Welcome to the Pittsburgh Chapter of ISSA

A local chapter of an independent, professional organization committed to improving the effectiveness of Information Security through awareness, education and networking with fellow Security professionals.

A special thanks to our chapter sponsors

Cadre_logo Aruba_logo ism_logo CyberImperva_logo sophos_logo
Infoblox_logo One Identity logo Seiso_logo Gigamon_logo Logrythm_logo
Sentinel One logo Secureworks_logo Logrythm_logo Wombat_logo

Chapter Announcements

Chapter Meeting

The next meeting will be held on Tuesday November 6th. Registration is at 10:30 am and the meeting starts at 11:00 am. Lunch will be at noon. During lunch we will have our second presenter.

Our first presenter, Ken Dickey, VP of Business Development for Cadre Information Security, will be presenting ‘Cyber Threat Intelligence – A brief History and Modern Use Cases’.

Description: In 2015 both Congress and the Office of the President mandated a greater level of cooperation and promoting private sector Cybersecurity information sharing.  Since then the DHS has created the National Cybersecurity and Communications Integration Center (NCCIC) and established an Automated Indicator Sharing (AIS) system.  In this presentation well provide a brief history on those developments, the standards which have been developed and the modern use cases actually being used in the field.

We'll break around noon to grab some lunch and then Aaron Shelmire, a researcher in the Secureworks Counter Threat Unit, will be present ‘Defensive Measures: Adversary Actions in the Face of Adversity’.

Description: The private sector and governments have engaged in large scale operations against malicious actors as early as the 1980s, but to what effect?  What happens when law enforcement arrests a botnet operator?  Or a gang of money mules?  If criminal proceedings are the most expensive option for combating cybercrime, what other options are there?  Do botnet takedowns truly create “superbugs” as stated in Paul Vixie’s 2012 treatise “Breeding Internet Superbugs”?  Do the number of computer incidents increase or decrease after these events, and for how long? This presentation will provide an overview of how a long lived cybercrime operation works, and what sort of effects these actions have had.

After the second presentation we will have the drawing for $50 AMEX gift card and lunch. The winner must be present to claim the prize or we will redraw. There will be 2 CPE given to attendees of the lunch meetings.

Meeting location: The Gulf Tower; Gulf Theater. 707 Grant Street on the 3rd floor.

Cost: $10 for members of AITP, ARMA, InfraGard, ISACA, ISC2, ISSA, OWASP, Steel City InfoSec and TRCPA with advance registration. $15 for non-members with advance registration. $5 for students with advance registration

To register in advance for this meeting contact Mike Sotace at mpsotace@edmc.edu. Deadline for advance registration is Friday November 2nd, there is an extra $5.00 charge for registration after this date.