IT Vendor Expo at Department of State – 2/7

ROCKVILLE, MD\\\ ISM will be exhibiting with our partner, Rapid7, at the FBC hosted event at the U.S. Department of State.

Date: February 7, 2018

Location: 2201 C St NW, Washington, DC 20520


About Rapid7

Rapid7’s mission is to lead the emerging SecOps movement with our multi-product analytics and automation cloud and expertise.


Pittsburgh Chapter of ISSA December Meeting – 12/8/17

Come network and earn CPE credits at the final ISSA Pittsburgh Chapter meeting of the year on Friday, December 8, 2017.  ISM’s very own, Gary Johnson, Director, Cyber Solution and Engineering, will be presenting on The Next Generation of Endpoint Protection.

Presentation Synopsis

The Next Generation of Endpoint Protection- In 2017, AV-TEST registered over 250,000 new malware samples every day. This rapid growth in malware samples has grown their database to over 700,000,000 unique malware samples. As the number of malware samples have increased, so has the number of devices connected to the Internet. This proliferation of malware combined with a drastic increase in the number of devices connected to the Internet have created a need for a different approach to endpoint protection.

In this presentation, we will take a look at the evolution of endpoint protection solutions, compare the approach various vendors have taken to combat the latest threat and make a few predictions on what the next generation of endpoint protection will need to combat the growing threat.


There will be 2 CPE given to attendees of the lunch meetings.

Registration will begin at 10:30 am, first presentation starts at 11:00 am.

Meeting location: The Gulf Tower; Gulf Theater. 707 Grant Street on the 3rd floor.

Cost: $10 for members of AITP, ARMA, InfraGard, ISACA, ISC2, ISSA, OWASP, Steel City InfoSec and TRCPA with advance registration
$15 for non-members with advance registration
$5 for students with advance registration

To register in advance for this meeting contact Mike Sotace at

Deadline for advance registration is TBD, there is an extra $5.00 charge for registration after this date.


ISSA Mid-Atlantic Information Security Conference – 3/10

Join us for a full day of training by industry leaders discussing some of the latest topics in tactics and techniques for preparing for cyber-attacks. This conference will feature a variety of presentations and cutting edge training opportunities, including hands-on demonstrations and workshops.

About ISSA
Developing and Connecting Cybersecurity Leaders Globally.

The Information Systems Security Association (ISSA)® is the community of choice for international cybersecurity professionals dedicated to advancing individual growth, managing technology risk and protecting critical information and infrastructure.

ISSA is a not-for-profit, international organization of information security professionals and practitioners. It provides educational forums, publications, and peer interaction opportunities that enhance the knowledge, skill, and professional growth of its members.

The primary goal of the ISSA is to promote management practices that will ensure the confidentiality, integrity, and availability of information resources. The ISSA facilitates interaction and education to create a more successful environment for global information systems security and for the professionals involved. Members include practitioners at all levels of the security field in a broad range of industries such as communications, education, healthcare, manufacturing, financial, and government.

Click on the following link to register by March 9th:

**CEUs/CPEs certificates will be sent out via email after the conference to those who attended the sessions.

IT Vendor Expo at Department of State – 3/2

IT Vendor Expo at Department of State

Location: Washington, DC

Date: March 2, 2017

Time: 9:30 – 1:00

You’re Invited!


All Department of State personnel and contractors are invited to this one-day event where you will have the opportunity to view and demo some of the latest IT products and services available in today’s marketplace which are designed to support the workforce and all IT-focused personnel.


Products and Services on Display
Our company will be on-site showcasing our newest products and services, including:



Registration Information

All personnel are invited to attend this expo at no cost.
Learn more about which companies will be exhibiting and save a minute at the door by pre-registering at!


Featured Exhibitor



7th Annual Billington CyberSecurity Summit – September 13, 2016

ISM would like to invite you to join over 600 senior attendees, more than 50 speakers, and countless sponsors and exhibitors at the 7th Annual Billington CyberSecurity Summit, the leading fall forum on cybersecurity in the Nation’s Capital.

Admiral Michael Rogers, Commander, U.S. Cyber Command and Director, NSA, joins 25+ Top Cybersecurity Experts to tackle the tough issues of cybersecurity and discuss where we are headed next.


Venue: Ronald Reagan Building & International Trade Center

1300 Pennsylvania Avenue NW

Washington, DC 20004


Date: Tuesday September 13th 2016


Agenda and Registration Information [<–Click Here][.gov & .mil attend for free]


