<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>gt.issa.org &#8211; an Information System Security Association Chapter</title>
	<atom:link href="https://gt.issa.org/feed/" rel="self" type="application/rss+xml" />
	<link>https://gt.issa.org</link>
	<description>Traverse City, MI - ISSA Chapter</description>
	<lastBuildDate>Wed, 12 Nov 2025 23:16:31 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	
	<item>
		<title>November 18, 2025 &#8211; Netskope Happy Hour</title>
		<link>https://gt.issa.org/november-18-2025-netskope-happy-hour/</link>
		
		<dc:creator><![CDATA[jlsimpson]]></dc:creator>
		<pubDate>Wed, 12 Nov 2025 23:16:29 +0000</pubDate>
				<category><![CDATA[Upcoming Event]]></category>
		<guid isPermaLink="false">https://gt.issa.org/?p=895</guid>

					<description><![CDATA[Due to the format and limited capacity (25 attendees), we’re prioritizing registration for professionals currently working in the field to ensure our sponsor’s presentation from Netskope delivers maximum value. We kindly ask that student members hold off on registering for this one and join us at our next chapter meeting in December. This will be [&#8230;]]]></description>
										<content:encoded><![CDATA[
<p>Due to the format and limited capacity (25 attendees), we’re prioritizing registration for professionals currently working in the field to ensure our sponsor’s presentation from Netskope delivers maximum value. We kindly ask that student members hold off on registering for this one and join us at our next chapter meeting in December.<br><br>This will be an intimate evening designed to bring together cybersecurity professionals for meaningful conversation and connection, complemented by great food and drinks in one of Traverse City’s most elegant venues. We’re thrilled to have Netskope hosting, and we can’t wait to see you there. Seats are limited to just 25, so don’t wait. Secure your spot today and join us for a fantastic kickoff to the new ISSA season!&nbsp;</p>



<p>Registration link:  <a href="https://www.eventbrite.com/e/gt-issa-social-mixer-tickets-1957059871759?aff=oddtdtcreator">https://www.eventbrite.com/e/gt-issa-social-mixer-tickets-1957059871759?aff=oddtdtcreator</a></p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>January 29, 2025 – Mastering Fabric: Bring the Power of LLMs to the Command Line</title>
		<link>https://gt.issa.org/january-29-2025-mastering-fabric-bring-the-power-of-llms-to-the-command-line/</link>
		
		<dc:creator><![CDATA[jlsimpson]]></dc:creator>
		<pubDate>Sat, 11 Jan 2025 01:36:29 +0000</pubDate>
				<category><![CDATA[Past Event]]></category>
		<guid isPermaLink="false">https://gt.issa.org/?p=875</guid>

					<description><![CDATA[Chapter member Kenneth G. Hartman has offered to guide our group through a hands-on workshop &#8220;Mastering Fabric: Bring the Power of LLMs to the Command Line&#8221;. Fabric is an open-source framework for augmenting humans using AI.&#160;&#160; We&#8217;re hopeful you can join us for the session on Wednesday, January 29 at 6:00pm.&#160; We will meet in [&#8230;]]]></description>
										<content:encoded><![CDATA[


<p>Chapter member Kenneth G. Hartman has offered to guide our group through a hands-on workshop &#8220;Mastering Fabric: Bring the Power of LLMs to the Command Line&#8221;. Fabric is an open-source framework for augmenting humans using AI.&nbsp;&nbsp;</p>



<p>We&#8217;re hopeful you can join us for the session on Wednesday, January 29 at 6:00pm.&nbsp; We will meet in person at the TBA Credit Union on Front St. in Traverse City.</p>



<p>Kenneth G. Hartman is an independent security consultant based in Traverse City, Michigan. Ken’s motto is “I help my clients earn and maintain the trust of their customers in its products and services.” Toward this end, he consults on a comprehensive program portfolio of technical security initiatives focused on securing client data in the public cloud. Ken has worked for a variety of Cloud Service Providers in Architecture, Engineering, Compliance, and Security Product Management roles.</p>



<p>As a SANS Certified Instructor for SEC488: Cloud Security Essentials and SEC510: Public Cloud Security: AWS, Azure, &amp; GCP, Ken has also been the co-chair of the 2019 SANS Cloud Security Operations Solutions Forum, the 2019 and 2020 SANS Cloud &amp; DevOps Security Summits.</p>



