ISSA Chapter Meeting 7 January 2025:
Admin
Meeting held in-person at ECPI and virtually on Zoom. For questions, please raise your virtual hand or use the chat feature. Charles is attending virtually today. Please give us feedback after the meeting what did you like? What could we improve?
Agenda:
Welcome
Membership
Education
Presentation
Business Meeting
Q&A Feedback
Adjourn
ISSA Board Organization Chart:
ISSA-HR Professional Association Benefits:
Build professional relationships, stay current on developments in areas of information security/risk/privacy, professional development, education opportunities, (looking forward to our presentation today!) Earn CPE/CEU continuing education credits, (Membership chair can handle CPE/CEU inquiries) learn practical and best practice solutions, career information and employment opportunities
Grow Professionally!:
Whether you’re a pre-professional, entry-level, mid-career, senior practitioner or security leader, ISSA offers strategic resources and guidance to successive career levels.
Membership Annual Cost: Professional (Not a student) $95, Student 30, (Chapter Dues $30) Professional = $125 total, Student = $60– Your company May even reimburse these dues! Does not hurt to ask
*Select Hampton roads as your chapter
New Members:
Welcome: Tal (October), Noah and Robert!
Glad to have you, thank you for joining!
Education:
Goals: Provide educational resources, mentorship opportunities, team-building/collaboration, hands-on industry tool familiarization, certification tracking/pipeline
Free/Low Cost Online Cybersecurity Learning Content:
Offered by NIST, to a wide variety of audiences to include Primary, Secondary and High school students, those breaking into the cybersecurity industry, or even anyone who uses a computer. Highly recommended as a digestible educational cyber awareness resource that is not too technical. (https://www.nist.gov/itl/applied-cybersecurity/nice/resources/online-learning-content/)
Google Cybersecurity Professional Certificate:
Google Foundational Cybersecurity Certificate, offered by Coursera, in this 6-month self-paced certificate program, you’ll learn in-demand skills, and get AI training from Google experts. No degree or experience required!
What you’ll learn: Programming for cybersecurity tasks, Frameworks and controls that inform security operations, Using security information end event management (SIEM) tools for cybersecurity, Detecting and responding t incidents using an intrusion detection system, Perform packet capture and analysis, Using AI to boost productivity.
Enroll for Free! (Financial Aid available)https://grow.google/certificates/cybersecurity/
CISA Learning has replaced Federal Virtual Training Environment (FedVTE) as of 4 December 2024:
More information about this change can be found at: https://niccs.cisa.gov/education-training/cisa-learning
CISA’s new Learning Management System will replace FedVTE as well as a few other platforms.
Available for:
Federal government employees and contractors
State, local, Tribal and Territorial (SLTT) government employees
U.S military personnel and Veterans
Publicly Available (select courses):
No cost online cybersecurity training on topics such as:
Courses for all proficiency levels from beginner to advanced
850 hours of training mapped to the NICE Framework
Certification prep courses on topics such as Ethical Hacking, Certified Information Security Manager (CISM), and Certified Information Systems Security Professional (CISSP)
The ability to work at your own pace from any computer or mobile device
*if you are a government employee, you have been notified of this change and have an internal resource for this system.
External users may use this link to access the resources:
https://learning.cisa.gov/login/index.php
Education, featured Blog:
Department of the Treasury Data Breach – Dec 2024
U.S Department of the Treasury experienced a significant cybersecurity breach attributed to a state-sponsored actor from the People’s Republic of China. The attackers gained unauthorized access to unclassified documents by exploiting a vulnerability in a third-party cybersecurity service provider, BeyondTrust. Classified as a “major cybersecurity incident“.
Key Details:
Attack Vector: breach occurred through BeyondTrust’s remote support software. The attackers compromised an API key for a cloud-based service used for remote technical support, enabling them to access workstations and unclassified documents within the Treasury Department.
Discovery and Response: BeyondTrust detected suspicious activity on Dec 2nd, and identified the breach by Dec 5th. The company notified the Treasury Department in Dec 8th. Subsequently, the compromised API key was revoked, and the affected service has been taken offline to prevent further unauthorized access.
Attribution: U.S attributed the attack to a Chinese Advanced Persistent Threat (APT) actor, indicating a high level of sophistication and resourced behind the operation.
Implications: This breach underscores the vulnerabilities associated with third-party service providers, even those that are FedRAMP-certified. It highlights the necessity for stringent security measures and continuous monitoring of external partnerships to safeguard sensitive government information.
