Chapter Events

AEC v1.0.4



Bring Your Own Identity (BYOI)
Strategies for Organizations and Their Impact


BYOI is the enabling of employees, customers, and constituents to use their own defined identities to access organizational resources and or entitlements.   This trend is being embraced and extended to use individual social media identities.  Organizations that embrace BYOI save on identity management costs as well as enable better directed marketing and communications.   As all new trends, the question must come up ‘Does BYOI come with hidden costs or exposures?’.

This session will discuss the items you need to consider in order to move forward, including:

  • Benefits of BYOI and why?
  • Potential downsides of blending organizational and personal identities? / What is the potential privacy impact of using BYOI?
  • Issues that may arise with the use of non-organizational / personal identities while accessing information and entitlements?
  • What can happen if a social identity is compromised?
  • How can we use BYOI securely?

Guest Speaker:  Michael F. Angelo, CISSP, CRISC, Chief Security Architect for NetIQ.

Michael is well known in the security community with his work designing, developing, implementing and deploying security products and architectures for multi-national corporate environments. His work includes participating, driving, and creating security standards,  working on corporate policies, national and international legislation, and multi-national regulatory issues.


In this month’s workshop, we will review finding and recovering deleted files using the Sleuth Kit for Linux.

Invitations for the monthly meeting will be sent out shortly.  If you are a member of our chapter but do not receive an email invitation for the meeting, please let us know!

Interested in attending one of our monthly meetings but aren’t a member?  Take advantage of the ISSA Guest program!

For more information on what membership in our chapter can offer you, take a moment to check out our Membership page!

NMAP Workshop

While it is normally (very) expensive to acquire this type of training, thanks to the local Kentuckiana ISSA Chapter, this event is available for a donation to a great cause. The class will benefit Johnny Long and his family in their mission to support Hackers for Charity full-time in Uganda, Africa. Hackers for Charity is a non-profit organization that leverages the skills of technologists to solve technology challenges for various non-profits and provide food, equipment, job training and computer education to the world’s poorest citizens.

May 10th, 20149:00 – 4:00 PM

Energy Technology Building
Sullivan College of Technology & Design
3903 Atkinson Square Drive
Louisville, KY 40218

The cost of the event is a $40.00 donation made directly to the Long family in support of their “Long Journey” to Africa. Please bring your receipt of payment to the event. In order to make your donation please attend to the following:
1) Please browse to Hackers For Charity.
2) Locate the “Donate” button under the label “Make a one-time donation directly to the Long family”
  a) The button overlays a picture of giraffes on the savanna.
  b) The button is located left of center, slightly down from the top of the page.
3) Click this “Donate” which will redirect to the “Hackers for Charity” PayPal page.
4) The PayPal page will show “Long Journey One-Time Donation” under the heading of “Purpose”.
5) In the donation amount box, donate $40.00 (or more) directly to the Long Family.
6) PayPal will issue a receipt for the donation which is the ticket to the event.
7) Please bring the PayPal receipt to the event and present as your ticket.
8) Note that donations to the Long Family may be tax deductible in your state and/or country. Consider printing a copy of the PayPal receipt in order to take the tax deduction. (Standard disclaimer (of course)): Note carefully the event and the ISSA are not offering tax advice. Please consult a qualified tax expert for advice. Please see helpful tax deduction information located at

Martin “Pure Hate” Bos (@purehate_) works as a penetration tester for Accuvant Inc. and is a core developer of Backtrack- and Kali-Linux. Additionally he is a co-Founder of, a website dedicated to answering technical questions daily with the largest online WPA Cracking service on the web, and one of the founders of DerbyCon, a hacker con located in Louisville, Kentucky. He resides in Louisville, KY with his wife, Kim and their daughter.
Adrian “Irongeek” Crenshaw (@irongeek_adc) has worked in the IT industry for the last seventeen years. He runs the information security website, which specializes in videos and articles that illustrate how to use various pen-testing and security tools. He holds a Master of Science in Security Informatics, works for TrustedSec as a Senior Security Consultant and is one of the co-founders of Derbycon.

Jeremy Druin (@webpwnized) is a certified application, web, and network security pen-tester for a multi-national transportation logistics company. Additionally Jeremy is the developer of the open-source OWASP Mutillidae II training system and acts as the Director of Education for Kentuckiana ISSA chapter while authoring the Webpwnized YouTube Channel. Jeremy holds a Bachelors in Computer Science from Indiana University, Associates in Database, Associates in Science and is a GIAC-certified Advanced Network, Web Application Pen-Tester and Exploit Developer.