight the strength\, diversity and economic impact of the technology companies and talent working and living in the southeast. \n\n\n\nNOTE:  This is not a NAC-ISSA event.  Registration is handled via the event website.
URL:https://nac-issa.org/event/southeast-cybersecurity-summit/
LOCATION:Birmingham Jefferson Convention Center\, 2100 Richard Arrington Jr Blvd N\, Birmingham\, 35203\, United States
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20260421T113000
DTEND;TZID=America/Chicago:20260421T123000
DTSTAMP:20260403T175518
CREATED:20260401T162023Z
LAST-MODIFIED:20260401T162117Z
UID:10000071-1776771000-1776774600@nac-issa.org
SUMMARY:Chapter lunch with Jason Cuneo and Digital Forensics
DESCRIPTION:Join NAC-ISSA for our April chapter lunch with Jason Cuneo.  Jason will present on Digital Forensics.  Catering and door prize to be announced.
URL:https://nac-issa.org/event/chapter-lunch-with-jason-cuneo-and-digital-forensics/
LOCATION:Auburn University Research and Innovation Campus\, 345 Voyager Way\, Huntsville\, AL\, 345 Voyager Way\, Huntsville\, United States
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20260423T163000
DTEND;TZID=America/Chicago:20260423T193000
DTSTAMP:20260403T175518
CREATED:20260325T221327Z
LAST-MODIFIED:20260325T221328Z
UID:10000070-1776961800-1776972600@nac-issa.org
SUMMARY:Beers for Engineers with Women in Defense
DESCRIPTION:Join the North Alabama Chapter of ISSA and the Tennessee Valley Chapter of Women in Defense as we co-host Beers for Engineers in April.  Both organizations seek to grow the cyber community throughout North Alabama.  We’ll run this event from 4:30 to 7:30 at InnerSpace Brewing.  Come join us to meet new friends and help make our cybersecurity community even stronger!
URL:https://nac-issa.org/event/beers-for-engineers-with-women-in-defense/
LOCATION:InnerSpace Brewing\, 2414 Clinton Ave W\, Huntsville\, 35805-3014\, United States
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20260519T113000
DTEND;TZID=America/Chicago:20260519T123000
DTSTAMP:20260403T175518
CREATED:20251104T222317Z
LAST-MODIFIED:20260219T195309Z
UID:10000055-1779190200-1779193800@nac-issa.org
SUMMARY:WallArm sponsors May 2026 NAC-ISSA lunch
DESCRIPTION:TOPIC: Business Logic Abuse: Technology Agnostic Mapping of Attack Types \n\n\n\nOWASP’s technology specific top 10 lists have provided a ton of value\, but it’s time for a different approach to business logic abuse. The rise of APIs and complex business logic attacks requires a new taxonomy that isn’t tied to a specific technology.
URL:https://nac-issa.org/event/wallarm-sponsors-april-2026-nac-issa-lunch-april-2026/
LOCATION:Auburn University Research and Innovation Campus\, 345 Voyager Way\, Huntsville\, AL\, 345 Voyager Way\, Huntsville\, United States
END:VEVENT
END:VCALENDAR