August Meeting: Steganography

ALL attendees must RSVP (with or without lunch).

Note: Our host request we park at the rear of the building. There is ample parking available.

THIS IS A MEMBERS ONLY MEETING. Only InfraGard members can attend. No guests can attend.
Speaker: Michael Lee, Radiance Technologies
Sector: Information Technology Sector, Defense Industrial Base Sector
Description: At the Cyber Forensics Camp, one of the stations teaches kids about steganography and cryptography. In this presentation, Michael Lee will discuss steganography and how it is different from cryptography. He will discuss what steganography is, how it is used, and what the security implications of it are. He will specifically focus on how it works, how you can detect it, and how you can protect against it. Mr. Lee will demonstrate several steganography tools and how easy they are to use. He will also demonstrate some steganalysis tools and how they detect steganography. This presentation is a high-level overview of steganography relevant to all audiences.
Speaker Bio:: Michael Lee is a Senior Software Engineer at Radiance Technologies where he focuses on developing tools and capabilities for full spectrum cyber operations on closed systems and networks. He has led the development of several cyber tools in the areas cyber operations, cryptography, data integrity, and authentication. He has also conducted vulnerability analysis and reverse engineering on multiple systems. He has a B.S. degree in Computer Engineering from University of Arkansas and a M.S. degree in Computer Networking from NC State University.
Lunch Selection:
Lunch will be $15 from McAlister’s Deli. Menu selections are:

  • Turkey Sandwich
  • Ham Sandwich
  • Roast Beef Sandwich
  • Salad
  • Veggie Sandwich

Make sure your RSVP by the Monday before at 8:00am and don’t forget to mark you lunch order.

InfraGard Cyber Forensics Camp Overview

ALL attendees must RSVP (with or without lunch).

Note: Our host request we park at the rear of the building. There is ample parking available.

Speaker: Christine Karlson, current InfraGard President and National South East Regional Representative.
Sector: All

A buffet lunch is offered for $20 (must show receipt).
Earn 1 hour continuing education unit.

Make sure your RSVP by September 4th at 8:00am and don’t forget to mark you lunch order.

City of Huntsville Update

ALL attendees must RSVP (with or without lunch).

Note: Our host request we park at the rear of the building. There is ample parking available.

Speaker: Harrison Diamond, City of Huntsville Business Relations Officer
Sector: All
Mr. Diamond is the liaison to the business community and the Mayors DEO, Cyber, Energy, and Broadband Initiatives, including efforts to attract Google to Huntsville.
A buffet lunch is offered for $20 (must show receipt).
Earn 1 hour continuing education unit.

Make sure your RSVP by July 31st at 8:00am and don’t forget to mark you lunch order.

Current Local Events (FLASH Report topics)

ALL attendees must RSVP (with or without lunch).

This is a MEMBERS ONLY EVENT.

Note: Our host request we park at the rear of the building. There is ample parking available.

Speaker: FBI SAC Stanton, Birmingham Division
Sector: All

A buffet lunch is offered for $20 (Ted’s BBQ)

Earn 1 hour continuing education unit.

This is a MEMBERS ONLY EVENT.

ALL ATTENDEES MUST REGISTER NO LATER THAN APRIL 28 (to verify memberships).

Sector Chief Program

ALL attendees must RSVP (with or without lunch).

Note: Our host request we park at the rear of the building. There is ample parking available.

Speaker: Jeremy Blevins, InfraGard Huntsville Member Alliance Sector Chief Coordinator
Sector: All
Topic: The presenter for our December meeting is Jeremy Blevins, chapter Critical Infrastructure Sector Coordinator, who will be updating us on the InfraGard National Sector Chief Program (INSCP) Goals and Guidance. Highlights of this presentation will include: changes to the program, which sectors are most represented in our chapter, introduction of our current Sector Chiefs, and which Sectors warrant the appointment of a Chief.
Jeremy Blevins is a Certified Information Systems Security Professional with over 15 year’s experience in the defense sector. He holds a Bachelor of Business Administration from Faulkner University, a Graduate Certificate in Project Management and a Master of Science in Management from Embry-Riddle Aeronautical University. He is currently completing a Master of Professional Studies in Cyber Policy and Risk Analysis at Utica College.
A Holiday buffet lunch is offered for $20 (Walton’s)

A buffet lunch is offered for $20 (must show receipt).
Earn 1 hour continuing education unit.

Make sure your RSVP by December 5th at 8:00am and don’t forget to mark you lunch order.

Terrorist Explosive Device Analytical Center (TEDAC) Overview

ALL attendees must RSVP (with or without lunch).