Social Media Resources:
Zeffy is used for event registrations
Feel free to pitch in and share ideas on our discord!
Discord (QR below), can use QR code, link or search “ISSA-HR”, there is a lot of activity on our server, great resource. (https://discord.com/invite/Jt3m7TWQzQ)
LinkedIn: great resource to get in touch with us:
Click the QR code (Above), link or search for “Information Systems Security Association – Hampton Roads Chapter” https://www.linkedin.com/company/information-systems-security-association-issa-hampton-roads-chapter/
Website: Be sure to also check out the Meeting recap on the ISSA-HR webpage!
Been blogging on the LinkedIn! Thanks Faith!
https://issa-hr.org/issa-chapter-meeting-12-november-2024
Meetings and Social Events:
7 January 2025:
Xavier-Lewis Palmer, PhD Engineering (Biology and Cybersecurity: A Primer on BCS Threats
14 Feb 2025:
Ethan Wooten: (Topic TBD)
Looking for speakers as we look ahead to 2025! As well as in-house backup speakers. And a potential Speaker coordinator!
After-Meeting Networking Happy Hour:
After ISSA meeting at plaza Degollado. (Around at the corner from ECPI).
Another Cyber Social, in Chesapeake:
Jan 24th, this one is great for folks that don’t have an opportunity during the workweek to meet up at Casual Pint, we will be there. Our inaugural Chesapeake cyber social will kick off Friday, January 24th, from 6:00PM to 8:00PM, at Lockside (200 Battlefield blvd Blvd N Ste 1, Chesapeake, VA, 23320
RSVP:
Meetup: https://www.meetup.com/issa-hampton-roads/events/291986625/
Eventbrite: https://www.eventbrite.com/o/issa-hr-25244087249
Cyber Social at Casual Pint:
it’s a great casual (non formal) event, always a good turnout. A great place to network. Wednesday January 29th from 5:30-8:30, at Casual Pint, 3380 Princess Anne Rd, Ste 111, Virginia Beach, VA, 23456.
RSVP:
Meetup: https://www.meetup.com/issa-hampton-roads/
Eventbrite: https://ISSA-HR.eventbrite.com/
Jobs:
Need a job: Type of Job, Elevator Pitch (Value you bring, qualifications, additional info)
Have a Job: Title of Job, basic requirements, contact information
ISSA has a job search page: http://iz1.me/XJU31zUSeBVhttps://issa-jobs.careerwebsite.com/jobseeker/search/results/
Government Jobs: USAJOBS.gov:
Government job resource: Great resource for fed resumes: Federal Resume Guidebook by Kathryn Troutman: https://www.amazon.com/Federal-Resume-Guidebook-Writing-Featuring-dp-173340760X/dp/173340760X/ref=dp_ob_title_bk
Best way to get a job is through networking.
Need a Job:
If you’re looking for work, now’s your chance to let us know! Let us hear your elevator pitch: an Introduction, summary of what you do: current role and why you are doing well there, relevant experience, explain your value/what problem you can solve, and a Call to action for what you’d want to do next. Whether you are currently employed or just want to practice, now is a great opportunity.
Optionally, for an extra 30 seconds you can add other details such as clearance status, remote, on-site or relocation preference, additional education/certs not already mentioned, and other short details. We can post your email in the chat if you want, we will ensure it gets to the right people.
– Dana Issac Electric Technician, military, top secret equipment, trying to go to school get cyber degree at Regent, looking for something to break into, working on Sec+, did Skillbridge at a cybersecurity firm out of Chicago in Chicago, working as a SOC2 analyst, currently not working, about to be a full time student, looking for something in the meantime. Secret clearance but able to vet higher,
– Kayla got her masters at ODU, bachelors I IT, working as a SOC analyst for about 3 years now, interested more in engineering, something more hands on, Sec+ (expired) looking to Net+, AWS,
No clearance
– Zena also went to Regent, Has Sec+, masters in cyber, secret clearance active, she worked with John, misses it every day, policy, troubleshooting, firewall are skills, currently work at SAIC NNPI, escalates or refers as needed. Looking for, something similar with what she did with John, would prefer to stay cleared.
Mikhail W. dropped his LinkedIn in the discord, for anyone looking for opportunities, recruiters offer him stuff, always ask him if he knows any talent, hit him up!
