Print Page   |   Contact Us   |   Report Abuse   |   Sign In   |   Register
Raleigh ISSA April 7, 2016 Chapter Meeting
Tell a Friend About This EventTell a Friend
 

Please RSVP today! Don't miss out!

4/7/2016
When: Thursday Evening @ RTP Center
5:15 PM
Where: RTP Headquarters/Conference Center
12 Davis Drive
Research Triangle Park, North Carolina  27709
United States
Contact: Raleigh ISSA voting board


Online registration is closed.
« Go to Upcoming Event List  

 

Raleigh ISSA April 7, 2016 Chapter Meeting


Meeting Sponsor:  

 AGENDA

5:15 – 6:00pm Career Services (Conference Room 1)

5:15 – 6:00pm CISSP Study Group (Conference Room 2)

5:15 – 6:00pm Back-to-Basics (Main Room)  Kali linux Review - Wayne Williams and Joshua Rahman

6:00 – 6:30pm Backyard BBQ / Drink / Socializing (Lobby)

6:30 – 7:00pm Vendor Presentation (Main Room) - Clearswift

7:00 – 7:15pm Board Updates (Main Room)

7:15 – 8:15pm Main Presentation (Main Room) Volatility - Micah Bushouse


B2B 5:15-6PM

TOPIC: Kali linux Review

SPEAKERS: Wayne Williams and Joshua Rahman


Main Presentation 7:15 - 8:15 PM

Speaker:  Micah Bushouse

Speaker Bio:

Micah Bushouse is a Ph.D. student in the WSPR Laboratory at NC State University’s Department of Computer Science. His research interests under Dr. Douglas Reeves include cloud computing and network security. He comes from a telecommunications background, and received his Bachelor’s and Master’s in this field from Michigan State University in 2004 and 2006. Micah is an active duty Army officer who attends NC State under the Army’s Advanced Civil Schooling program.

Presentation Topic:

Having access to a system’s active memory is important for computer forensics technicians or malware analysts.  To this end, we will discuss Volatility, a popular tool used to conduct memory analysis, as well as its use when combined with Virtual Machine Inspection (VMI).  These tools allow us to transparently analyze a virtual machine’s memory while the machine is running.  This session will begin with the basic concepts behind virtualization, virtual machine introspection, and memory analysis, and will conclude with a group exercise where the class uses these tools to extract data from a virtual machine.


Community Search
Sign In


Forgot your password?

Haven't registered yet?

Calendar

9/26/2016
Secure360-Wisconsin

9/29/2016
Healthcare SIG Webinar: Use of Cloud Services in the Healthcare Industry

10/6/2016
WOMEN CYBER SECURITY PROFESSIONALS LUNCH AND LEARN

10/7/2016
2016 Cyber Security Conference - Cyber Threat Intelligence




Copyright © 2016, Information Systems Security Association, All Rights Reserved
Privacy PolicyCopyright Information