Past Presentations

2019

January

  • Insured Risks of Municipalities Across Alabama – David Sikes

February

  • FBI Update on Cyber Threats in Alabama – SSA Darren Mott

March

  • Cyber Security Challenges in Financial Services – Jeff Kennedy

2018

January

  • Cybersecurity at the White House – Jamie Barchanowicz

February

  • 2018 Cyber Threats & Risk Awareness – SSA Darren Mott

March

  • Challenges of Starting a Security Team – Dan Smart

April

  • DHS Protective Security Advisory Program & It’s Resources – Greg Carden

May

  • Legal Aspects of a Security Breach – Howard Bogard and India Vincent

June

  • Using Splunk to Stop Human Trafficking – James Deer

July

  • Introduction to the Tennessee Valley Regional Computer Forensics Lab – Director Todd Spiker

August

  • Active Shooter Training – ON SITE EVENT

September

  • Current Terrorist Threat Landscape for Northern Alabama – SSA Deen Abbott

October

  • Privacy Developments that Impact Information Security Practices – Paige Boshell

November

  • Security and Compliance Concerns in Financial Institutions – Jim Phillips

December

  • 2018 Year in Review – Gary Warner

2017

January

  • InfraGard Strategic Plans for 2017 and Beyond – President Jeff Gaynor

February

  • Cyber Security at a Rock Company – Robin Nix

March

  • Institute for Critical Infrastructure Protection & Cyber Systems – Dr. Anthony Skjellum

April

  • FBI’s Latest Efforts Fighting Public Corruption – Deen Abbott

May

  • True Cost Economics of Attribution – Dan Clemens

June

  • Trump’s Executive Order on Cybersecurity – What it Says and What it Means – Brandon Robinson

July

  • Security is Mine: Teaching Security Concepts with Minecraft – Mike Shaw

August

  • Report Card of Alabama’s Infrastructure – Sheila Montgomery Mills

October

  • Mobile Threat Landscape – Steven Schmidt

November

  • Introduction to the Metro Area Crime Center & LETTR – Sheriff Mike Shaw

December

  • 2017 Year in Review – Gary Warner

2016

March

  • Cyber Threatscape – Experiences & Perspectives from a Local Agent – SA Jake Blair

May

  • The Future of Money – Dr. Yuliang Zhang

July

  • Ransomware Trends & Tactics – Brendan Griffin

August

  • Exploring the Social & Behavioral Science Underlying Tickets

September

  • 15 Year Chapter Anniversary Meeting

October

  • Cybersecurity Efforts @ UAB – Deidre Mitchell

November

  • Drones in the Industry – Hunter Cole

December

  • 2016 Year in Review – Gary Warner

2012

January

  • DHS’s Blueprint For A Secure Cyber Future – Gary Warner
  • Important Current Legal Topics – Jim Phillips

February

  • Application Security in the Real World – Lora McIntosh
  • Important Current Legal Topics – Jim Phillips

March

  • So, I wanted to map your world: Bleeding edge open source intelligence gathering, incident response, and how to fight back! – Daniel Clemens
  • The State of Security in America – How do you measure up? – David Forrestall

April

  • Important Current Legal Topics – Jim Phillips
  • Single-Serving Security: Protecting Yourself From Financial Fraud – Mike Shaw
  • Hard Drives – We Rely On Them 24/7/365, But What Do We Really Know About Them? – Bill Long

May

  • Got malware? A practical guide on detecting, removing, and preventing malware on your home computer – Joshua Smith
  • Important Current Legal Topics – Jim Phillips

June

  • SWAT, F.A.T.S., and Insider Threats – FBI Birmingham

July

  • National Infrastructure Protection In The Age of Drones, Digits and Dollar$: Integrating Intelligence Analytics Into The Investigative Process – John Grimes
  • – Grant Reveal

August

  • Cooperative malware and threat analysis – Gary Warner
  • Important Current Legal Topics – Jim Phillips

September

  • Reconnaissance And Photography: Myths And Realities – Mike Shaw
  • – Gary Warner

October

  • Cloud Security For SMB’s – Keith Coker

November

  • Bomb Tech Demo Range – FBI Huntsville

December

  • Nextgen Cyber Initiative – SA Todd Berryman

2016

January

  • Important Current Legal Topics – Jim Phillips

February

  • Basics of DDoS – Alex Brewer

March

  • FBI Cyber Threat Program – SA Todd Berryman

April

  • LoS IP Networks – Johnathan E. Poarch

May

  • Splunk Implementation at UAB – George Starcher

June

  • Results of OPUSA – Alex Brewer

July

August

  • Backtrack 5: Tools of the Trade – Alex Brewer

September

  • Makin’ Mo Money – Mike Shaw

October

  • Important Current Legal Topics – Jim Phillips
  •  – Daniel Fortune

November

December

2012

January

  • DHS’s Blueprint For A Secure Cyber Future – Gary Warner
  • Important Current Legal Topics – Jim Phillips

February

  • Application Security in the Real World – Lora McIntosh
  • Important Current Legal Topics – Jim Phillips

March

  • So, I wanted to map your world: Bleeding edge open source intelligence gathering, incident response, and how to fight back! – Daniel Clemens
  • The State of Security in America – How do you measure up? – David Forrestall

April

  • Important Current Legal Topics – Jim Phillips
  • Single-Serving Security: Protecting Yourself From Financial Fraud – Mike Shaw
  • Hard Drives – We Rely On Them 24/7/365, But What Do We Really Know About Them? – Bill Long