•  Admiral Michael Rogers, Commander, U.S. Cyber Command, Director, NSA/Chief, CSS
•  Tony Scott, Federal CIO, Admin. for E-Government and Info. Technology, OMB (invited)
•  Dr. Eviatar Matania, Head of the National Cyber Directorate, Prime Minister’s Office, Israel
•  Aaron Hughes, Deputy Assistant Secretary of Defense for Cyber Policy, DOD
•  James Trainor, Assistant Director, Cyber Division, Federal Bureau of Investigation
•  Andy Ozment, Assistant Secretary for Cybersecurity and Communications, DHS
•  Donna F. Dodson, Chief Cybersecurity Advisor, NIST and Director, NCCOE, NIST
•  Brigadier General (ret.) Gregory Touhill, Deputy Assistant Secretary, CS&C, DHS
•  Ciaran Martin, CEO, National Cyber Security Centre, GCHQ, U.K.
•  Richard Hale, Deputy CIO for Cyber Security, Department of Defense
•  Sanjeev “Sonny” Bhagowalia, Deputy Assistant Secretary for Information Systems and CIO, Department of the Treasury
•  Michael Daniel, Cybersecurity Coordinator, The White House
•  Major General Paul Nakasone, Commander, Cyber National Mission Force, U.S. Cyber Command
•  Major General Christopher P. Weggeman, Commander, Twenty-fourth Air Force and Commander, Air Forces Cyber (AFCYBER)

  • Major General Loretta E. Reynolds, Commander, U.S. Marine Corps Cyberspace Command (invited)
    •  Neal Ziring, Technical Director, IAD, National Security Agency



  • Kevin Mandia, CEO and Board Director, FireEye
    •  John Scimone, SVP and Global Chief Information Security Officer, Sony Corporation
    •  Jeffrey Massimilla, Chief Product Cybersecurity Officer, General Motors Company
    •  Dr. Michael Papay, Vice President and CISO, Northrop Grumman
    •  Thomas K. Billington, Founder and Chairman, Billington CyberSecurity
    •  Maj. Gen. (Ret.) USAF Earl Matthews, Vice President, Enterprise Security Solutions, Hewlett Packard Enterprise
    •  John Worrall, Chief Marketing Officer, CyberArk
    •  Kiersten Todt, Executive Director, Presidential Commission on Enhancing National Cybersecurity
    •  Malcolm Harkins, Global CISO, Cylance
    •  Karen Evans, Co-Chair, CSIS Cyber Policy Taskforce
    •  Deborah Golden, Principal, Federal Cyber Risk Services Leader, Deloitte & Touche LLP
    •  Michael Brown, Rear Admiral, United States Navy (Retired), Vice President and General Manager, Global Public Sector, RSA
    •  Andy Zembower, Sr. Director-Operations, Cyber and Intel Solutions Division, General Dynamics Mission Systems
    •  Steven Grossman, VP, Program Management, Bay Dynamics
    •  Mark McLaughlin, Chairman, President, and CEO, Palo Alto Networks
    •  Michael Daly, Chief Technology Officer, Raytheon Cybersecurity and Special Missions



2016 Washington DC Tech-Security Conference – 9/1


SEPTEMBER 1 @ 8:00 AM5:00 PM


September 1
8:00 am – 5:00 pm


Embassy Suites by Hilton Washington D.C. Convention Center
900 10th Street NW
Washington, DC 20001 United States
+ Google Map


The Washington, D.C. Tech-Security Conference features 40-60 vendor exhibits and 8-12 educational speaker sessions discussing current tech-security issues such as cloud security, email and social media security, VoIP, LAN security, wireless security, USB drives security & more. Numerous door prizes such as iPads, Kindles, $25, $50 and $100 gift cards and lots more! You’ll come away with advice and knowledge so you can start proactively protecting your environment from the latest security breaches.  Your registration will include your breakfast, lunch, conference materials and entrance into the conference sessions and exhibit area. THIS CONFERENCE QUALIFIES FOR CPE CREDITS. Scroll down to view the full conference agenda.

For information on participating as a vendor:

2016 Pittsburgh Tech-Security Conference – 8/4

**2016 Pittsburgh Tech-Security Conference**


Place:        DoubleTree by Hilton Hotel & Suites Pittsburgh- Downtown

1 Bigelow Square

Pittsburgh, PA 15219


Date:        Thursday, August 4th, 2016



Click on the following link to register for your free VIP pass:


  • VIP passes include Breakfast, Lunch, Conference materials and Entrance into conference sessions and exhibit areas.


  • This conference qualifies for CPE credits and Certificates of Attendance.


  • Gift Cards, iPads, Kindles and many other door prizes and give aways.


  • Featuring (11) IT Security speakers and over 30 exhibits!!


For full conference agenda click on:

Or call Stephanie Lange at 636-778-9495 for more information.

Highlight: The NIST Cybersecurity Framework

Managing cybersecurity threats in today’s enterprise is a complex undertaking. Cyber threats are evolving at a rapid pace and they require a different approach than we have utilized in the past to neutralize traditional threats. Unfortunately, there is no “one size fits all” solution when it comes to cybersecurity. However, there are excellent frameworks that can be utilized to manage cybersecurity activities and reducing organizational risk. The NIST Cybersecurity Framework has become quite useful for many organizations as they look to mature their cybersecurity practice and combat the ever evolving threats that we face.


In 2014, NIST published the Framework for Improving Critical Infrastructure Cybersecurity, commonly referred to as the NIST Cybersecurity Framework or just the Framework. The Framework consisted of standards, methodologies, best practices, policies, and procedures that align business goals, policy, and technological approaches improve cybersecurity capabilities within an organization.