Have a Job:
Job title/Company/Type (Contractor, Government, Private sector, Internship, Full time, Part time)/Requirements (Years’ work experience, Education, Certs, Clearance)/Desired experience, qualifications and any other information desired (keep it short)
– Looking for TS/SCI eligible Network Architect, HII, (Huntington Ingalls aways has a bunch or stuff)
Monthly Presentation: Biology and Cybersecurity, A Primer on BCS Threats, Xavier-Lewis Palmer and Lucas Potter, PhD
Join us as Xavier-Lewis Palmer and Lucas Potter, PhD unveil the critical confluence of biology and cybersecurity. Both scientists, Engineers and Full-stack Biotechnologists. with PhDs in Engineering from Old Dominion University with a foci in Human Factors, Physical and Computer Modeling, Artificial Intelligence (AI), Cybersecurity, and Interdisciplinary Bio Science, together they form a team that researches, teaches, and mentors on projects with numerous mentees, workshops, and Journal and conference publications.
Dr. Potter is joining us remotely from Dayton Ohio.
This presentation will delve into these intertwined disciplines impacting our everyday lives, from the food we consume to the healthcare services we depend on.
Who We are
Dr. Xavier-Lewis Palmer has a diverse background in multiple disciplines, fostering curiosity and dialogue on technologies at the nexus of biology and cybersecurity;
Dr. Lucas Potter is research administrator, specializing in assessing and characterizing bio-cyber threats, ensuring cross-domain security.
Both work for the firm BIOSview, a virtual lab dedicated to fostering collaborations and innovation in hybrid fields that comprise Biocybersecurity (BCS) and Cyberbiosecurity (CBS). (http://biosview.org/)
Purpose:
BCS can be considered a study of how biological assets (either nominally offensive or not) can be leveraged with cyber assets (I.e, Machine Learning (ML), AI, advanced logical networks, or biometric systems) to perform acts that are not condoned by legal or ethical means. One previously (and regrettably overly expansive) working definition was “Any cybersecurity system where a biological component, target, or interlock is involved in the terminal or intermediate stages. (Ref: CyberBioSecurity, A new field to deal with emerging threats. Edited by Dov Greenbaum, published by Springer Nature, 2023.)(https://books.google.com/books?hl=en&lr=&id=jhC-EAAAQBAJ&oi=fnd&pg=PR5&dq=CyberBioSecurity,+A+new+field+to+deal+with+emerging+threat&ots=oBnXzd1zyV&sig=rONPbHgDEs3-CaZ8klrSnGz59wM)
“Essentially if you have bio/cybersecurity considerations, its important to prioritize them together.”
Overview: What is BCS/Key Threats/Mitigation
“What is Biocybersecurity?”
Definition:
BCS exists at the intersections of biological and digital sciences, covering subject matter derived from expected sources like Research Labs or Medical Centers, as well as those that may be unexpected; Water Treatment Plants for instance.
“Cybersecurity situations can evolve into biosecurity situations.”
The Emerging Domain:
From the years 2017 to 2024, there has been increased interdisciplinary Collaboration, enhanced focus on Internet of Things (IoT) and automation vulnerabilities, regulatory and policy advancements and increased amount of nations within the global north and south are getting involved. (Ref: ICCWS 2025 Paper Pending on CBS Snapshot).
Key Biocybersecurity Threats:
Data Breaches:
Due to the nature of this type of threat, The US Department of Health and Human Services Office for Civil Rights maintains a webpage meant for disclosure of reported breaches. As required by section 13402(e)(4) of the HITECH Act, the Secretary must post a list of breaches of unsecured Protected Health Information (PHI) affecting individuals. This page lists all breaches reported within the last 24 months that are currently under investigation by the Office for Civil Rights. (https://ocrportal.hhs.gov/ocr/breach/breach_report.jsf)
“This is where breaches are reported if they affect over 500 people; to be reported within 24 months of the incident.”
Manipulation of Biological Systems:
Malicious code to Binary, to DNA synthesis, to DNA sequencing, to Malicious code is the simplified abstract of Computer Security, Privacy, and DNA Sequencing: Compromising Computers with Synthesized DNA, Privacy Leaks and More, written by Peter Ney, Karl Koscher et. al, University of Washington (https://www.usenix.org/conference/usenixsecurity17/technical-sessions/presentation/ney)
“DNA is essentially 1’s and 0’s. The sequence renders into these 1’s and 0’s. If you synthesize malware into DNA, can create malicious DNA. You could turn a biological system into a digital system.”
