Next ISSA Quarterly Meeting – May 15th

Maggiano’s Little Italy – The RIM 17603 I-10, San Antonio, TX 78257 Noon until 4:30 PM

Next ISSA Quarterly Meeting – May 15th – CyberArk


Maggiano’s Little Italy – The RIM 17603 I-10, San Antonio, TX 78257 Noon until 4:30 PM

Save the date!


11th Annual InnoTech San Antonio – April 11-12


InnoTech San Antonio – April 11-12, 2018

The Norris Conference Center is conveniently located near the San Antonio International Airport on Loop 410 and San Pedro in the Park North Center.

Visit for all the details.

Complimentary Registration Details
Current members of the Alamo ISSA Chapter will receive an email with complimentary admission to InnoTech San Antonio. This includes access to all InnoTech sessions, the exhibit hall for networking, lunch for the first 100 people in line, the Happy 45-Minute reception and more.

BSidesSATX 2018 – Saturday, June 16, 2018

St. Mary’s University

Call for Papers Open and they are looking for volunteers!  Sign Up!


Benefits of attending Alamo ISSA Quarterly Meetings:

  • All of the Alamo ISSA Quarterly Meetings give you the opportunity to earn 3 CPE’s toward your certifications.
  • Network with other information security professionals in the area.
  • Lunch is included with your ticket.
  • After the meeting, a mixer will be held until 6:30 PM in Maggiano’s Bar area.


February 20th meeting notes

Christopher Walcutt, CISM, CISSP
Title: Not-So-Smart Grid
Abstract: Smart grid owners must provide innovative, resilient solutions that encourage widespread use of IoT devices and applications while meeting security and compliance mandates. Changing regulatory standards, the security practices of third-party vendors, affiliated utility companies, and network owners all stand in the way of achieving this. This presentation will discuss security and resiliency considerations.

Alan Orlikoski
Title: Using Open Source Tools to Solve New DFIR Challenges
Abstract: The technology in business is always changing and thereby constantly creating new and interesting challenges for all Digital Forensics and Incident Response (DFIR) teams. This is seen in stunning details as companies are migrating to non-Windows and Cloud environments for virtualization and data storage. These migrations have made the current generation of IR Tools, Techniques and Procedures (TTP) either sub-optimal and/or obsolete.

Scott Parker
Title: Living off the land
Abstract: Attackers are increasingly making use of tools already installed on targeted computers or are running simple scripts and shellcode directly in memory. Creating less new files on the hard disk means less chance of being detected by traditional security tools and therefore minimizes the risk of an attack being blocked. The four main categories of living off the land and fileless attack techniques are memory-only threats, fileless persistence, dual-use tools, and non-PE file attacks.