BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//NACISSA - ECPv6.16.2//NONSGML v1.0//EN
CALSCALE:GREGORIAN
METHOD:PUBLISH
X-WR-CALNAME:NACISSA
X-ORIGINAL-URL:https://nac-issa.org
X-WR-CALDESC:Events for NACISSA
REFRESH-INTERVAL;VALUE=DURATION:PT1H
X-Robots-Tag:noindex
X-PUBLISHED-TTL:PT1H
BEGIN:VTIMEZONE
TZID:America/Chicago
BEGIN:DAYLIGHT
TZOFFSETFROM:-0600
TZOFFSETTO:-0500
TZNAME:CDT
DTSTART:20250309T080000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0500
TZOFFSETTO:-0600
TZNAME:CST
DTSTART:20251102T070000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0600
TZOFFSETTO:-0500
TZNAME:CDT
DTSTART:20260308T080000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0500
TZOFFSETTO:-0600
TZNAME:CST
DTSTART:20261101T070000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0600
TZOFFSETTO:-0500
TZNAME:CDT
DTSTART:20270314T080000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0500
TZOFFSETTO:-0600
TZNAME:CST
DTSTART:20271107T070000
END:STANDARD
END:VTIMEZONE
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20260213T083000
DTEND;TZID=America/Chicago:20260213T123000
DTSTAMP:20260517T043406
CREATED:20260205T232204Z
LAST-MODIFIED:20260205T232205Z
UID:10000064-1770971400-1770985800@nac-issa.org
SUMMARY:Cyber Tabletop Exercise Training by Cyber Brews
DESCRIPTION:Cybersecurity Tabletop Exercise (TTX) Design & Facilitation Workshop \n\n\n\nThis in-person tabletop exercise (TTX) training workshop is designed for professionals who want to do more than participate in tabletop exercises—they want to run their own. \n\n\n\nParticipants will experience a facilitated cyber incident tabletop while also learning how to design\, conduct\, and document tabletop exercises that support incident response readiness and CMMC Level 1 and Level 2 assessment objectives. \n\n\n\nThis workshop blends hands-on participation with practical instruction\, giving attendees the tools and confidence to take tabletop exercises back to their own organizations. \n\n\n\nWhat You’ll Learn\n\n\n\nParticipants will learn how to: \n\n\n\n\nDesign tabletop exercises aligned to organizational size\, mission\, and risk\n\n\n\nBuild realistic scenarios and injects that drive meaningful discussion\n\n\n\nFacilitate tabletop exercises across technical and non-technical roles\n\n\n\nCapture decisions\, assumptions\, and gaps during an exercise\n\n\n\nConduct effective hot washes and after-action discussions\n\n\n\nUse tabletop exercises to support CMMC Level 1 and Level 2 practices\, including incident response and operational readiness\n\n\n\n\nYou’ll see how a tabletop unfolds in real time\, then break down why it was structured that way and how to replicate it. \n\n\n\nWhat You’ll Experience\n\n\n\n\nA guided\, facilitator-led cyber incident scenario\n\n\n\nSmall-group participation with progressive injects\n\n\n\nReal-time discussion and decision-making\n\n\n\nInstructor walkthroughs of scenario design and facilitation techniques\n\n\n\nPractical guidance on documentation and lessons learned\n\n\n\nTemplates and approaches you can reuse for your own exercises\n\n\n\n\nThis is not a lecture-only workshop. Active participation is encouraged\, but no prior tabletop experience is required. \n\n\n\nNOTE:  This is not a NAC-ISSA event.  Registration is handled through the Cyber Brews registration page.
URL:https://nac-issa.org/event/cyber-tabletop-exercise-training-by-cyber-brews/
LOCATION:Five Stones Research Corporation\, 401 Wynn Dr NW\, Huntsville\, 35805\, United States
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20260217T113000
DTEND;TZID=America/Chicago:20260217T123000
DTSTAMP:20260517T043406
CREATED:20260130T135238Z
LAST-MODIFIED:20260206T001548Z
UID:10000062-1771327800-1771331400@nac-issa.org
SUMMARY:Securing the Connected Transit Ecosystem: Why Next-Generation Systems Demand Next-Generation Testing
DESCRIPTION:The NAC-ISSA February 2026 lunch will be chapter sponsored.  We are proud to present our chapter member and former chapter president\, Jason Cuneo.  Jason has worked with large municipalities in the US to secure their mass transit systems.  Join us for a look into a different segment of cybersecurity than you may typically think about. \n\n\n\nMass transit systems are rapidly adopting interconnected vehicle\, infrastructure\, and control technologies to improve safety\, efficiency\, and situational awareness. While these advances enable powerful new operational capabilities\, they also introduce attack surfaces that traditional security testing approaches were never designed to evaluate. This presentation reviews prior research and recent security test events conducted on mass transit platforms\, highlighting how enterprise-centric vulnerability assessment methodologies fall short in highly dynamic\, V2X-enabled environments.  \n\n\n\nAdditionally\, we will discuss new testing methods including realistic traffic generation scenarios\, protocol-aware threat emulation\, and understand how attackers conduct modern vehicular platform attacks. This talk will conclude with recommendations for developing a more robust\, reconfigurable testing environment that can keep pace with next-generation transit technologies. \n\n\n\nWalton’s Southern Table will provide the catering.  Door prize to be announced.