Medical device Vulnerability Scenarios:
Remote Manipulation of Device Parameters, misreporting of physiological status, data breaches & patient identity theft, and disruption of supply chains for critical components (Ref: Commentary on healthcare and disruptive innovation. (https://digitalcommons.odu.edu/ece_fac_pubs/442/), ICCWS 2025 Paper Pending on Respiratory Devices, Seperate 2025 Journal Article Pending)
“Defcon’s (Biohacking Villiage (https://www.villageb.io/) area works with these concepts. These are scary.”
Biomanufacturing Risks: (Some of them.)
Process tampering and sabotage, data integrity and theft, and supply chain vulnerabilities lay just a small few items among this of substantial risk landscape.
Recommended Reading available to learn more about these risks include:
Cyberbiosecurity: an emerging new discipline to help safeguard the bioeconomy, (Frontiers in Bioengineering and Biotechnology, 6, p.39 (https://www.frontiersin.org/articles/10.3389/fbioe.2018.00039/full).
Cyberbiosecurity in high-containment laboratories, Frontiers in bioengineering and biotechnology, 11, p.1240281 (https://www.frontiersin.org/articles/10.3389/fbioe.2023.1240281/full).
Cyberbiosecurity for biopharmaceutical products, Frontiers in Bioengineering and Biotechnology, 7, p.116 (https://www.frontiersin.org/articles/10.3389/fbioe.2019.00116/full).
PURE Biomanufacturing: Secure, Pandemic-Adaptive Biomanufacturing (https://inldigitallibrary.inl.gov/sites/sti/sti/Sort_61610.pdf).
Cyberbiosecurity in advanced manufacturing models, Frontiers in Bioengineering and Biotechnology, 7, p.210 (https://www.frontiersin.org/articles/10.3389/fbioe.2019.00210/full).
Securing agricultural systems against the threat of misinformation, Journal of the ASABE, p.0 (https://elibrary.asabe.org/abstract.asp?aid=55016).
If you can’t afford homemade, store bought terror is fine too:
The Weapons of Mass Destruction Proxy (WMDP) Benchmark: (https://www.wmdp.ai/) is dually, a proxy developed for evaluation for hazardous knowledge in Large Language Models (LLMs) and a benchmark for unlearning methods to remove such knowledge.
“Please don’t use ChatGPT to do terrorism. Hacks can be developed biologically.”
Killing with MATH:
Biosecurity and applications of predictive physiological modeling, such as ML enhancements to a single instance FPS prediction can cause potentially disaster-causing results. (Ref: Biocybersecurity and applications of predictive physiological modeling, International Journal of System of Systems Engineering, 14(4), pp.349-361) (https://www.inderscienceonline.com/doi/abs/10.1504/IJSSE.2024.139410)
“Medics get to use devices, these devices have advanced to such a degree that they can determine physiological data. Hacks against sites like 23andme make this problematic.”
Misinformation Campaigns:
Post-LLM Academic Writing Considerations, Proceedings of the Future Technologies Conference (pp. 154-163) (https://link.springer.com/chapter/10.1007/978-3-031-47448-4_12)
“This process shows how these campaigns surface, and what details (threat actors) use to launch them. Most of these campaigns are written in English.”
Mitigation Strategies:
Technical Safeguards:
Realize the dangers inherent in your data, “Squeak that wheel” by strengthening access control and monitoring systems, securing data storage and transmission through encryption, and building resilient manufacturing/service frameworks (e.g., PURE) for adaptability during disruptions. “These unassuming pieces of data could serve as vulnerabilities.” Policy: Strengthen regulatory frameworks, Promote public-private partnerships, enhance detection systems, focus on education and training, international cooperation to name a few examples. (Ref: Commentary on biological assets cataloging and AI in the Global South, Proceedings of SAI Intelligent Systems Conference (pp. 734-744).(https://link.springer.com/chapter/10.1007/978-3-031-16075-2_54)
“Some industries may have older staff that didn’t have to think about cybersecurity before, but certainly do now.”
Education:
Interdisciplinary training, awareness of bioeconomy risks, policy and ethical considerations all are elements that can be assessed.
“Know what biological data out there can harm you. Don’t be afraid to squeak the wheel.”
Conclusion
Contact:
Dr. Lucas Potter: BiosView1@proton.me | Dr. Xavier-Lewis Palmer BiosView@proton.me
All views expressed are personal and not reflective of either doctors’ potential, past, or present employer’s.
