March 2018 Chapter Meeting

Come Join us for our upcoming Lunch Meeting:

Securing AWS Infrastructure

Presented by Derek Hill, MBA, CISSP

Where: 111 SW Columbia St., Portland, OR 97201 (8th Floor)

When: March 15th from 11:30 am to 1:15 pm (Come early we plan to start at 11:45)

Register by clicking on the date on the calendar widget.

Speaker Bio:

Derek Hill has over 25 years of experience in IT and Information Security. He currently manages an Application Security Team and an Infrastructure Security Team (Blue Team) at HP Inc. in Vancouver, WA. His teams are responsible for ensuring that HP’s internally developed applications are secure as well as the AWS infrastructure that is hosting these applications  Prior to his current position, Derek held IT management and technical roles at both large and small companies.  In each role, he has focused on delivering excellent services, uptime and security for all the projects/staff he managed.

Derek holds an MBA from Willamette University and an undergraduate degree in Management Information Systems from Oregon State University. He has various security credentials including a CISSP and multiple GIAC certifications. Derek is also a member of our chapter.


Are you looking to move your infrastructure into the cloud, but are worried about how to secure it? Are you ready to let go of all of your physical infrastructure? You are not alone in this journey. The cloud does not have to be this scary unknown black hole. Sure, things are certainly different and not everything that you used to do in your own infrastructure is easily repeatable in the cloud; however, there are many benefits. Thing are different, but many things are the same. We will discuss how to secure your cloud environment using both AWS tools and third party tools, including some custom applications that allow you to see what you have and how you need to secure it. We are successfully managing over 120 AWS accounts with approximately 3000 instances and many other AWS services. We hope that you can take away some ideas on how to solve some of your current security problems and gain the confidence that security in the cloud can be achieved.

Posted in Announcements, Chapter Meetings, Events | Comments Off on March 2018 Chapter Meeting

Sticky: Winter 2018 Training update

Welcome to 2018. I can see the days getting longer and I am enjoying the sun while it lasts, here in mid-February. I completed my coursework, obtaining my GIAC GCIH in January. That gave me time to build a new-to-me bicycle and tinker on my old Land Cruiser a bit. Those are my other hobbies.


  • James and my CISSP course this past Fall was a great success! Our community now has more certified professionals.
  • The official ISC2 CISSP study guide is provided to ISSA members at a 50% discount! This is the book we use in the course and the official ISC2 study guide. Contact Ashley Edwards at Wiley to receive the discounted price: Promo Code: CSP50

College Programs

  • In previous messages I have touted Mt. Hood Community College’s (MHCC) 2-year program in Information Security. The only Oregon 2-year. cybersecurity program recognized by Department of Homeland Security (DHS). Now other local schools are getting into the game.
  • PCC is actively pursuing their DHS 2-year Certification, look for more information coming in their Fall offerings.
  • Oregon Information Technology (OIT) is also pursuing their DHS Certification, but for their 4-year program! OIT collaborates with MHCC already and will with PCC as well to provide a 2+2 cybersecurity program, or OIT will provide all 4 years for students.

These schools obtaining certified cybersecurity programs exemplify the need our industry has for more trained professionals.

Local Trainers and Conferences

  • SANS has a Security Essentials Bootcamp coming in June. I am teaching the course. This is SEC401: This is a 6-day intensive, hands-on Information Security course. Come join me.
  • Last year, Charlie Kawasaki and his daughter provided a summer camp for high school students focused on Information Security. The name changed to NW Cyber Camp, but they are coming back this year again: Check them out and spread the word please.
  • The Portland OWASP chapter is working on their annual training day. This happens in early October. If you are interested in participating as a trainer or sponsor, please let me know and I will get you in touch with the OWASP Leadership team.
  • Interface Portland 2018 is coming next month: Every year there are some good nuggets at this local conference. If you attend, please come say hello to the board at the ISSA booth.

Opportunities to help

  • ISSA Portland is always looking for good presentations for our membership. You may be doing something amazing, novel, or interesting that others want to hear about. This is a growth potential for you and a learning opportunity for the rest of the membership. Let me know if you are interested in sharing.
  • We are 1/2 way through our program year. We are looking for next-year’s leaders. Let me know if you are interested! You have a lot to offer.
  • Opportunity to teach. Each year, James and I have provided a local CISSP course. If you are interested in helping with that effort, let us know. Having a pool of instructors will benefit our membership and provide you with a career building opportunity.
  • Mentorship. ISSA has a mentorship program. It needs local leaders to help organize. Having a mentor helps us to learn how to get to the next level, how to improve professionally and how to give back to our community. If you are interested in mentorship, either as a mentor or a mentee, let me know and we will work to get the program working locally.