Note: Our host request we park at the rear of the building. There is ample parking available.

Speaker: TEDAC Director Greg Carl
Sector: All
Topic: The mission of TEDAC is to coordinate and manage the unified effort of law enforcement, intelligence, and military assets for the forensic and technical exploitation of IEDs of interest to the U.S. government worldwide, in an effort to provide actionable intelligence to the offensive missions against terrorism and to the Force Protection mission.

A buffet lunch is offered for $20 (must show receipt).
Earn 1 hour continuing education unit.

Make sure your RSVP by August 1st at 8:00am and don’t forget to mark you lunch order.

OPSEC Failures

ALL attendees must RSVP and must present receipt for lunch.

Note: Our host request we park at the rear of the building. There is ample parking available.

Speaker: Ryan Averbeck, Ph.D., Chief, Research & Technology Protection Center – South and AMC Research & Technology Protection Branch

Topic: Dr. Ryan Averbeck is the Chief of Army Materiel Command’s Research and Technology Protection Branch and the Chief of the Army Research and Technology Protection Center – South at Redstone Arsenal, AL. He has worked in the intelligence and national security field for the Department of Defense, NASA, and industry partners for the past two decades. He specializes in identifying and protecting critical technologies and systems that provide a battlefield and economic advantage to the United States. He holds multiple certifications ranging from DoD acquisition program management, DoD International Affairs Security Assistance Management, Information Systems Security Professional, NSTISSI 4011 certification; and export controls certifications.
He received a Ph.D. with a specialization in Computer and Information Security from Northcentral University; an M.B.A. in International Business from Baker College; and Bachelor degrees in Criminal Justice and History from the University of Alabama at Birmingham. He is also a graduate of the U.S. Marine Corps Command and General Staff Course, the Army Intermediate Level Education Course, and the Senior Manager Course in national security at George Washington University’s Elliot School of International Affairs.

A buffet lunch is offered for $15 (must show receipt)

Earn 1 hour continuing education unit.

Make sure you RSVP by May 2nd at 8:00am and don’t forget to mark your lunch order.

Information Sharing Analysis Centers and their role in the critical infrastructure protection

ALL attendees must RSVP and must present receipt for lunch.

Note: Our host request we park at the rear of the building. There is ample parking available.

Speaker: Steve Lines, DIBISAC

Topic: The new Information Sharing Analysis (ISAC) organizations established is by Executive Order 13691 and standards development. ISACs develop partnerships with governments and agencies such as DHS Cyber information Sharing Collaboration Program (CISCP); UK Critical information Sharing Program (CISP); National Council of ISACs and Network Security Information Exchange (NSIE) as well as partnerships with Customs on counterfeit technology. All of these organizations can be leveraged to enhance the protection of your company and your customers through the power of collaboration. Other discussions include the evolving threat of ransomware impacting multiple sectors as well as tornado preparedness; new developments in technology for the first responder community.

A BBQ buffet lunch is offered for $15 (must show receipt)

Earn 1 hour continuing education unit.

Make sure you RSVP by April 4th at 8:00am and don’t forget to mark your lunch order.

Encryption Tools, Techniques, and Compliance

ALL attendees must RSVP (with or without lunch)

Note: Our host request we park at the rear of the building. There is ample parking available.

In this talk, Mr. Lee will talk about the basics of encryption technology and what tools and techniques are needed to satisfy the requirements of protecting Controlled Unclassified Technical Information (CUTI). Mr. Lee will describe how different encryption tools and techniques satisfy different objectives and how to select the best tool to protect data in different environments (such as protecting data-at-rest vs data-in-motion). This presentation will also cover the challenges of implementing encryption in corporate environments and what actions need to be in place to protect against data loss.

Make sure you RSVP by July 6th at 10:00am and don’t forget to mark your lunch order.

DFARS New Cyber Rule on Unclassified Controlled Technical Information (UCTI)

ALL attendees must RSVP (with or without lunch)

Learning Objectives:

  • Introduction to DFARS requirements: Definition, Safeguarding, Reporting
  • Effects on Prime and Sub Contractors
  • Understanding Unclassified Technical Information (UCTI)
  • Level of Effort in order to implement NIST SP800-53 controls
  • Reporting requirements
  • Benefits of Implementation

Background:
On November 18, 2013, the Department of Defense (DoD) issued a final rule, effective the same day, amending the Defense Federal Acquisition Regulation Supplement (DFARS) to impose requirements for safeguarding unclassified controlled technical information residing on contractor information technology systems and databases.

The responsibility to label and identify UCTI as well as verification of DFARS compliance falls on the government. But how the government will verify implementation is still undefined.