<p>For the previous decade, up until July 2011, he helped to build a start-up company called Visonex into a profitable, nation-wide dialysis-specific electronic medical record using a software-as-a-service (SaaS) business model. In addition to managing the inception and delivery of multiple product innovations, Ken was responsible for all aspects of assuring the security and privacy of both the internal IT systems and the company’s SaaS offerings. Prior to helping launch Visonex, Ken worked as a corporate Electrical Systems Manager for Kraft Foods where he helped to secure the plant floor automation systems.</p>



<p>Ken holds a BS Electrical Engineering from Michigan Technological University and a Master’s Degree in Information Security Engineering from SANS Technology Institute. Ken has earned the CISSP, as well as multiple GIAC security certifications, including the GIAC Security Expert.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Join Us November 13th, 2024 for Adversarial AI &#8211; Lying Chatbots, Deep Fakes… </title>
		<link>https://gt.issa.org/join-us-november-13th-2024-for-adversarial-ai-lying-chatbots-deep-fakes/</link>
		
		<dc:creator><![CDATA[jlsimpson]]></dc:creator>
		<pubDate>Wed, 23 Oct 2024 11:02:31 +0000</pubDate>
				<category><![CDATA[Past Event]]></category>
		<guid isPermaLink="false">https://gt.issa.org/?p=828</guid>

					<description><![CDATA[Register to join the GT ISSA chapter and special guest speaker Jeff Crume to explore the potential dangers of adversarial AI, lying chatbots, and deep fakes. We’ll discuss how these technologies are becoming more sophisticated and how they can be used to deceive people, spread disinformation, and even cause harm. Through real-world examples and demonstrations, [&#8230;]]]></description>
										<content:encoded><![CDATA[
<p></p>



<p><a href="https://www.eventbrite.com/e/grand-traverse-issa-november-meeting-tickets-1055873509089">Register</a> to join the GT ISSA chapter and special guest speaker Jeff Crume to explore the potential dangers of adversarial AI, lying chatbots, and deep fakes.</p>



<p>We’ll discuss how these technologies are becoming more sophisticated and how they can be used to deceive people, spread disinformation, and even cause harm. Through real-world examples and demonstrations, let’s explore the implications of these technologies for society in order to gain a better understanding of these emerging technologies and the risks they pose.</p>



<p>Through real-world examples and demonstrations, we will explore the implications of these technologies for society in order to gain a better understanding of these emerging technologies and the risks they pose.</p>



<p>Jeff Crume is an IBM Distinguished Engineer and Master Inventor with more than 40 years’ experience in the IT industry. He has a PhD in Cybersecurity and also serves as an Adjunct Professor at NC State University. Jeff’s YouTube videos have been viewed more than 6 million times and he is the author of a book entitled &#8220;Inside Internet Security: What Hackers Don&#8217;t Want You To Know” as well as a contributing author to the &#8220;Information Security Management Handbook.” He is a member of the inaugural class of the NC State University Computer Science Alumni Hall of Fame and serves on the editorial board for the “Information and Computer Security” research journal. Jeff lived in Beijing on assignment in 2006 and has worked with clients in 50 countries.</p>



<p>We look forward to seeing you there.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Happy Hour April 20, 2023</title>
		<link>https://gt.issa.org/happy-hour-april-20/</link>
		
		<dc:creator><![CDATA[Salina Olmsted]]></dc:creator>
		<pubDate>Mon, 03 Apr 2023 23:06:00 +0000</pubDate>
				<category><![CDATA[Past Event]]></category>
		<guid isPermaLink="false">https://gt.issa.org/?p=798</guid>

					<description><![CDATA[Join us for an evening of networking at The Filling Station Brewery sponsored by Abnormal Security. Please register at https://www.eventbrite.com/e/grand-traverse-issa-happy-hour-tickets-591891853467 We look forward to seeing you there.]]></description>
										<content:encoded><![CDATA[
<p>Join us for an evening of networking at The Filling Station Brewery sponsored by Abnormal Security.</p>



<p>Please register at <a href="https://www.eventbrite.com/e/grand-traverse-issa-happy-hour-tickets-591891853467">https://www.eventbrite.com/e/grand-traverse-issa-happy-hour-tickets-591891853467</a></p>



<p>We look forward to seeing you there.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>November 17, 2022 Meeting</title>
		<link>https://gt.issa.org/november-17-meeting/</link>
		