Happy 2018! Stay warm and I look forward to seeing you at the next event!

Posted in Events, Training | Comments Off on Sticky: Winter 2018 Training update

February 14 Chapter Meeting – Cyber Threats: Oregon

From: 11:30 am to 1:00 pm

Where: Columbia Square (8th Floor), 111 SW Columbia Street, Portland, OR 97201

Speaker Bio:

George Chamberlain, FBI Special Agent Cybersecurity Task Force

Supervisory Special Agent (SSA) George Chamberlin leads the Cyber Program and the Oregon Cyber Task Force for the Federal Bureau of Investigation (FBI), Portland Field Office.  He investigated transnational organized crime for the FBI from 1999-2005 and has investigated criminal computer intrusions and cyber national security matters since 2006.  SSA Chamberlin served as a Cyber Terrorism Threat Manager at the National Cyber Investigative Joint Task Force (NCIJTF) in Washington DC and recently returned from a three-year overseas assignment in Asia where he worked joint investigations with international law enforcement partners.


The FBI Cyber Program in Oregon investigates network intrusions, data theft, denial of service, insider threats and other cybercrimes.  FBI cyber agents and task force officers are experienced in cyber incident response, the collection and preservation of digital evidence, network forensics and sharing of threat intelligence.  This presentation will cover recent cyber incidents in Oregon, current threat trends, common vulnerabilities and efforts by law enforcement to increase cybersecurity awareness and data protection.

Posted in Announcements, Chapter Meetings, Events | Comments Off on February 14 Chapter Meeting – Cyber Threats: Oregon

November – BeyondCorp & Zero Trust Networking

Come Join us for our November Lunch Meeting:

Zero-Trust Networking & A New Approach to Enterprise Security

From: 11:30 am to 1:00 pm

Speaker Bio:

Ivan Dwyer, ScaleFT


BeyondCorp is a Zero Trust security framework modeled by Google that shifts access controls from the perimeter to individual devices and users. The end result allows employees to work securely from any location without the need for a traditional VPN.

Register on Eventbrite:

Posted in Uncategorized | Comments Off on November – BeyondCorp & Zero Trust Networking

October 2017 – Social Engineering recap

The October meeting hosted Christopher Paidhrin talking about Social Engineering. This talk was well attended and covered the theory behind the human element and how to improve employee engagement to combat social engineering.

Check out the slides here: Social Engineering_v3

Posted in Uncategorized | Comments Off on October 2017 – Social Engineering recap

Training Options – Fall 2017

School has started again and with that, our ISSA year begins with a great talk about hacking a hackathon, next week. If you haven’t signed up for that, I highly encourage you to do so. With fall around the corner, that also means James and my CISSP preparation course at PCC starts soon, so get signed up for that. There are many other items coming up and hopefully I can touch on those here.

  • Of course, I have to mention our CISSP course at PCC. James and I successfully helped and guided a group through their CISSP study and passing the CISSP test! It was fun, challenging and informative. We provide this course for the local community, including the ISSA Portland Chapter. Anyone is welcome and the goal is to provide CISSP help at a reasonable cost. Please pass this along, the more people we have in the course, the more incentive James and I have to continue providing the content. The PCC class, CEU3654, is found here:
  • If you are taking our CISSP course, or you want to study on your own, the official ISC2 CISSP study guide is provided to ISSA members at a 50% discount! This is the book we use in the course and the official ISC2 study guide. Contact Ashley Edwards at Wiley to receive the discounted price: Promo Code: CSP50
  • OWASP Portland, our sister organization in the Portland area, is having their annual Training Day, October 4th! This year there are 6 tracks, a half-day each. Tickets go on sale 9/19 at 10AM, They will sell out fast!
  • SANS has an upcoming SEC401: Security Essentials bootcamp coming to Portland in November. I am teaching this one! It will be awesome. Get signed up for this early. Get your organization to fund your attendance, touting you will save on travel expenses with a local course.
  • Mt. Hood Community College has their 2-year programs around Information Security. Please check them out if you are interested in a program:
  • The Oregon Institute of Technology opened a campus in Wilsonville and provides 4-year IT programs. They are working on an Information Security curriculum. Kris Rosenberg is the Program Director and is one of the 6 instructors for the OWASP training day above! If you are looking for a 4-year program or know someone that might:


Posted in Training | Comments Off on Training Options – Fall 2017

September Lunch Meeting: Hacking a Hackathon


Date: September 14th, 2017
From: 11:30 am to 1:00 pm
Speakers: Alexei Kojenov & Alex Ivkin

Portland Building
1120 SW 5th Ave
Portland, OR 97204

Speaker Bio:
Alexei Kojenov is a Senior Application Security Engineer with years of prior software development experience. During his career with IBM, he gradually moved from writing code to breaking code. Since late 2016, Alexei has been working as a consultant at Aspect Security, helping businesses identify and fix vulnerabilities and design secure applications.

