Join us for the Annual ISSA and ISACA Summer Social!

Date: Tuesday, August 15, 2024
Time: 6:00 PM - 9:00 PM
Location: Marymount University Ballston Center Auditorium
1000 N Glebe Rd, Arlington, VA 22201

This is a Hybrid meeting. Enjoy a dinner meal and drinks (Meal menu TBD). This will be a catered event, so advanced registration is required.


 Registration closes on Monday, August 12, 2024.


Garrett Yee will discuss the intricacies of implementing pursuing Zero Trust in a Denied, Degraded, Intermittent, and Limited (Bandwidth) (DDIL). Joint All Domain Command and Control JADC2 and multi-domain operations require computing and communications at the edge. The Defense Information Systems Agency’s five-year plan includes the ambitious goal to build a global network “unconstrained by bandwidth [and] impervious to denial” by hostile forces. Traditional cybersecurity deals with such threats, in essence, through perimeter defense. The Enterprise – Identity, Credential and Access Management (E-ICAM) product office was established in January 2023 to establish a global, scalable, robust capability leveraging a single set of authoritative identity data to grant access to Army IT resources at the point of need, regardless of location, and set the foundations for the Zero Trust Architecture Framework. E-ICAM is comprised of three services: Enterprise Access Management Services – Army (EAMS-A), the Army Master Identity Directory (AMID) and Multi-Factor Authentication (MFA).

About the Speaker
Garrett YeeGarrett Yee currently serves as the Vice President and General Manager of the Army and Defense Agencies Sector. In this role, he is responsible for the successful operation, execution, and management for GDIT’s Army and Defense Agencies mission programs. He leads over 3,000 employees with operations in 22 countries, implements effective employee and customer engagements, and focuses on improving service delivery in all major programs. Garrett is a seasoned leader with over 20 years of experience specializing in executive leadership, customer engagement, team building, performance improvement, and productivity optimization. Prior to GDIT, Garrett served in the U.S. Army retiring as Major General. In his final assignment with the Army, Garrett served at the Defense Information Systems Agency (DISA) where he helped to lead a global organization of approximately 8,000 military and civilian personnel who plan, develop, deliver, and operate joint, interoperable, command and control capabilities and a global enterprise infrastructure in direct support of the president, secretary of defense, joint chiefs of staff, combatant commanders, Department of Defense components, and other mission partners across the full spectrum of operations. Prior to his assignment at DISA, Garrett served as the Military Deputy to the Army CIO/G-6 and Senior Information Security Officer in the Office of the Chief Information Officer (CIO)/G6, Headquarters, Department of the Army in the Pentagon. Garrett holds a bachelor’s degree from Santa Clara University, a master’s degree in strategic studies from the U.S. Army War College, and a Master of Business Administration degree from Golden Gate University.


This Summer Social is proudly sponsored by:

ISACA Greater Washington DC (GWDC) Chapter
ISSA Northern Virginia (NoVA), DC, and Central Maryland Chapters
Cloud Security Alliance
ISC2 National Capitol Region (NCR) Chapter
Washington Metro Chapter of the Association of Certified Fraud Examiners (ACFE DC)
Don't miss out on this fantastic opportunity to network, learn, and enjoy a great evening with fellow professionals. We look forward to seeing you there!

RSVP by: Monday, August 12, 2024

Join us on Tuesday, July 23 for our monthly chapter meeting with a special guest speakers:

Visibility Equals Security: Understanding Your Cyber Assets
by Moe Isaac

In today’s digital age, understanding and safeguarding your assets is paramount. This presentation delves into the essentials of cybersecurity awareness, focusing on:
• Phishing: Techniques to identify and prevent deceptive attacks.
• Ransomware: Strategies to mitigate the impact of ransomware.
• Data Breaches: Preventive measures and effective breach responses.
• Penetration Testing: The importance of identifying vulnerabilities early.
• Automation: Enhancing security through automated processes.
By the end of this session, attendees will be equipped with the knowledge to identify potential vulnerabilities within their digital environments and implement effective measures to protect against cyber threats.


Speaker Bio
moe isacMoe Isaac




Must here register if you plan to attend.

Additional information