ISSA Baltimore Chapter Monthly Meeting February 25, 2015
|
|
|
- Piers Garrison
- 10 years ago
- Views:
Transcription
1 ISSA Baltimore Chapter Monthly Meeting February 25, 2015 Interset!, CyberCore Technologies, Phoenix TS,
2 Board of Directors Bill Smith, CISSP, GSNA, CEH, GPEN, GCFA, GCFE - President Sidney Spunt, CISSP - VP Operations Kevin Drury Secretary Carol Klessig, CISSP - VP Professional Development Rod Zwainz, CISSP, PMP - VP Education Phil Rogofsky, CISSP, Network+, CPA Treasurer Steve Chan, CISSP, PMP VP Membership Dennis Dworkowski, CISSP-ISSEP VP Outreach
3 Baltimore Chapter Sponsors
4 Agenda / Announcements Welcome to Parsons, 7110 Samuel Morse Drive, Suite 200 Columbia, Maryland Non-U.S. Citizen Requirements Any guests or new members in attendance? (ISC) 2 CPE Submissions Individual Responsibility New CISSP and SSCP Domains Chapter Strategic Plan New Member Promotion CISSP Chapter Badges / Shirts and Jackets with ISSA-Baltimore Logo CISSP Study Group Spring 2015 February 24 thru May 19, 2015 New Location: Phoenix TS Amazon Affiliates program LinkedIn Group Facebook Page ISSA-Baltimore Chapter Future Meeting schedule
5 New Members Since January Meeting Aaron Caruso Kevin Clark Shane Jager Aaron Levi Ryan Paal Thomas Pena Will Unkart Alexander Vining 278 Total Members
6 What? You didn't know Computers Control you? / ICS and SCADA 2-Hour Live Event: Monday, March 2, 2015 Start Time: 9:00 a.m. US-Pacific/ 12:00 p.m. US-Eastern/ 5:00 p.m. London Brought to you exclusively by ISSA. REGISTER NOW Join the conversation! #ISSAWebConf
7 Opening Doors for Women in the Information Security Field 1-Hour Live Event: Monday, April 6, 2015 Start Time: 1:00 a.m. US-Pacific/ 4:00 p.m. US-Eastern/ 9:00 p.m. London Brought to you exclusively by the ISSA Women in Security SIG. REGISTER NOW Join the conversation! #ISSAWISSIG
8 CISSP Domains, Effective April 15, 2015 Security and Risk Management (Security, Risk, Compliance, Law, Regulations, Business Continuity) Asset Security (Protecting Security of Assets) Security Engineering (Engineering and Management of Security) Communications and Network Security (Designing and Protecting Network Security) Identity and Access Management (Controlling Access and Managing Identity) Security Assessment and Testing (Designing, Performing, and Analyzing Security Testing) Security Operations (Foundational Concepts, Investigations, Incident Management, Disaster Recovery) Software Development Security (Understanding, Applying, and Enforcing Software Security)
9 Systems Security Certified Practitioner (SSCP) Domains, Effective April 15, 2015 * Access Controls * Cryptography * Security Operations and Administration * Networks and Communications Security * Risk Identification, Monitoring, and Analysis * Systems and Application Security * Incident Response and Recovery * The SSCP indicates a practitioner s technical ability to tackle the operational demands and responsibilities of security practitioners, including authentication, security testing, intrusion detection/prevention, incident response and recovery, attacks and countermeasures, cryptography, malicious code countermeasures, and more.
10 Chapter Strategic Plan Vision - To be the community of choice for international cybersecurity professionals dedicated to advancing individual growth, managing technology risk and protecting critical information and infrastructure Mission - ISSA is a not-for-profit, international organization of information security professionals and practitioners. It provides educational forums, publications, and peer interaction opportunities that enhance the knowledge, skill, and professional growth of its members
11 Change to the Chapter By-laws ARTICLE I: Name Current: The name of this organization shall be the Baltimore Metropolitan Chapter, Information Systems Security Association, Inc., (ISSA) hereafter referred to as the "Chapter". Change: The name of this organization shall be the Central Maryland Chapter of the Information Systems Security Association, Inc., (ISSA) hereafter referred to as the "Chapter".
