BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//NACISSA - ECPv6.15.18//NONSGML v1.0//EN
CALSCALE:GREGORIAN
METHOD:PUBLISH
X-ORIGINAL-URL:https://nac-issa.org
X-WR-CALDESC:Events for NACISSA
REFRESH-INTERVAL;VALUE=DURATION:PT1H
X-Robots-Tag:noindex
X-PUBLISHED-TTL:PT1H
BEGIN:VTIMEZONE
TZID:America/Chicago
BEGIN:DAYLIGHT
TZOFFSETFROM:-0600
TZOFFSETTO:-0500
TZNAME:CDT
DTSTART:20250309T080000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0500
TZOFFSETTO:-0600
TZNAME:CST
DTSTART:20251102T070000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0600
TZOFFSETTO:-0500
TZNAME:CDT
DTSTART:20260308T080000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0500
TZOFFSETTO:-0600
TZNAME:CST
DTSTART:20261101T070000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0600
TZOFFSETTO:-0500
TZNAME:CDT
DTSTART:20270314T080000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0500
TZOFFSETTO:-0600
TZNAME:CST
DTSTART:20271107T070000
END:STANDARD
END:VTIMEZONE
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20260217T113000
DTEND;TZID=America/Chicago:20260217T123000
DTSTAMP:20260403T175852
CREATED:20260130T135238Z
LAST-MODIFIED:20260206T001548Z
UID:10000062-1771327800-1771331400@nac-issa.org
SUMMARY:Securing the Connected Transit Ecosystem: Why Next-Generation Systems Demand Next-Generation Testing
DESCRIPTION:The NAC-ISSA February 2026 lunch will be chapter sponsored.  We are proud to present our chapter member and former chapter president\, Jason Cuneo.  Jason has worked with large municipalities in the US to secure their mass transit systems.  Join us for a look into a different segment of cybersecurity than you may typically think about. \n\n\n\nMass transit systems are rapidly adopting interconnected vehicle\, infrastructure\, and control technologies to improve safety\, efficiency\, and situational awareness. While these advances enable powerful new operational capabilities\, they also introduce attack surfaces that traditional security testing approaches were never designed to evaluate. This presentation reviews prior research and recent security test events conducted on mass transit platforms\, highlighting how enterprise-centric vulnerability assessment methodologies fall short in highly dynamic\, V2X-enabled environments.  \n\n\n\nAdditionally\, we will discuss new testing methods including realistic traffic generation scenarios\, protocol-aware threat emulation\, and understand how attackers conduct modern vehicular platform attacks. This talk will conclude with recommendations for developing a more robust\, reconfigurable testing environment that can keep pace with next-generation transit technologies. \n\n\n\nWalton’s Southern Table will provide the catering.  Door prize to be announced.
URL:https://nac-issa.org/event/securing-the-connected-transit-ecosystem-why-next-generation-systems-demand-next-generation-testing/
LOCATION:Auburn University Research and Innovation Campus\, 345 Voyager Way\, Huntsville\, AL\, 345 Voyager Way\, Huntsville\, United States
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20260219T180000
DTEND;TZID=America/Chicago:20260219T200000
DTSTAMP:20260403T175852
CREATED:20260126T202950Z
LAST-MODIFIED:20260126T202951Z
UID:10000060-1771524000-1771531200@nac-issa.org
SUMMARY:Tech Thursday: Making Your Own Wireshark Dissector for Mysterious and Unknown Protocols
DESCRIPTION:Presenter: Doogie \n\n\n\nNAC-ISSA and DC256 present our second Tech Thursday of 2026 at Gigaparts on Feb 19 at 6:00PM.   This hands-on workshop moves beyond filtering and display into the craft of understanding undocumented protocols and using that knowledge to create a reusable Wireshark dissector. \n\n\n\nAttendees will walk away with their own network protocol dissector that can be used in any Wireshark instance. \n\n\n\nAttendees should already understand networking basics\, such as the OSI model\, IP addresses\, MAC addresses\, the differences between TCP and UDP\, and the concept of port numbers. Familiarity with Wireshark is recommended. \n\n\n\nThe event is open to anyone interested in cyber security\, is free and pizza will be provided.