		<dc:creator><![CDATA[Salina Olmsted]]></dc:creator>
		<pubDate>Thu, 20 Oct 2022 01:55:38 +0000</pubDate>
				<category><![CDATA[Past Event]]></category>
		<guid isPermaLink="false">https://gt.issa.org/?p=778</guid>

					<description><![CDATA[Join us for our November Chapter Meeting. Kenneth G. Hartman will be our guest speaker. Register to attend on Eventbrite: https://www.eventbrite.com/e/grand-traverse-issa-november-meeting-tickets-444909725967 ABSTRACT More than ever, companies are using more of the cloud. They are using more different services from each cloud service provider and more cloud service providers than ever before. However, this migration to [&#8230;]]]></description>
										<content:encoded><![CDATA[
<p>Join us for our November Chapter Meeting.  Kenneth G. Hartman will be our guest speaker.  </p>



<p>Register to attend on Eventbrite: <a rel="noreferrer noopener" href="https://www.eventbrite.com/e/grand-traverse-issa-november-meeting-tickets-444909725967" target="_blank">https://www.eventbrite.com/e/grand-traverse-issa-november-meeting-tickets-444909725967</a></p>



<p>ABSTRACT</p>



<p>More than ever, companies are using more of the cloud. They are using more different services from each cloud service provider and more cloud service providers than ever before. However, this migration to the cloud is fraught with peril. The media is full of examples of companies who got it wrong. The default configuration of most cloud services is insecure, primarily to empower exploration by new users. Before an organization can responsibly store sensitive data in the cloud, it must ensure the environment is adequately secured. Can the cloud be made secure enough? Where does one start with this herculean task? I believe that you can, indeed, be more secure in the cloud. This keynote presentation will cover some of the foundational cloud security practices that leading companies have leveraged to provide a very high level of security assurance. We will cover how to get started on this cloud security journey and then how to take it out of the stratosphere</p>



<p>BIO</p>



<p>Kenneth G. Hartman is an independent security consultant based in Traverse City, Michigan. Ken’s motto is “I help my clients earn and maintain the trust of their customers in its products and services.” Toward this end, he consults on a comprehensive program portfolio of technical security initiatives focused on securing client data in the public cloud. Ken has worked for a variety of Cloud Service Providers in Architecture, Engineering, Compliance, and Security Product Management roles.</p>



<p>As a SANS Certified Instructor for SEC488: Cloud Security Essentials and SEC510: Public Cloud Security: AWS, Azure, &amp; GCP, Ken has also been the co-chair of the 2019 SANS Cloud Security Operations Solutions Forum, the 2019 and 2020 SANS Cloud &amp; DevOps Security Summits.</p>



<p>For the previous decade, up until July 2011, he helped to build a start-up company called Visonex into a profitable, nation-wide dialysis-specific electronic medical record using a software-as-a-service (SaaS) business model. In addition to managing the inception and delivery of multiple product innovations, Ken was responsible for all aspects of assuring the security and privacy of both the internal IT systems and the company’s SaaS offerings. Prior to helping launch Visonex, Ken worked as a corporate Electrical Systems Manager for Kraft Foods where he helped to secure the plant floor automation systems.</p>



<p>Ken holds a BS Electrical Engineering from Michigan Technological University and a Master’s Degree in Information Security Engineering from SANS Technology Institute. Ken has earned the CISSP, as well as multiple GIAC security certifications, including the GIAC Security Expert.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Happy Hour June 9, 2022</title>
		<link>https://gt.issa.org/happy-hour-june-9/</link>
		
		<dc:creator><![CDATA[Salina Olmsted]]></dc:creator>
		<pubDate>Wed, 01 Jun 2022 22:00:55 +0000</pubDate>
				<category><![CDATA[Past Event]]></category>
		<guid isPermaLink="false">https://gt.issa.org/?p=767</guid>

					<description><![CDATA[Join us for an evening of networking at The Filling Station Brewery sponsored by Netskope. Please register at events.netskope.com/grandtraverseissahappyhour. We look forward to seeing you there.]]></description>
										<content:encoded><![CDATA[
<p>Join us for an evening of networking at The Filling Station Brewery sponsored by Netskope.</p>



<p>Please register at <a rel="noreferrer noopener" href="http://events.netskope.com/grandtraverseissahappyhour" target="_blank">events.netskope.com/grandtraverseissahappyhour</a>.</p>