12 Chapter Strategic Plan-Core Values Collaboration - We believe that working together toward a common goal is essential to the success of the association. Knowledge Sharing - We encourage knowledge sharing as a result of our belief that all of us are smarter and more productive than any one of us. Leadership - We inspire each other to achieve and grow through a shared vision and passion to excel. Professional Development - We support the development of our people, association and profession through positive relationships, dynamic synergies and innovative growth opportunities. Innovation - We search for new avenues to improve the Cybersecurity community, ISSA International and our Chapter
13 Chapter Strategic Plan-Goals and Strategies Goal I:Expand Chapter Influence outside of Howard County Area Change chapter name to ISSA of Central Maryland Reach out to security companies outside Howard County Join and be active the Chesapeake region Tech Council Objective 2: Increase Benefit to Members Seek out more varied speakers for chapter meetings. Develop relationship with other organizations such as other ISSA Chapters, IIA, IEEE Baltimore, and ISACA. Create relationships with educational organizations to provide more costs training opportunities such as Phoenix Poll members to see what they what additional opportunities they would like the Chapter to pursue. Goal 3:Improve Relationship with Companies/Sponsors Create Corporate Ambassadors where members represent the Chapter to their employees, Start monthly communication/ newsletter to Sponsors Host on-site Meet and Greet Events at Large Companies. Poll Sponsors to determine what they would like out of Sponsorship. Goal 4-Promote Chapter's Identity Increase STEM involvement and participation events such in the HoCo STEM Festival. Increase involvement in local security events such as CyberMarylandConference;. Increase involvement with Howard Tech Council Increase support to our Student Chapter at UMBC and explore creating additional student chapters. 13
14 New Member Promotion Rules: 1. Promotion begins August 1, New member must identify referring member when joining 3. $25.00 Amazon Gift Card awarded to referring member 4. Referring member s registration must be current 5. Awards will be presented at monthly Chapter meeting 6. Program will run through December 31, 2015 and be reevaluated by the board after that time 7. Board of Directors not eligible to participate
15 New Member Promotion Congratulations - $25.00 Amazon Gift Card winners: Chris Ambrose John Barker Chuck Dickens Charles Dickert Devin Elmore * Ivan Gordon Monique Mitchner * Matt Morris Nick Rapp Katelin Rowley Oliver Thomas * Rod Zwainz *
16 ISSA-Baltimore CISSP Study Group Fall 2015 Schedule 17 Feb 15 Kickoff for CISSP 24 Feb 15 Information Security Governance & Risk Management 3 Mar 15 Security Architecture & Design 10 Mar 15 Access Control 17 Mar 15 Operations Security 24 Mar 15 Cryptography Part 1 31 Mar 15 Cryptography Part 2 7 Apr 15 Physical & Environmental Security 14 Apr 15 Software Development Security 21 Apr 15 Business Continuity & Disaster Recovery 28 Apr 15 Telecommunications & Network Security Part 1 5 May 15 Telecommunications & Network Security Part 2 12 May 15 Legal, Regulations, Investigations and Compliance 19 May 15 Practice Exam / Review Phoenix TS, Little Patuxent Parkway, Suite 500, Columbia, MD 21044
17 The ISSA Baltimore Chapter is organizing a networking visit and tour of the Jailbreak Brewery in March 21, 2014, 3:00 PM 5:00 PM Cost $10.00 per person Jailbreak Brewing Company 9445 Washington Blvd N Laurel, MD (443)
18 Our New Chapter Blog!! As 2015 is now underway, we wanted to provide you with a list of potential networking and volunteering opportunities tentatively scheduled for this year. We are always looking for members to assist with various outreach and chapter activities that need to be completed. You may be asking yourself, what is in it for me? Listed below are several benefits for volunteering your time to help the Baltimore ISSA chapter out. Volunteering provides a chance to learn new skills. Carol Klessig is learning to create a unique hash tag this weekend. Learning about social media (Twitter) may help Carol add to her resume. Please Carol at [email protected] If you would like to be considered for the new position known as Director of Publicity. Helping others learn and encouraging our youth feels great. Rewards are not always monetary. Encouraging a student can be your chance to pay it forward. This is especially beneficial for recent graduates or new members in the security field. Camaraderie. Social outings like our field trips can be a chance to form a new friendship with others in the IT field. CPE's. Working for the club can generate CPE's that can be used to maintain your certifications. Currently, we need our website updated and possibly redesigned. Does anyone have a experience in web design that could assist us with updating or redesigning our current website? You can volunteer for just a single event or on a regular basis. A variety of items exist that we could use assistance with. These items include writing a blog article, greeting members at the door or assisting with the setup/cleanup at chapter meetings. If you see a position aching to be filled, talk to one of the board members.