URL:https://nac-issa.org/event/tech-thursday-making-your-own-wireshark-dissector-for-mysterious-and-unknown-protocols/
LOCATION:Gigaparts\, Address 6123 University Drive\, Huntsville\, 35806\, United States
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20260220T180000
DTEND;TZID=America/Chicago:20260220T200000
DTSTAMP:20260403T175852
CREATED:20260213T184109Z
LAST-MODIFIED:20260213T184110Z
UID:10000066-1771610400-1771617600@nac-issa.org
SUMMARY:DC256 Presents: Artificial Doubt: The Collapse of Trust in Digital Materiel
DESCRIPTION:Join DC256 at GigaParts on February 20th @ 6:00PM! Rodney V. will be giving a presentation — Digital Trust: The Collapse of Trust in Digital Materiel. We will also be making a special announcement at the event\, so stay tuned! \n\n\n\nFor decades\, digital evidence has quietly relied on a fragile assumption that authenticity could be inferred after the fact. Hashes\, metadata\, chain-of-custody forms\, and expert testimony were “good enough” when fabricating convincing images\, video\, or audio was expensive and rare. Generative AI shattered that assumption and we need better means of security against threats that exploit this ambiguity. \n\n\n\nThis month’s presentation is sponsored by the North Alabama Chapter – Information Systems Security Association (NAC-ISSA).  The event is free to attend\, registration not required.
URL:https://nac-issa.org/event/dc256-presents-artificial-doubt-the-collapse-of-trust-in-digital-materiel/
LOCATION:GigaParts\, 6123 University Dr NW\, Huntsville\, 35806\, United States
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20260226T080000
DTEND;TZID=America/Chicago:20260226T093000
DTSTAMP:20260403T175852
CREATED:20260205T230951Z
LAST-MODIFIED:20260205T230952Z
UID:10000063-1772092800-1772098200@nac-issa.org
SUMMARY:CMMC Coffee & Compliance Series Presented by CyberProtex
DESCRIPTION:Join us for coffee and discussions on practical automation strategies to simplify CMMC readiness. You’re not alone. Thousands of SMBs in the DIB face the same challenge. \n\n\n\n \n\n\n\nMeeting CMMC requirements doesn’t have to mean overbuilding your security program or blowing your budget. CMMC Without the Chaos is a practical\, executive-friendly session designed specifically for small and mid-sized contractors looking to use automation to simplify compliance.In this Coffee & Compliance event\, we’ll break down what automation realistically means for CMMC\, where it delivers the most value\, and where manual processes are still required. Attendees will learn how to reduce time spent on documentation and evidence collection\, avoid common overengineering mistakes\, and better leverage Microsoft tools they may already own. \n\n\n\nThis session focuses on doing enough—without doing too much—so organizations can stay contract-eligible while remaining efficient and audit-ready. \n\n\n\nYou’ll walk away with: \n\n\n\n\nA realistic understanding of automation’s role in CMMC compliance\n\n\n\nPractical ways to automate evidence collection and compliance tasks\n\n\n\nGuidance on leveraging Microsoft 365 and Azure security capabilities\n\n\n\nInsight into common automation pitfalls seen by assessors\n\n\n\nA clear roadmap for simplifying CMMC readiness without chaos\n\n\n\n\nWho Should Attend:Small and mid-sized defense contractors\, subcontractors\, IT leaders\, security managers\, compliance owners\, and business leaders responsible for CMMC readiness. \n\n\n\nNOTE:  This is not a NAC-ISSA event.  Registration is through CyberProtex.
URL:https://nac-issa.org/event/cmmc-coffee-compliance-series-presented-by-cyberprotex/
LOCATION:UAH Invention to Innovation Center (I2C)\, 850 Ben Graves Drive Northwest\, Huntsville\, 35816\, United States
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20260226T173000
DTEND;TZID=America/Chicago:20260226T200000
DTSTAMP:20260403T175852
CREATED:20260216T200004Z
LAST-MODIFIED:20260216T200006Z
UID:10000067-1772127000-1772136000@nac-issa.org
SUMMARY:Beers for Engineers with NAC-ISSA
DESCRIPTION:It has been far too long since we gathered to network over a fine craft beer and wood fired oven pizza!  Members and friends of the North Alabama Chapter of ISSA are invited to join us at InnerSpace Brewing on Thursday\, February 26.  Membership not required!   \n\n\n\nThis event is sponsored by NAC-ISSA.  Registration not required but appreciated to help plan for the attendance.