May

  • Got malware? A practical guide on detecting, removing, and preventing malware on your home computer – Joshua Smith
  • Important Current Legal Topics – Jim Phillips

June

  • SWAT, F.A.T.S., and Insider Threats – FBI Birmingham

July

  • National Infrastructure Protection In The Age of Drones, Digits and Dollar$: Integrating Intelligence Analytics Into The Investigative Process – John Grimes
  • – Grant Reveal

August

  • Cooperative malware and threat analysis – Gary Warner
  • Important Current Legal Topics – Jim Phillips

September

  • Reconnaissance And Photography: Myths And Realities – Mike Shaw
  • – Gary Warner

October

  • Cloud Security For SMB’s – Keith Coker

November

  • Bomb Tech Demo Range – FBI Huntsville

December

  • Nextgen Cyber Initiative – SA Todd Berryman

2013

January

  • Important Current Legal Topics – Jim Phillips

February

  • Basics of DDoS – Alex Brewer

March

  • FBI Cyber Threat Program – SA Todd Berryman

April

  • LoS IP Networks – Johnathan E. Poarch

May

  • Splunk Implementation at UAB – George Starcher

June

  • Results of OPUSA – Alex Brewer

July

August

  • Backtrack 5: Tools of the Trade – Alex Brewer

September

  • Makin’ Mo Money – Mike Shaw

October

  • Important Current Legal Topics – Jim Phillips
  •  – Daniel Fortune

November

December

2012

January

  • DHS’s Blueprint For A Secure Cyber Future – Gary Warner
  • Important Current Legal Topics – Jim Phillips

February

  • Application Security in the Real World – Lora McIntosh
  • Important Current Legal Topics – Jim Phillips

March

  • So, I wanted to map your world: Bleeding edge open source intelligence gathering, incident response, and how to fight back! – Daniel Clemens
  • The State of Security in America – How do you measure up? – David Forrestall

April

  • Important Current Legal Topics – Jim Phillips
  • Single-Serving Security: Protecting Yourself From Financial Fraud – Mike Shaw
  • Hard Drives – We Rely On Them 24/7/365, But What Do We Really Know About Them? – Bill Long

May

  • Got malware? A practical guide on detecting, removing, and preventing malware on your home computer – Joshua Smith
  • Important Current Legal Topics – Jim Phillips

June

  • SWAT, F.A.T.S., and Insider Threats – FBI Birmingham

July

  • National Infrastructure Protection In The Age of Drones, Digits and Dollar$: Integrating Intelligence Analytics Into The Investigative Process – John Grimes
  • – Grant Reveal

August

  • Cooperative malware and threat analysis – Gary Warner
  • Important Current Legal Topics – Jim Phillips

September

  • Reconnaissance And Photography: Myths And Realities – Mike Shaw
  • – Gary Warner

October

  • Cloud Security For SMB’s – Keith Coker

November

  • Bomb Tech Demo Range – FBI Huntsville

December

  • Nextgen Cyber Initiative – SA Todd Berryman

2011

2010

December 2010 – Cross Site Scripting

David Wharton’s excellent Cross-Site Scripting presentation and the BeEF demo.  Defending from the criminals often requires us to understand their tools and resources.  This was an excellent example and I’m sure all who attended came away with a new perspective on website security.  Below you will find a link to his presentation.

Cross-Site Scripting Presentation

______________________________________________________________________

October 2010 – StuxNet

I want to thank Joshua Smith for his presentation on the StuxNet malware. If you missed the presentation or you would simply like to review what was covered, here are links to Joshua’s BLOG and to his presentation PDF.

StuxNet Technical Political and Business Analysis

StuxNet Presentation

______________________________________________________________________


September 2010 – National Congress Report & Incident Response

John Giordano represented the Birmingham Chapter at the InfraGard National Congress. Daniel Clemens several scenarios while attendees worked tabletop style to determine appropriate responses.

______________________________________________________________________


August 2010 – Research in Computer Forensics

Gary Warner hosted this meeting at the UAB Computer Forensics Research Laboratory. The chapter was given a tour of the facility with demonstrations of research processes and UAB SPAM Data Mine.

______________________________________________________________________


July 2010 – Vulnerability Classes & Attacking Methods

This presentation addressed the basics of Vulnerability Classes and general semantics moving into how understandings and or assumptions of vulnerability classes can help or hurt an organization’s security posture. The chapter received a good picture of what a targeted attack will look like and how the assumptions and psychology of the defender will come into play when defending against a 3-6 month attacker.

______________________________________________________________________


June 2010 – 100th Meeting for Birmingham

Birmingham hosted the largest meeting for the chapter since 2005. There were visitors from the InfraGard National Members Alliance in Birmingham to present a recognition award for being the fist chapter to achieve this milestone. Many of the agents that have been part of the InfraGard program were also in attendance. Presentations by members included a chapter history and how the chapter has been a benefit to members and local organizations. Then everyone ate burgers and brats that were supplied by one of our most special local organizations.

______________________________________________________________________


April 2010 – Modern Malware

______________________________________________________________________


March 2010 – 16th Street Baptist Church Bombing

______________________________________________________________________


Feb 2010 – Securing Web Applications

______________________________________________________________________


December 2009 – Cyber Prosecutions

______________________________________________________________________


November 2009 – Testing Web Applications

______________________________________________________________________


October 2009 – Tech University Birmingham

______________________________________________________________________


September 2009 – Emergency Preparedness

______________________________________________________________________


August 2009 – Field Safety

______________________________________________________________________


July 2009 – The Metascape Case

______________________________________________________________________


June 2009 – Shutting Down a Rogue ISP