19
20 2015 Meetings and Events Date Speaker Organization Topic January 28, 2015 Kathy Worgul Carroll County Business & Employment Resource Center How Can LinkedIn Assist in Career Advancement February 9, 2015 Lori Harmon Women In Security SIG Webinar The Art of the Ask: How to Ask for and Get What You Want in Your Career February 25, 2015 Robert K. Gardner New World Technology Partners Cyber Risk, Thru the Shareholder Lens March 25, 2015 Rhonda Ferrell CyberSecurity & Your Professional Life: A Value-Add Approach April 15, 2015 Mid-Atlantic ISSA Security Conference, NIST, Gaithersburg, MD April 22, 2015 Anthony United States Department of Justice Teelucksingh May 20, 2015 Brian E. Dykstra Atlantic Data Forensics, Inc. October ISSA International Conference Chicago Illinois
21 March 25, 2015 Speaker Rhonda Farrell Rhonda Farrell is an Associate with Booz Allen Hamilton, primarily focusing on enterprise life-cycle activities as they relate to cybersecurity and quality. Her prior career experience was within operations, engineering, and security functional areas of Fortune 500 companies throughout Silicon Valley, CA. as well as with the US Marine Corps at Quantico, VA. She is a veteran committee member and leader within IEEE Northern Virginia, ISSA International (WIS SIG and Board of Directors), ISSA-NOVA, and ASQ 509 where she has worked on initiatives which provide member value, increase opportunities for professional development, stimulate growth, and enable realization of strategic partnering opportunities. She brings to the leadership teams -- enthusiasm, a strong work ethic, commitment to organizational principles, a deep technical background, sound management capabilities with a solid grounding in quality best practices.
22 March 25, 2015 Topic CyberSecurity & Your Professional Life: A Value-Add Approach Cybersecurity is a high growth field, but an inexact science -- an amalgamation, if you will, of theories, principles, and best practices pulled from the realms of quality, performance excellence, and change management. Explore how these bodies of knowledge can be more effectively intertwined to craft a solid roadmap using a value-add approach which guides both your customer solutions as well as your own career.
23 February 25, 2015 Speaker Robert K. Gardner New World Technology Partners Mr. Gardner formed New World Technology Partners (NWTP.net) in 1977 to incubate and promote advanced technologies and new ventures with business potential and national/public policy implications. His efforts focused upon High Performance Computing and Cyber Risk technologies directed primarily to National Security, Energy, Healthcare and Financial Services applications. He introduced and promoted intellectual property and launched new business units for 3 rd parties and the NWTP portfolio, including August Systems, Verdix, Meiko Scientific, Cryptek, Phoenix Numeric and Probity Labs. Under whose auspices he also produces training workshops, speaking engagements, articles & blogs and congressional testimony on the Impact of Cyber Risk with and for Government Agencies, marquee trade associations, NGOs and Academic Institutions. He currently writes, speaks and mentors on the Enterprise impact of Cyber Risk and has prepared briefings and testimony for the U.S. House of Representatives, Senate committees and industry forums. Mr. Gardner has a BSEE from Rensselaer Polytechnic Institute and studied graduate system engineering and business administration at Penn State and the University of Santa Clara respectively.