Dr Xavier-Lucas Palmer and Dr. Lucas Potter will take questions:
Q: This falls into the realm of disinformation against vaccinations, do you combat that? Disinformation stating blatantly false data?
Dr. X-L P: Or vise Versa
Dr. Potter: vaccines are interesting, the real issue is less that GPT enables you to make disinformation quickly, in the past, you had to find a platform that could push that claim. Now, anyone can go on facebook and say anything they want. One of the methods we found, if you work in a medical setting make sure people are getting information from reputable resources. Biggest thing we can do is show people how to access the right information. (Threat actors) target people who normally don’t have access to this (correct) information.
Dr. X-L P: To know you are getting right information, it needs to be validated. Someone tells you your water has xyz in it, you may want to be concerned about that, if you know how to do testing and validate that testing, that information can be easier verified. Same thing with vaccines. All biologically relevant information. Personal training as well as community training. Making sure the right platforms exist and they are being utilized.
Q: Appreciate the presentation, to my understanding the problem is disinformation and the hardware gathering that information (CT scanners etc), is BCS making sure the data is secured of theorizing what hackers may do with that information?
Dr. X-L P: biological material can be utilized in attacks. DNA can be used to traffic malware. if that can be done to DNA, what other material can be used a as vehicle toward an attack chain? Various wearables, rings, watches, how is that data collected, handled, or used? Could it attack us? Or our community? People can send false results to wearables, clogging up medical facilities because those people are going to that hospital, even though they don’t need to. Biocysec deserves its own category because all aspects of biology can be an attack surface. What do we know that can be taken advantage of biologically? Algorithms are being consulted to develop these types of attack.
Q: We see bio firms getting bought out, what happens then?
Dr. Potter: Blackrock bought 23andme. The issue of how to find out, how to verify that people have your data an don’t do anything bad with it, is, at this point. Totally unknown. The data you gave a corporation, vs what you gave to a hospital, is not as protected, or held to the same privacy standard as patient data would be.
Q: We could crate a category, like how we hacked SCADA, when it became a hot topic because bad actors used it as a source of an attack, are we trying to create a segment of similar focus toward BioCysec?
Dr. X-P: This is a multi-nation effort. Global interests are involved, they see the risks behind this biodata, and earn the degree of which the bio economy could be compromised, our water systems, What databases have this data? We may have a goldmine of data, or an animal, or plant, that creates a compound to use toward pharma, any nation state may wan to disrupt those records to take away from the bioeconomy. Which has been skyrocketing in its offerings. Ecology, Pharmaceuticals, we can even engineer Tardigrades (water bears) for purpose of vaccines. CEOS in control of firms that amass the majority of our bioeconomy, are not educated to such a degree to be best equipped to protect those firms. This is a great opportunity for us to learn about each others fields, and collaborate.
Dr. P: I think its been basically covered, The bioeconomy, of which is still undiscovered is an interesting one. The issue is if you wanted to do AI stuff, you may not still find these discoveries, we ant to make sure this information is not abused.
Q: I’m tracking this as a butting tail, what is your recommendation for folks trying to get a foot in the door toward this science?
Dr. X-P: I’d start off with, take some bio classes, gain an understanding, if you wanted to work for ConAgra, or Tyson, hit up Codeacademy, biological components that are marketed, service processes, even the nature of the biology that they are handling. Intermediate: variety of workshops, starting, cyberbiosecurity summit, Virginia tech, Colorado State and a few other unis are starting to offer similar summits. For those at ODU: there is a class Lucas and I collaborated with professors to kickstart: Intro to Cyberbiosecurity, offered at each spring. Thats the offering class-wise, at any higher level, we have a ton of literature, papers, if you have questions just email us. There are so many other authors in CyBiosec, one of our mentees has began developing papers at the higher level. Jump into the literature! Agriculture, water systems, even.
Dr. P: There’s a paper from the CCDH, The disinformation dozen. (https://cdn.centerforinquiry.org/wp-content/uploads/sites/33/2021/05/15131138/disinformation_dozen.pdf) It’s about disinformation during COVID on social media. Competing elements, that paper shows why people spread disinformation in the first place. Disinformation is insane, especially form the cyber perspective. As far as biology: the best idea may be to address background knowledge in the topic you are looking into, it sounds old fashioned, but sometimes the library might be a great place to start.
Q: As we share the cybersecurity field, we are aware of the maturity of quantum and Q-day, is there anything in your side of the field that may be looking forward to quantum?
