2019
January
- Insured Risks of Municipalities Across Alabama – David Sikes
February
- FBI Update on Cyber Threats in Alabama – SSA Darren Mott
March
- Cyber Security Challenges in Financial Services – Jeff Kennedy
2018
January
- Cybersecurity at the White House – Jamie Barchanowicz
February
- 2018 Cyber Threats & Risk Awareness – SSA Darren Mott
March
- Challenges of Starting a Security Team – Dan Smart
April
- DHS Protective Security Advisory Program & It’s Resources – Greg Carden
May
- Legal Aspects of a Security Breach – Howard Bogard and India Vincent
June
- Using Splunk to Stop Human Trafficking – James Deer
July
- Introduction to the Tennessee Valley Regional Computer Forensics Lab – Director Todd Spiker
August
- Active Shooter Training – ON SITE EVENT
September
- Current Terrorist Threat Landscape for Northern Alabama – SSA Deen Abbott
October
- Privacy Developments that Impact Information Security Practices – Paige Boshell
November
- Security and Compliance Concerns in Financial Institutions – Jim Phillips
December
- 2018 Year in Review – Gary Warner
2017
January
- InfraGard Strategic Plans for 2017 and Beyond – President Jeff Gaynor
February
- Cyber Security at a Rock Company – Robin Nix
March
- Institute for Critical Infrastructure Protection & Cyber Systems – Dr. Anthony Skjellum
April
- FBI’s Latest Efforts Fighting Public Corruption – Deen Abbott
May
- True Cost Economics of Attribution – Dan Clemens
June
- Trump’s Executive Order on Cybersecurity – What it Says and What it Means – Brandon Robinson
July
- Security is Mine: Teaching Security Concepts with Minecraft – Mike Shaw
August
- Report Card of Alabama’s Infrastructure – Sheila Montgomery Mills
October
- Mobile Threat Landscape – Steven Schmidt
November
- Introduction to the Metro Area Crime Center & LETTR – Sheriff Mike Shaw
December
- 2017 Year in Review – Gary Warner
2016
March
- Cyber Threatscape – Experiences & Perspectives from a Local Agent – SA Jake Blair
May
- The Future of Money – Dr. Yuliang Zhang
July
- Ransomware Trends & Tactics – Brendan Griffin
August
- Exploring the Social & Behavioral Science Underlying Tickets
September
- 15 Year Chapter Anniversary Meeting
October
- Cybersecurity Efforts @ UAB – Deidre Mitchell
November
- Drones in the Industry – Hunter Cole
December
- 2016 Year in Review – Gary Warner
2012
January
- DHS’s Blueprint For A Secure Cyber Future – Gary Warner
- Important Current Legal Topics – Jim Phillips
February
- Application Security in the Real World – Lora McIntosh
- Important Current Legal Topics – Jim Phillips
March
- So, I wanted to map your world: Bleeding edge open source intelligence gathering, incident response, and how to fight back! – Daniel Clemens
- The State of Security in America – How do you measure up? – David Forrestall
April
- Important Current Legal Topics – Jim Phillips
- Single-Serving Security: Protecting Yourself From Financial Fraud – Mike Shaw
- Hard Drives – We Rely On Them 24/7/365, But What Do We Really Know About Them? – Bill Long
May
- Got malware? A practical guide on detecting, removing, and preventing malware on your home computer – Joshua Smith
- Important Current Legal Topics – Jim Phillips
June
- SWAT, F.A.T.S., and Insider Threats – FBI Birmingham
July
- National Infrastructure Protection In The Age of Drones, Digits and Dollar$: Integrating Intelligence Analytics Into The Investigative Process – John Grimes
- – Grant Reveal
August
- Cooperative malware and threat analysis – Gary Warner
- Important Current Legal Topics – Jim Phillips
September
- Reconnaissance And Photography: Myths And Realities – Mike Shaw
- – Gary Warner
October
- Cloud Security For SMB’s – Keith Coker
November
- Bomb Tech Demo Range – FBI Huntsville
December
- Nextgen Cyber Initiative – SA Todd Berryman
2016
January
- Important Current Legal Topics – Jim Phillips
February
- Basics of DDoS – Alex Brewer
March
- FBI Cyber Threat Program – SA Todd Berryman
April
- LoS IP Networks – Johnathan E. Poarch
May
- Splunk Implementation at UAB – George Starcher
June
- Results of OPUSA – Alex Brewer
July
August
- Backtrack 5: Tools of the Trade – Alex Brewer
September
- Makin’ Mo Money – Mike Shaw
October
- Important Current Legal Topics – Jim Phillips
- – Daniel Fortune
November
December
2012
January
- DHS’s Blueprint For A Secure Cyber Future – Gary Warner
- Important Current Legal Topics – Jim Phillips
February
- Application Security in the Real World – Lora McIntosh
- Important Current Legal Topics – Jim Phillips
March
- So, I wanted to map your world: Bleeding edge open source intelligence gathering, incident response, and how to fight back! – Daniel Clemens
- The State of Security in America – How do you measure up? – David Forrestall
April
- Important Current Legal Topics – Jim Phillips
- Single-Serving Security: Protecting Yourself From Financial Fraud – Mike Shaw
- Hard Drives – We Rely On Them 24/7/365, But What Do We Really Know About Them? – Bill Long
May
- Got malware? A practical guide on detecting, removing, and preventing malware on your home computer – Joshua Smith
- Important Current Legal Topics – Jim Phillips
June
- SWAT, F.A.T.S., and Insider Threats – FBI Birmingham
July
- National Infrastructure Protection In The Age of Drones, Digits and Dollar$: Integrating Intelligence Analytics Into The Investigative Process – John Grimes
- – Grant Reveal
August
- Cooperative malware and threat analysis – Gary Warner
- Important Current Legal Topics – Jim Phillips
September
- Reconnaissance And Photography: Myths And Realities – Mike Shaw
- – Gary Warner
October
- Cloud Security For SMB’s – Keith Coker
November
- Bomb Tech Demo Range – FBI Huntsville