24 February 25, 2015 Topic Cyber Risk, Thru the Shareholder Lens The rapid rise in the frequency and sophistication of cyber threats presents an enterprise risk issue that demands more attention from the officers and directors charged with the stewardship of shareholders interests. Corporate enterprise assets, often in digital form (such as funds, intellectual property, etc.) or executed by digital activity (transactions, trading algorithms), are threatened by exploitable vulnerabilities and systemic risks. Shareholder value, which is affected by multiple factors in price/earnings that can be tied to reputation, brand integrity, and legal and regulatory exposure, is also subject to the severe impacts of cyber incidents. We have seen how swiftly an event or paradigm shift can take a toll on shareholder value. As a Deloitte report, Disarming the Value Killers: A Risk Management Study, notes, Almost 50% of Global 1000 companies lost 20% or more in share price in less than a month during the past 10 years some never recovered. Most major losses were as a result of a series of high-impact but low-likelihood events. To address the risk of cyber attacks ranging from nuisance to catastrophic and all points in between, corporate executives need to quantify the consequences of risk scenarios. But first, leaders must understand how their enterprise operates in today s cyberspace.
ISSA Baltimore Chapter. Monthly Meeting October 28, 2015
ISSA Baltimore Chapter Monthly Meeting October 28, 2015 Agenda / Announcements Welcome to Parsons, 7110 Samuel Morse Drive, Suite 200 Columbia, Maryland 21046 Non-U.S. Citizen Requirements Any guests or
ISACA S CYBERSECURITY NEXUS (CSX) October 2015
ISACA S CYBERSECURITY NEXUS (CSX) October 2015 DO2 EXECUTIVE OVERVIEW Will you be a Cyber defender? ISACA launched the Cybersecurity Nexus (CSX) program earlier this year. CSX, developed in collaboration
INSIGHTS AND RESOURCES FOR THE CYBERSECURITY PROFESSIONAL
INSIGHTS AND RESOURCES FOR THE CYBERSECURITY PROFESSIONAL BY 2 In enterprise IT, there is a single point where everything that matters in information, technology and business converges: Cybersecurity Nexus
The Next Generation of Security Leaders
The Next Generation of Security Leaders In an increasingly complex cyber world, there is a growing need for information security leaders who possess the breadth and depth of expertise necessary to establish
JOINT EVENT WITH IIBA-LA. Trends & Best Practices in. Cybersecurity for networks, cloud computing and mobile
JOINT EVENT WITH IIBA-LA Trends & Best Practices in Cybersecurity for networks, cloud computing and mobile April 23 rd, 2015 Hands-on Experts Share Current Strategies to Manage Cybersecurity Today s enterprise
2015 Michigan NASCIO Award Nomination. Cyber Security Initiatives: Michigan Cyber Disruption Response Strategy
2015 Michigan NASCIO Award Nomination Cyber Security Initiatives: Michigan Cyber Disruption Response Strategy Sponsor: David Behen, DTMB Director and Chief Information Officer Program Manager: Rod Davenport,
CYBERSECURITY NEXUS ROBERT E STROUD INTERNATIONAL PRESIDENT, ISACA RAMSÉS GALLEGO INTERNATIONAL VICE PRESIDENT, ISACA
CYBERSECURITY NEXUS ROBERT E STROUD INTERNATIONAL PRESIDENT, ISACA RAMSÉS GALLEGO INTERNATIONAL VICE PRESIDENT, ISACA Robert Stroud International President, ISACA VP Strategy & Innovation, CA Technologies
Protecting Energy s Infrastructure and Beyond: Cybersecurity for the Smart Grid
Protecting Energy s Infrastructure and Beyond: Cybersecurity for the Smart Grid Which is it? Cyber Security ~or~ Cybersecurity? Dr. Ernie Lara President Presenters Estrella Mountain Community College Dr.
KEY TRENDS AND DRIVERS OF SECURITY
CYBERSECURITY: ISSUES AND ISACA S RESPONSE Speaker: Renato Burazer, CISA,CISM,CRISC,CGEIT,CISSP KEY TRENDS AND DRIVERS OF SECURITY Consumerization Emerging Trends Continual Regulatory and Compliance Pressures
Kevin Savoy, CPA, CISA, CISSP Director of Information Technology Audits Brian Daniels, CISA, GCFA Senior IT Auditor
IT Audit/Security Certifications Kevin Savoy, CPA, CISA, CISSP Director of Information Technology Audits Brian Daniels, CISA, GCFA Senior IT Auditor Certs Anyone? There are many certifications out there
Certification and Training
Certification and Training CSE 4471: Information Security Instructor: Adam C. Champion Autumn Semester 2013 Based on slides by a former student (CSE 551) Outline Organizational information security personnel
HOW TO ADDRESS THE CURRENT IT SECURITY SKILLS SHORTAGE
HOW TO ADDRESS THE CURRENT IT SECURITY SKILLS SHORTAGE ISACA S CYBER SECURITY NEXUS Ivan Sanchez-Lopez Senior Manager Information Security, IT Risk & Continuity, DHL Global Forwarding ISACA Luxembourg
Priority III: A National Cyberspace Security Awareness and Training Program
Priority III: A National Cyberspace Security Awareness and Training Program Everyone who relies on part of cyberspace is encouraged to help secure the part of cyberspace that they can influence or control.