<p>We look forward to seeing you there.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>December 16, 2021 Virtual Meeting</title>
		<link>https://gt.issa.org/december-17-virtual-meeting-2/</link>
		
		<dc:creator><![CDATA[Salina Olmsted]]></dc:creator>
		<pubDate>Fri, 03 Dec 2021 21:46:52 +0000</pubDate>
				<category><![CDATA[Past Event]]></category>
		<guid isPermaLink="false">https://gt.issa.org/?p=765</guid>

					<description><![CDATA[Dan Gregory, VP of Systems Engineering at CBI, will be our guest speaker. The topic will be Zero Trust Network Access. Use the link below to register on Eventbrite and access the meeting space. https://www.eventbrite.com/e/grand-traverse-issa-december-meeting-tickets-221122843377]]></description>
										<content:encoded><![CDATA[
<p>Dan Gregory, VP of Systems Engineering at CBI, will be our guest speaker.  The topic will be Zero Trust Network Access.  Use the link below to register on Eventbrite and access the meeting space.</p>



<p><a href="https://www.eventbrite.com/e/grand-traverse-issa-december-meeting-tickets-221122843377">https://www.eventbrite.com/e/grand-traverse-issa-december-meeting-tickets-221122843377</a></p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>January 21st, 2021 Virtual Meeting</title>
		<link>https://gt.issa.org/january-21st-2021-virtual-meeting/</link>
		
		<dc:creator><![CDATA[Salina Olmsted]]></dc:creator>
		<pubDate>Sun, 01 Nov 2020 17:55:53 +0000</pubDate>
				<category><![CDATA[Past Event]]></category>
		<guid isPermaLink="false">https://gt.issa.org/?p=704</guid>

					<description><![CDATA[Mark your calendars for our first meeting of the new year. Rebecca Herold, CEO of The Privacy Professor consultancy; CEO of Privacy &#38; Security Brainiacs, will be our guest speaker. Remember to register on Eventbrite for quick and easy access to the virtual meeting space. Rebecca will present &#8220;Will Your Office Coffeemaker Bring Down Your Business? [&#8230;]]]></description>
										<content:encoded><![CDATA[
<p>Mark your calendars for our first meeting of the new year.  Rebecca Herold, CEO of The Privacy Professor consultancy; CEO of Privacy &amp; Security Brainiacs, will be our guest speaker.   Remember to register on<a href="https://www.eventbrite.com/e/grand-traverse-issa-january-meeting-tickets-135442160147"> Eventbrite</a> for quick and easy access to the virtual meeting space.</p>



<p>Rebecca will present &#8220;<strong><em>Will Your Office Coffeemaker Bring Down Your Business? Preventing IoT Cybersecurity and Privacy Nightmares</em></strong>&#8220;.</p>



<p>New smart technologies are rapidly entering the consumer and business markets, creating new and exciting services, along with new challenges for cybersecurity and privacy professionals. For example, huge amounts of patient data are collected and stored within bio-med devices. Smart toys and digital personal assistants collect, analyze and share data that reveals more about those in associated homes than the home occupants even know about themselves. The smart grid is attaching homes with utilities, smart appliance vendors, PEV owners and others to gain insights into living experiences. Consumers are now walking cash registers, paying for goods by simply being in the vicinity of payment systems. Smart cars and streets transmit data about location, driving habits, and the individuals who are associated. Retailers track the movements of shoppers while digital billboards and mannequins interact with consumers. Drones are live-streaming images within the airspaces where they fly. Vast amounts of data are automatically uploaded to social media sites and cloud servers, where marketing, research and other types of organizations are gobbling it up to data crunch with other data sources to produce vast amounts of new insights into the lives of consumers, patients, along with potential terrorists and crime suspects. Add to this consideration that new smart devices are built to be ubiquitous and unnoticeable.</p>



<p>What are the associated security and privacy risks? Rebecca will offer attendees some cybersecurity and privacy considerations for whenever their organizations ponder the use of IoT devices, as well as when trying to figure out if IoT devices are already within their digital environment. She will also offer some key questions to ask about the use of IoT devices to understand the associated risks, and point to useful resources for identifying requirements for IoT device cybersecurity and privacy risk controls. </p>