URL:https://nac-issa.org/event/securing-the-connected-transit-ecosystem-why-next-generation-systems-demand-next-generation-testing/
LOCATION:Auburn University Research and Innovation Campus\, 345 Voyager Way\, Huntsville\, AL\, 345 Voyager Way\, Huntsville\, United States
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20260219T180000
DTEND;TZID=America/Chicago:20260219T200000
DTSTAMP:20260517T043406
CREATED:20260126T202950Z
LAST-MODIFIED:20260126T202951Z
UID:10000060-1771524000-1771531200@nac-issa.org
SUMMARY:Tech Thursday: Making Your Own Wireshark Dissector for Mysterious and Unknown Protocols
DESCRIPTION:Presenter: Doogie \n\n\n\nNAC-ISSA and DC256 present our second Tech Thursday of 2026 at Gigaparts on Feb 19 at 6:00PM.   This hands-on workshop moves beyond filtering and display into the craft of understanding undocumented protocols and using that knowledge to create a reusable Wireshark dissector. \n\n\n\nAttendees will walk away with their own network protocol dissector that can be used in any Wireshark instance. \n\n\n\nAttendees should already understand networking basics\, such as the OSI model\, IP addresses\, MAC addresses\, the differences between TCP and UDP\, and the concept of port numbers. Familiarity with Wireshark is recommended. \n\n\n\nThe event is open to anyone interested in cyber security\, is free and pizza will be provided.
URL:https://nac-issa.org/event/tech-thursday-making-your-own-wireshark-dissector-for-mysterious-and-unknown-protocols/
LOCATION:Gigaparts\, Address 6123 University Drive\, Huntsville\, 35806\, United States
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20260220T180000
DTEND;TZID=America/Chicago:20260220T200000
DTSTAMP:20260517T043406
CREATED:20260213T184109Z
LAST-MODIFIED:20260213T184110Z
UID:10000066-1771610400-1771617600@nac-issa.org
SUMMARY:DC256 Presents: Artificial Doubt: The Collapse of Trust in Digital Materiel
DESCRIPTION:Join DC256 at GigaParts on February 20th @ 6:00PM! Rodney V. will be giving a presentation — Digital Trust: The Collapse of Trust in Digital Materiel. We will also be making a special announcement at the event\, so stay tuned! \n\n\n\nFor decades\, digital evidence has quietly relied on a fragile assumption that authenticity could be inferred after the fact. Hashes\, metadata\, chain-of-custody forms\, and expert testimony were “good enough” when fabricating convincing images\, video\, or audio was expensive and rare. Generative AI shattered that assumption and we need better means of security against threats that exploit this ambiguity. \n\n\n\nThis month’s presentation is sponsored by the North Alabama Chapter – Information Systems Security Association (NAC-ISSA).  The event is free to attend\, registration not required.
URL:https://nac-issa.org/event/dc256-presents-artificial-doubt-the-collapse-of-trust-in-digital-materiel/
LOCATION:GigaParts\, 6123 University Dr NW\, Huntsville\, 35806\, United States
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20260226T080000
DTEND;TZID=America/Chicago:20260226T093000
DTSTAMP:20260517T043406
CREATED:20260205T230951Z
LAST-MODIFIED:20260205T230952Z
UID:10000063-1772092800-1772098200@nac-issa.org
SUMMARY:CMMC Coffee & Compliance Series Presented by CyberProtex
DESCRIPTION:Join us for coffee and discussions on practical automation strategies to simplify CMMC readiness. You’re not alone. Thousands of SMBs in the DIB face the same challenge. \n\n\n\n \n\n\n\nMeeting CMMC requirements doesn’t have to mean overbuilding your security program or blowing your budget. CMMC Without the Chaos is a practical\, executive-friendly session designed specifically for small and mid-sized contractors looking to use automation to simplify compliance.In this Coffee & Compliance event\, we’ll break down what automation realistically means for CMMC\, where it delivers the most value\, and where manual processes are still required. Attendees will learn how to reduce time spent on documentation and evidence collection\, avoid common overengineering mistakes\, and better leverage Microsoft tools they may already own. \n\n\n\nThis session focuses on doing enough—without doing too much—so organizations can stay contract-eligible while remaining efficient and audit-ready. \n\n\n\nYou’ll walk away with: \n\n\n\n\nA realistic understanding of automation’s role in CMMC compliance\n\n\n\nPractical ways to automate evidence collection and compliance tasks\n\n\n\nGuidance on leveraging Microsoft 365 and Azure security capabilities\n\n\n\nInsight into common automation pitfalls seen by assessors\n\n\n\nA clear roadmap for simplifying CMMC readiness without chaos\n\n\n\n\nWho Should Attend:Small and mid-sized defense contractors\, subcontractors\, IT leaders\, security managers\, compliance owners\, and business leaders responsible for CMMC readiness. \n\n\n\nNOTE:  This is not a NAC-ISSA event.  Registration is through CyberProtex.
URL:https://nac-issa.org/event/cmmc-coffee-compliance-series-presented-by-cyberprotex/
LOCATION:UAH Invention to Innovation Center (I2C)\, 850 Ben Graves Drive Northwest\, Huntsville\, 35816\, United States
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20260226T173000
DTEND;TZID=America/Chicago:20260226T200000
DTSTAMP:20260517T043406
CREATED:20260216T200004Z
LAST-MODIFIED:20260216T200006Z
UID:10000067-1772127000-1772136000@nac-issa.org
SUMMARY:Beers for Engineers with NAC-ISSA
DESCRIPTION:It has been far too long since we gathered to network over a fine craft beer and wood fired oven pizza!  Members and friends of the North Alabama Chapter of ISSA are invited to join us at InnerSpace Brewing on Thursday\, February 26.  Membership not required!   \n\n\n\nThis event is sponsored by NAC-ISSA.  Registration not required but appreciated to help plan for the attendance.
URL:https://nac-issa.org/event/beers-for-engineers-with-nac-issa-2/
LOCATION:InnerSpace Brewing\, 2414 Clinton Ave W\, Huntsville\, 35805-3014\, United States
END:VEVENT
END:VCALENDAR