know school PubliC affairs
know school PubliC affairs = our mission at the school PubliC affairs is to prepare leaders to analyze issues and tackle complex challenges in public service. We aspire not only to transmit knowledge to
How To Build A Cybersecurity Company
A Service Disabled Veteran Owned Small Business Maryland 2014 The Cybersecurity Industry Window of Opportunity John M. Leitch President & CEO Winquest Engineering Corporation V1.3 1 Agenda Industry Windows
Over 20 years experience in Information Security Management, Risk Management, Third Party Oversight and IT Audit.
CYBERSECURITY: ISSUES AND ISACA S RESPONSE June 2014 BILL S BIO Over 20 years experience in Information Security Management, Risk Management, Third Party Oversight and IT Audit. Vice President Controls
Security Transcends Technology
INTERNATIONAL INFORMATION SYSTEMS SECURITY CERTIFICATION CONSORTIUM, INC. Career Enhancement and Support Strategies for Information Security Professionals Paul Wang, MSc, CISA, CISSP [email protected]
National Association of Black Accountants, Incorporated Metropolitan Washington, DC Chapter. Fiscal Year 2016 Corporate Prospective
National Association of Black Accountants, Incorporated Metropolitan Washington, DC Chapter Fiscal Year 2016 Corporate Prospective Fiscal Year 2015 Corporate Partners Fiscal Year 2015 Corporate Patrons
Amit Garg BERKELEY RESEARCH GROUP, LLC 1800 M Street, N.W. 2 nd Floor Washington, D.C. 20036. Direct: 202.747.3483 agarg@thinkbrg.
Curriculum Vitae Amit Garg BERKELEY RESEARCH GROUP, LLC 1800 M Street, N.W. 2 nd Floor Washington, D.C. 20036 Direct: 202.747.3483 [email protected] SUMMARY Amit Garg brings over 17 years of information
Information Systems Security Certificate Program
Information Technologies Programs Information Systems Security Certificate Program Accelerate Your Career extension.uci.edu/infosec University of California, Irvine Extension s professional certificate
Framework for Improving Critical Infrastructure Cybersecurity
Framework for Improving Critical Infrastructure Cybersecurity 18 November 2015 [email protected] [email protected] National Institute of Standards and Technology About NIST NIST s mission is to develop
CYBERSECURITY: ISSUES AND ISACA S RESPONSE
CYBERSECURITY: ISSUES AND ISACA S RESPONSE June 2014 KEY TRENDS AND DRIVERS OF SECURITY Consumerization Emerging Trends Continual Regulatory and Compliance Pressures Mobile devices Social media Cloud services
Security Forensics Training
Security Forensics Training Vision, Mission, and Values 3 Vision: To be the brand of choice for computer forensics, cyber security, and training solutions Mission: To provide digital forensics, cyber
Simon Fraser University. Human Resources. Students Association
Simon Fraser University Human Resources Students Association Sponsorship Package 2014/2015 ABOUT HRSA The Human Resources Students Association (HRSA) is a student-run organization at Simon Fraser University
THE CYBERSECURITY SKILL GAP: WHAT EMPLOYERS WANT YOU TO KNOW
www.isaca.org/cyber THE CYBERSECURITY SKILL GAP: WHAT EMPLOYERS WANT YOU TO KNOW ROBERT E STROUD CGEIT CRISC INTERNATIONAL PRESIDENT ISACA & VP STRATEGY & INNOVATION CA TECHNOLOGIES February 2015 ISACA
Muskingum Valley Human Resource Management Association MVHRMA. New Member Welcome Packet
Muskingum Valley Human Resource Management Association MVHRMA New Member Welcome Packet Muskingum Valley Human Resource Dear New MVHRMA Member: Welcome. On behalf of the Muskingum Valley Human Resource
Women in Federal Law Enforcement Foundation, Inc. Strategic Plan January 1, 2016 December 31, 2020