<p>Rebecca is founder (2004) and CEO of The Privacy Professor consultancy and CEO of the Privacy Security Brainiacs SaaS services business she founded in 2020 with her son Noah, with over 25 years of systems engineering, information security, privacy &amp; compliance experience. Rebecca has authored 20 books, just finishing the 20th published by CRC Press titled, “Security &amp; Privacy when Working from Home &amp; Travelling.” She has also written dozens of book chapters and hundreds of articles, and has received numerous awards, including being a top 3 Cybersecurity &amp; Privacy Woman Law Professional of 2020, and being named a top female fighting cybercrime in 2019. Rebecca has her own radio/podcast show, Data Security and Privacy with the Privacy Professor on Voice America. Rebecca also serves as an expert witness and has keynoted on 5 continents. Rebecca is a subject matter expert (SME) in the NIST Cybersecurity for IoT Program team, prior to that was a SME member of the NIST Privacy Framework team for 1 ½ years, and led the NIST Smart Grid privacy team for 8 years. Rebecca was Adjunct Professor for the Norwich University MSISA program for 9 years. Rebecca has earned 11 professional certifications (FIP, CDPSE, CISSP, CIPP/US, CIPT, CIPM, CISM, CISA, FLMI, Ponemon Institute Fellow). Rebecca has Masters and Bachelors degrees in Computer Science, Mathematics and Education, and lives in Des Moines, Iowa, USA. </p>



<p>For more information about Rebecca’s career see https://www.linkedin.com/in/rebeccaherold/. rebeccaherold@rebeccaherold.com. www.privacysecuritybrainiacs.com www.privacyguidance.com </p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>December 17, 2020 Virtual Meeting</title>
		<link>https://gt.issa.org/december-17-virtual-meeting/</link>
		
		<dc:creator><![CDATA[Salina Olmsted]]></dc:creator>
		<pubDate>Sun, 04 Oct 2020 20:27:26 +0000</pubDate>
				<category><![CDATA[Past Event]]></category>
		<guid isPermaLink="false">https://gt.issa.org/?p=701</guid>

					<description><![CDATA[Chris Roberts discussed current events and how the Information Security community can do better. ISSA Chapter members can access a recording of the presentation.]]></description>
										<content:encoded><![CDATA[
<p>Chris Roberts discussed current events and how the Information Security community can do better.  ISSA Chapter members can access a recording of the presentation.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>October 22nd, 2020 Virtual Meeting</title>
		<link>https://gt.issa.org/october-22nd-virtual-meeting/</link>
		
		<dc:creator><![CDATA[Salina Olmsted]]></dc:creator>
		<pubDate>Sun, 04 Oct 2020 20:24:38 +0000</pubDate>
				<category><![CDATA[Past Event]]></category>
		<guid isPermaLink="false">https://gt.issa.org/?p=699</guid>

					<description><![CDATA[For our October meeting J. Wolfgang Goerlich, Advisory CISO for Duo Security, presented &#8220;Zero Trust; Past, Present, Future&#8221;. &#8220;Data breaches grab headlines. Good security is steady. While many industries have adopted zero-trust strategies to address challenges of the expanded perimeter, many have been wary of this trend and questioned if it is a fit for [&#8230;]]]></description>
										<content:encoded><![CDATA[
<p>For our October meeting J. Wolfgang Goerlich, Advisory CISO for <a href="https://duo.com/">Duo Security</a>, presented &#8220;Zero Trust; Past, Present, Future&#8221;.</p>



<p>&#8220;Data breaches grab headlines. Good security is steady. While many industries have adopted zero-trust strategies to address challenges of the expanded perimeter, many have been wary of this trend and questioned if it is a fit for environments. As this session will cover, new strategies remain firmly rooted in tried-and-true best practices admins have followed for decades. The principles of logical segmentation, least-permissive access, economy of mechanism, adaptive policy controls, and strong authentication are simply evolving to accommodate new use cases rather than being replaced. Join this session for a grounded discussion of the unique needs and concerns for IT and IT Security teams based on real-world examples, and how concepts like device trust and context-aware access can improve security design without leaving crucial inherited or legacy systems out in the cold.&#8221;</p>



<p>Prior to his role at Duo Security, Wolfgang led IT and IT security in the healthcare and financial services verticals. He has held VP positions at several consulting firms, leading advisory and assessment practices.</p>



<p>You can follow him on YouTube for more insight on the future of information security. </p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