Dr. P: That’s an interesting topic, the big issue right now is there is no fixing a lot of that stuff, let’s take a look at physiological, you cant put the DNA back, if it’s already been sequenced, you cannot undo that. Processes a government or a municipality have are the ones who would have to answer to that.
Dr X-L P: Amy Webb wrote a few books, The Big Nine, The Genesis Machine, and Living Intelligence, how, eventually aspects of biology are being brought into this realm, to either improve or alter computations. Quantum may have some uses there. In order to go best in detail it may have to be another talk.
Q: The government is reactive, not proactive, outside of regular security mitigation we do every day, is anything being done outside government, to address bio concerns?
Dr. P: A lot of universities have jumped headfirst into the topic, They have been holding research sessions, summits, provide concentrated expertise. Various companies have also jumped in to protect these data. Defcon has their Biohacking village, other cons seem to be taking hold hold it too. Dr. X-L P: The government has been somewhat proactive, this is still relatively new, need to make ore awareness, get more attention drawn to it. There’s a lot of self funded work. Working to try and get buy in, prove that this is important, get more parties to invest. To protect these vital industries, these common elements of society we rely on.
Thank you, gentlemen!
Business Meeting:
Old business
New business
Membership Updates
Secretary: Meeting Minutes
Treasury Report
Social Media Updates
Old Business:
Held elections last month, we have new Officers! Evan is president, Faith is VP, John Bos is secretary, peter is Treasurer, congratulations to all! Our holiday party went off without a hitch, we discussed cyber facts to get the education requirement in, as well as the election results.
New Business:
Roles available to be filled!: Membership coordinator is looking for support, if you are interested in helping out CJ or maybe even getting committed to the role, let us know.
Sponsorship meeting: Yearly 12 month commitment is current focus, further details pending (April).
New Social event!: Fridays at Lockside, 6:00.
Holiday Party Happened!: At Casual Pint, was a good time.
Conferences:
Cybersecurity Law and Compliance Conference: Arlington, VA: Jan. 29-30, $(unknown),
https://www.americanconference.com/cybersecurity-law/
Cyber Fusion 2025: Virginia Tech, Blacksburg, VA: Feb. 21-22, $FREE, https://cyberinitiative.org/events-programs.html/
CyberForge 2025: Newport News, VA: March 22-23, Early: $10-$20, https://www.cyberforge.cvcsa-cyber.org/
International Conference on Cyber Warfare and Security: William & Mary, Williamsburg, VA: March 28-29,$500 early, $300 student, https://cyberinitiative.org/events-programs.html/
Government Cybersecurity Showcase: Richmond, VA: April 9 $0,
https://publicsectornetwork.com/events/government-cybersecurity-showcase-virginia-richmond-virginia-2025/
CCI Symposium 2025: Richmond: VA: April 14-15, 2025 Early $200, https://cyberinitiative.org/events-programs/events-for-2025/cci-symposium-2025.html/
RVAsec 2025: Richmond, VA: June 3-4, $250, $200 early https://rvasec.com/
DON IT East, Naval-Maritime IT: Norfolk, VA: May 13 $TBA, https://hamptonroads.afceachapters.org/upcoming-events/
Is local, Mike B advocated it, FVFC folks will be there. DON IT portion has not yet been released, if Active duty or govt employee, in the past it was free, don’t see why it wouldn’t be once again.
CIOMeet 2025: Tysons, VA: Sep. 23, $TBA, https://infosec-conferences.com/us-state/virginia/
Membership Update:
Number of members: 49
Last meeting: 25 attendees
If your membership is expired/expiring, be sure to renew your membership to remain in good standing
October 1st Meeting Minutes:
Meeting recap on website:
https://issa-hr.org/issa-chapter-meeting-12-November-2024/
Presentation Speaker: Tal Reznikov, Building for Automation in Security
New Business: Election Committee, Holiday Party
Treasurer Report Balance: $4,282.15 recorded.
Treasurer Report:
Balance: $5,034.79 working to maintain $5k balance: Holiday party brought in some new members, as well as door fees which put us back up above 5k, for now.
2025 Events Calendar:
Please note this calendar does not currently reflect our new Chesapeake social event
Social Media:
Email Addresses:
Adjourn:
After Meeting:
Networking Happy Hour @ Plaza Dellogado
Please give us feedback!:
What did you like? Recommendations for future meetings? What could make your experience better?
Send your feedback to President @ ISSA-HR. Org.
You must be logged in to post a comment.