The Framework is broken into three sections: the Core, the Implementation Tiers, and the Profiles. The core includes categories and subcategories that define controls and activities across five functional areas: Identify, Detect, Protect, Respond, and Recover. The Implementation Tiers helps the organization evaluate their cybersecurity practices against the characteristics listed in the core functions. Finally, the Profiles enables an organization to understand their current capabilities and define their optimal capability state based on their business goals and objectives.


In December of 2015, NIST received RFI responses from participants within the United States and abroad. The participating respondents represented a variety of industries covering both the public and private sectors. The RFI was followed up with a Working Group in April of 2016. Participants in the RFI and Working Group provided feedback on how they utilized the Framework and where they would like to see the Framework further developed. NIST also received praise for how it has collaborated with the private sector in the creation of the Framework and in the future evolution of the Framework.


As a Workshop participant myself, I was absolutely surprised by the variety of participants. I was expecting participants from the Federal government, but the level of engagement across so many different sectors of industry was a pleasant surprise. As a supporter of the Framework since its inception, I see it as a valuable tool for any organization.


At ISM, the Framework is foundational to our internal cybersecurity practice and has become a valuable tool that we utilize to support our customers. The Framework Core provides a set of cybersecurity activities, desired outcomes based on organizational goals and priorities and applicable references to other frameworks, guidelines, and standards that are commonly utilized across the public and private sectors. There is plenty of room for improvement, but I am confident that the partnership between NIST and the private and public sector will continue to produce a valuable tool that can be utilized to improve organizations with mature cybersecurity practices or as a foundation for organizations looking to build a mature cybersecurity practice.


If you would like to learn more about the NIST Cybersecurity Framework or the recent Workshop findings, please use the links below. Should you be interested in learning more about how ISM can help your organization, you can use the Contact Us link in the upper right hand corner of the page.


Workshop Findings:

NIST Cybersecurity Framework:

ISM Named Intel Security’s 2016 Small Commercial US Partner of the Year

Press Release

ISM Named Intel Security’s 2016 Small Commercial US Partner of the Year


The Award Highlights ISM’s Outstanding Engagement and Commitment to its Alliance with Intel Security and Customer Outcomes


BOCA RATON, Fla.—May 11, 2016 — International Systems Marketing, Inc. (ISM), announced today that it was named 2016 Small Commercial US Partner of the Year by Intel Security.  Intel Security revealed the winners, recognized for 2015 performance excellence in global and local markets, marketing innovation and community service, at its Distinguished Partner Awards reception held during its Americas Partner Summit.  The awarded companies were selected for their embodiment of the three foundational pillars of the Intel Security Partner Program: strategic engagement, mutual growth and profitability and driving better customer security outcomes.


The Annual Distinguished Partner Awards honors exemplary channel partners that invest in Intel Security solutions, deliver outstanding results, and are aligned with Intel Security’s vision and strategy to provide integrated security technology and services that simplify the Threat Defense Lifecycle.  Other areas of consideration include sales, growth, new business performance numbers, investment in enablement activities and participation in events.


“We recognize ISM as a significant member of our partner network. They bring unique value to Intel Security and we’re proud to see them reach such high performance,” said Richard Steranka, senior vice president of global channel operations at Intel Security. “Working together, ISM’s customers experience faster deployment times, reduced costs, easy-to-use management tools, greater protection, and improved compliance, all while leveraging the threat defense lifecycle.”


ISM and other Intel Security’s partners are promoting and accelerating the adoption of security technology and services, critical to protecting consumers, companies and organizations from ever-evolving cyberthreats.


“We are honored to be recognized by Intel Security, a strategic partner of over 10 years, for the impact we have as a dedicated technical resource and strategist for Intel Security,” said Chris Young, President at ISM.  “This was truly a team win for both companies and we look forward to continuing to build upon our success and relationship with Intel Security to provide continued value to our customers.”


In total, Intel Security recognized 19 companies for achievements across various verticals and regions. All partners were evaluated making this a prestigious recognition.


About ISM


ISM is a group of IT security-minded professionals dedicated to helping our customers optimize their security architecture to achieve dynamic and proactive cybersecurity through in-depth business and product knowledge, high quality service deliverables and reliable customer service.  As a small business, we have been supporting federal and commercial organizations with their technology needs for over 35 years and have focused on IT security for the past 25 years.


ISM is headquartered in Rockville, Maryland and we have had the privilege of working with and supporting our customers since 1971.


“Our Business Is Securing Your Business”

Pittsburgh, PA – ISM and Intel Security Lunch & Learn – May 17, 2016

Pittsburgh, PA – ISM is excited to be hosting, along with our partner Intel Security, an interactive session on Tuesday, May 17, 2016 with guest speaker Justin Forbes from CERT Division at the Software Engineering Institute (SEI) about ‘Operationalizing Threat Intelligence.’  See below for more information and to sign up:


If you are having trouble reading this email, read the online version.