December
- Nextgen Cyber Initiative – SA Todd Berryman
2013
January
- Important Current Legal Topics – Jim Phillips
February
- Basics of DDoS – Alex Brewer
March
- FBI Cyber Threat Program – SA Todd Berryman
April
- LoS IP Networks – Johnathan E. Poarch
May
- Splunk Implementation at UAB – George Starcher
June
- Results of OPUSA – Alex Brewer
July
August
- Backtrack 5: Tools of the Trade – Alex Brewer
September
- Makin’ Mo Money – Mike Shaw
October
- Important Current Legal Topics – Jim Phillips
- – Daniel Fortune
November
December
2012
January
- DHS’s Blueprint For A Secure Cyber Future – Gary Warner
- Important Current Legal Topics – Jim Phillips
February
- Application Security in the Real World – Lora McIntosh
- Important Current Legal Topics – Jim Phillips
March
- So, I wanted to map your world: Bleeding edge open source intelligence gathering, incident response, and how to fight back! – Daniel Clemens
- The State of Security in America – How do you measure up? – David Forrestall
April
- Important Current Legal Topics – Jim Phillips
- Single-Serving Security: Protecting Yourself From Financial Fraud – Mike Shaw
- Hard Drives – We Rely On Them 24/7/365, But What Do We Really Know About Them? – Bill Long
May
- Got malware? A practical guide on detecting, removing, and preventing malware on your home computer – Joshua Smith
- Important Current Legal Topics – Jim Phillips
June
- SWAT, F.A.T.S., and Insider Threats – FBI Birmingham
July
- National Infrastructure Protection In The Age of Drones, Digits and Dollar$: Integrating Intelligence Analytics Into The Investigative Process – John Grimes
- – Grant Reveal
August
- Cooperative malware and threat analysis – Gary Warner
- Important Current Legal Topics – Jim Phillips
September
- Reconnaissance And Photography: Myths And Realities – Mike Shaw
- – Gary Warner
October
- Cloud Security For SMB’s – Keith Coker
November
- Bomb Tech Demo Range – FBI Huntsville
December
- Nextgen Cyber Initiative – SA Todd Berryman
2011
2010
December 2010 – Cross Site Scripting
David Wharton’s excellent Cross-Site Scripting presentation and the BeEF demo. Defending from the criminals often requires us to understand their tools and resources. This was an excellent example and I’m sure all who attended came away with a new perspective on website security. Below you will find a link to his presentation.
Cross-Site Scripting Presentation
______________________________________________________________________
October 2010 – StuxNet
I want to thank Joshua Smith for his presentation on the StuxNet malware. If you missed the presentation or you would simply like to review what was covered, here are links to Joshua’s BLOG and to his presentation PDF.
StuxNet Technical Political and Business Analysis
______________________________________________________________________
September 2010 – National Congress Report & Incident Response
John Giordano represented the Birmingham Chapter at the InfraGard National Congress. Daniel Clemens several scenarios while attendees worked tabletop style to determine appropriate responses.
______________________________________________________________________
August 2010 – Research in Computer Forensics
Gary Warner hosted this meeting at the UAB Computer Forensics Research Laboratory. The chapter was given a tour of the facility with demonstrations of research processes and UAB SPAM Data Mine.
______________________________________________________________________
July 2010 – Vulnerability Classes & Attacking Methods
This presentation addressed the basics of Vulnerability Classes and general semantics moving into how understandings and or assumptions of vulnerability classes can help or hurt an organization’s security posture. The chapter received a good picture of what a targeted attack will look like and how the assumptions and psychology of the defender will come into play when defending against a 3-6 month attacker.
______________________________________________________________________
June 2010 – 100th Meeting for Birmingham
Birmingham hosted the largest meeting for the chapter since 2005. There were visitors from the InfraGard National Members Alliance in Birmingham to present a recognition award for being the fist chapter to achieve this milestone. Many of the agents that have been part of the InfraGard program were also in attendance. Presentations by members included a chapter history and how the chapter has been a benefit to members and local organizations. Then everyone ate burgers and brats that were supplied by one of our most special local organizations.
______________________________________________________________________
April 2010 – Modern Malware
______________________________________________________________________
March 2010 – 16th Street Baptist Church Bombing
______________________________________________________________________
Feb 2010 – Securing Web Applications
______________________________________________________________________
December 2009 – Cyber Prosecutions
______________________________________________________________________
November 2009 – Testing Web Applications
______________________________________________________________________
October 2009 – Tech University Birmingham
______________________________________________________________________
September 2009 – Emergency Preparedness
______________________________________________________________________
August 2009 – Field Safety
______________________________________________________________________
July 2009 – The Metascape Case
______________________________________________________________________
June 2009 – Shutting Down a Rogue ISP