Alex Ivkin is a senior security architect with experience in a broad array of computer security domains, focusing on Identity and Access Governance (IAG/IAM), Application Security, Security Information and Event management (SIEM), Governance, Risk and Compliance (GRC). Throughout his consulting career Alex has worked with large and small organizations to help drive security initiatives and deploy various types of enterprise-class identity management and application security systems. Alex is an established and recognized security expert, a speaker at various industry conferences, holds numerous security certifications, including CISSP and CISM, two bachelor’s degrees and a master’s degree in computer science with a minor in psychology.

Abstract: Hacking a Hackathon
All modern software, but the most trivial one, relies on common libraries to perform routine work. Your software may be bastion of security, exhaustively tested and evaluated, but once a vulnerability is discovered in a library you depend on, all bets are off. These large and pervasive vulnerabilities quickly become popular targets, exploited by everybody from script kiddies, to professional hackers, to state actors. It is no surprise that the use of vulnerable libraries is included in the OWASP Top 10 list. The Australian Signals Directorate (ASD) lists patching operating systems and applications as two of their top four strategies to mitigate security incidents!

During a recent hacking game, we’ve identified and exploited a vulnerability not anticipated by the developers. One little crack in a widely used library gave us the footing we needed to construct an attack chain of remote code execution, file upload, data exfil, source code disassembly, and branching into a private network, all despite extremely high level of hardening on the target from unintended attacks. We’ll share with you how a safe and fun library exploitation can be in the confines of a hacking game, and how there are serious implications for your corporate applications where the stakes are much higher.

Have questions about ISSA Portland – September – Hacking a Hackathon? Contact ISSA Portland Chapter
Posted in Chapter Meetings, Events | Comments Off on September Lunch Meeting: Hacking a Hackathon

Come Join us for our June Meeting: Threat Intelligence & Officer Elections

Meeting Time: 11:30 am to 1:00 pm

Speaker: Scott Williams, Anomali

About Anomali: Anomali delivers earlier detection and identification of adversaries in your organization’s network by making it possible to correlate tens of millions of threat indicators against your real time network activity logs and up to a year or more of forensic log data. Anomali’s approach enables detection at every point along the kill chain, making it possible to mitigate threats before material damage to your organization has occurred.To learn more, visit and follow us on Twitter: @anomali.

Speaker Bio: (Check Back Soon)

Topic: Threat Intelligence & Officer Elections

We will also be holding elections for:

  • Vice President
  • Treasurer
  • Secretary

Posted in Uncategorized | Comments Off on Come Join us for our June Meeting: Threat Intelligence & Officer Elections

May Chapter Meeting: Getting Physical with Red Team

Come Join us for our May Meeting: Getting Physical with Red Team

From: 11:30 am to 1:00 pm

As the landscape of cyber security evolves, offensive security has become the tip of spear. The industry is utilizing more advanced offensive security exercises to compete with present day attackers.  Red Teaming is one of those tools in our toolkit that can provide great insight into the true capabilities of an organization to the thwart an attack.  Matt Mosley of Tevora will discuss one of the three elements of Red Team engagements. Matt’s focus will be on the physical aspect of Red Team engagements which involves bypassing physical controls such as locks, gates, badge systems, alarm systems, and security guards with an overview of tools and techniques used today and stories from actual engagements.

Speaker: Matt Mosley

Speaker Bio:

Matt is the Director of Incident Response & Threat Services at Tevora with expertise in penetration testing, development of security intelligence solutions, digital forensics, and incident response. Matt was also former adjunct professor at UCLA, teaching offensive security tools & techniques.

Posted in Uncategorized | Comments Off on May Chapter Meeting: Getting Physical with Red Team

Hackathon, HACKED! good job team

Our March meeting was a 1/2 day Hackathon, with the platform provided by Security Innovation. The event was a great success!

The event was a gamified, safe hacking space. Our first and second place winners went on and fully owned the site! This was outside the initial scope and plan, but was still a safe place to run these exercises.

Alexei and Alex, the 2 winners, wrote up their experience and how they were able to own the entire site. It is a good read, showing the details of their attack. I encourage each of you to read.


Posted in Announcements, Chapter Meetings, Events, News, Training | Comments Off on Hackathon, HACKED! good job team