URL:https://nac-issa.org/event/beers-for-engineers-with-nac-issa-2/
LOCATION:InnerSpace Brewing\, 2414 Clinton Ave W\, Huntsville\, 35805-3014\, United States
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20260317T113000
DTEND;TZID=America/Chicago:20260317T123000
DTSTAMP:20260403T175852
CREATED:20260305T225638Z
LAST-MODIFIED:20260314T133045Z
UID:10000069-1773747000-1773750600@nac-issa.org
SUMMARY:Automating Exploitation with Agentic Systems presented by Jason Kearns.  NAC-ISSA's March chapter lunch
DESCRIPTION:Abstract: This session explores the emerging role of agentic AI in modern offensive cybersecurity operations. Through a guided presentation and discussion\, we will examine how AI-driven agents can be used to automate elements of reconnaissance\, web enumeration\, and vulnerability discovery within red team workflows. \n\n\n\n\nAgentic AI for reconnaissance and vulnerability discovery: How autonomous agents can assist in identifying attack surface\, enumerating web assets\, and surfacing potential vulnerabilities.\n\n\n\nCollaborative agent architectures: Designing systems where multiple specialized agents coordinate tasks to augment traditional security testing approaches.\n\n\n\nOperational implications for red teams and defenders: How AI-enabled automation is changing the pace\, scale\, and accessibility of offensive security capabilities.\n\n\n\n\nAttendees will leave with a practical understanding of how agentic AI systems can be structured\, the opportunities and risks they introduce\, and how these technologies may reshape both offensive and defensive cyber operations.
URL:https://nac-issa.org/event/automating-exploitation-with-agentic-systems-presented-by-jason-kearns-nac-issas-march-chapter-lunch/
LOCATION:Auburn University Research and Innovation Campus\, 345 Voyager Way\, Huntsville\, AL\, 345 Voyager Way\, Huntsville\, United States
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20260319T180000
DTEND;TZID=America/Chicago:20260319T200000
DTSTAMP:20260403T175852
CREATED:20260126T204033Z
LAST-MODIFIED:20260128T211838Z
UID:10000061-1773943200-1773950400@nac-issa.org
SUMMARY:Tech Thursday presents Shell Sorcery: The Magic of the Linux Command Line
DESCRIPTION:NAC-ISSA and DC256 continue the Tech Thursday series with Shell Sorcery: The Magic of the Linux Command Line. \n\n\n\nLinux isn’t as scary as it seems! This crash course uses gamification to introduce you to the command line. Instead of rote memorization\, you will solve logic puzzles to master the three pillars of daily Linux work: secure access\, file navigation\, and data extraction.  \n\n\n\nThere is no pre-requisite knowledge for attendees\, but an open and curious mind is encouraged! \n\n\n\nParticipants will need to have an SSH client installed before class begins. We recommend PuTTY: https://www.chiark.greenend.org.uk/~sgtatham/putty/ 
URL:https://nac-issa.org/event/tech-thursday-presents-shell-sorcery-the-magic-of-the-linux-command-line/
LOCATION:Gigaparts\, Address 6123 University Drive\, Huntsville\, 35806\, United States
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20260326T173000
DTEND;TZID=America/Chicago:20260326T193000
DTSTAMP:20260403T175852
CREATED:20260305T203251Z
LAST-MODIFIED:20260305T203252Z
UID:10000068-1774546200-1774553400@nac-issa.org
SUMMARY:Beers for Engineers with NAC-ISSA
DESCRIPTION:As of Sunday\, March 8\, Daylight Saving Time returns and the days get longer.   Come celebrate the longer\, warmer days with NAC-ISSA and the North Alabama cybersecurity community at InnerSpace Brewing.  Beers and Pizza on NAC-ISSA; networking on YOU!
URL:https://nac-issa.org/event/beers-for-engineers-with-nac-issa-3/
LOCATION:InnerSpace Brewing\, 2414 Clinton Ave W\, Huntsville\, 35805-3014\, United States
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20260415T080000
DTEND;TZID=America/Chicago:20260416T170000
DTSTAMP:20260403T175852
CREATED:20260206T001454Z
LAST-MODIFIED:20260206T001456Z
UID:10000065-1776240000-1776358800@nac-issa.org
SUMMARY:Southeast Cybersecurity Summit
DESCRIPTION:The Central Alabama Information Systems Security Association (CA-ISSA)\, InfraGard Birmingham Member Alliance (IBMA) and TechBirmingham are jointly hosting a cybersecurity conference in April and invite anyone interested to attend.  BSides Huntsville will return in 2027 so NAC-ISSA.  Chapter members and guests are encouraged to fill their 2026 need for content this spring with the Southeast Cybersecurity Summit. \n\n\n\nAbout the Summit\n\n\n\nThe purpose of the Summit is to strengthen and promote the internet security profession in the southeastern United States region. That goal is achieved through event activities which result in relationship building\, information sharing\, and ongoing education and training focused on current technology challenges and solutions.The Summit will highlight the strength\, diversity and economic impact of the technology companies and talent working and living in the southeast. \n\n\n\nNOTE:  This is not a NAC-ISSA event.  Registration is handled via the event website.
URL:https://nac-issa.org/event/southeast-cybersecurity-summit/
LOCATION:Birmingham Jefferson Convention Center\, 2100 Richard Arrington Jr Blvd N\, Birmingham\, 35203\, United States
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20260421T113000
DTEND;TZID=America/Chicago:20260421T123000
DTSTAMP:20260403T175852
CREATED:20260401T162023Z
LAST-MODIFIED:20260401T162117Z
UID:10000071-1776771000-1776774600@nac-issa.org
SUMMARY:Chapter lunch with Jason Cuneo and Digital Forensics
DESCRIPTION:Join NAC-ISSA for our April chapter lunch with Jason Cuneo.  Jason will present on Digital Forensics.  Catering and door prize to be announced.
URL:https://nac-issa.org/event/chapter-lunch-with-jason-cuneo-and-digital-forensics/
LOCATION:Auburn University Research and Innovation Campus\, 345 Voyager Way\, Huntsville\, AL\, 345 Voyager Way\, Huntsville\, United States
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20260423T163000
DTEND;TZID=America/Chicago:20260423T193000
DTSTAMP:20260403T175852
CREATED:20260325T221327Z
LAST-MODIFIED:20260325T221328Z
UID:10000070-1776961800-1776972600@nac-issa.org
SUMMARY:Beers for Engineers with Women in Defense
DESCRIPTION:Join the North Alabama Chapter of ISSA and the Tennessee Valley Chapter of Women in Defense as we co-host Beers for Engineers in April.  Both organizations seek to grow the cyber community throughout North Alabama.  We’ll run this event from 4:30 to 7:30 at InnerSpace Brewing.  Come join us to meet new friends and help make our cybersecurity community even stronger!
URL:https://nac-issa.org/event/beers-for-engineers-with-women-in-defense/
LOCATION:InnerSpace Brewing\, 2414 Clinton Ave W\, Huntsville\, 35805-3014\, United States
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20260519T113000
DTEND;TZID=America/Chicago:20260519T123000
DTSTAMP:20260403T175852
CREATED:20251104T222317Z
LAST-MODIFIED:20260219T195309Z
UID:10000055-1779190200-1779193800@nac-issa.org
SUMMARY:WallArm sponsors May 2026 NAC-ISSA lunch
DESCRIPTION:TOPIC: Business Logic Abuse: Technology Agnostic Mapping of Attack Types \n\n\n\nOWASP’s technology specific top 10 lists have provided a ton of value\, but it’s time for a different approach to business logic abuse. The rise of APIs and complex business logic attacks requires a new taxonomy that isn’t tied to a specific technology.
URL:https://nac-issa.org/event/wallarm-sponsors-april-2026-nac-issa-lunch-april-2026/
LOCATION:Auburn University Research and Innovation Campus\, 345 Voyager Way\, Huntsville\, AL\, 345 Voyager Way\, Huntsville\, United States
END:VEVENT
END:VCALENDAR