Women in Federal Law Enforcement Foundation, Inc. Strategic Plan January 1, 2016 December 31, 2020 Strategic Goal 1: Training, Professional Development and Leadership Enhancement WIFLE will continue to
Cybersecurity Framework: Current Status and Next Steps
Cybersecurity Framework: Current Status and Next Steps Federal Advisory Committee on Insurance November 6, 2014 Adam Sedgewick Senior IT Policy Advisor [email protected] National Institute of Standards
Commonwealth Approach to Cybergovernance and Cybersecurity. By the Commonwealth Telecommunications Organisation
Commonwealth Approach to Cybergovernance and Cybersecurity By the Commonwealth Telecommunications Organisation Trends in Cyberspace Cyberspace provides access to ICT Bridging the digital divide and influencing
IT Security Training. Why Security Certification? A Serious Business - Fear Drives the Demand High Demand Freedom to Make and Break Rules
IT Security Training Why Security Certification? A Serious Business - Fear Drives the Demand High Demand Freedom to Make and Break Rules Benefits of Certification Provides Assurance to Employers Certification
BHEF s National Higher Education and Workforce Initiative
BHEF s National Higher Education and Workforce Initiative Debbie Hughes Sr. Director of Higher Education & Workforce September 30, 2015 2015 BHEF About the Business-Higher Education Forum BHEF is a member
Forensic & Investigative Accounting (FIA) Section American Accounting Association Mission, Objectives and 2013-2015 Strategy.
Forensic & Investigative Accounting (FIA) Section American Accounting Association Mission, Objectives and 2013-2015 Strategy Mission The mission of the Forensic & Investigative (FIA) Section of the American
PMI and the Project Manager. Lori Ambrose PMP Vice President Business Outreach PMI Chicagoland Chapter
Lori Ambrose PMP Vice President Business Outreach PMI Chicagoland Chapter Profession Introduction, Competency, and Collaboration 2 Project Management Institute (PMI) Global Not-for-Profit Professional
Certificate in Nonprofit Management
Fall 2014 - Spring 2015 Certificate in Nonprofit Management Nonprofit organizations that commit to building their management capacity will be the sustainable, high-performers in the field. Strong management
Profil stručnjaka za informacijsku sigurnost - certificirati se ili ne? Biljana Cerin, CISA, CISM, CGEIT, CBCP, PMP www.ostendogroup.
Profil stručnjaka za informacijsku sigurnost - certificirati se ili ne? Biljana Cerin, CISA, CISM, CGEIT, CBCP, PMP www.ostendogroup.com DA! (by Global knowledge & TechRepublic) Top certifications by salary:
Cybersecurity in the Utilities Sector Best Practices and Implementation 2014 Canadian Utilities IT & Telecom Conference September 24, 2014
Cybersecurity in the Utilities Sector Best Practices and Implementation 2014 Canadian Utilities IT & Telecom Conference September 24, 2014 Victoria Yan Pillitteri Advisor for Information Systems Security
CISM ITEM DEVELOPMENT GUIDE
CISM ITEM DEVELOPMENT GUIDE Updated January 2015 TABLE OF CONTENTS Content Page Purpose of the CISM Item Development Guide 3 CISM Exam Structure 3 Writing Quality Items 3 Multiple-Choice Items 4 Steps
2014 Montana Government IT Conference. Securing Data Networks and People
Presenter: Matt Bennett, Genetec Leveraging the Cloud for Hybrid Video Surveillance Matt is based in Seattle, WA and is the Western North America pre-sales engineer for Genetec (the world s leader in unified
Sponsorship Opportunities 5-2016. Thomas Odams. Events Manager, EMEA, RANT Events t: 0203 119 3387 m: 07827 870 359 todams@rantevents.
Sponsorship Opportunities 5-2016 Thomas Odams Events Manager, EMEA, RANT Events t: 0203 119 3387 m: 07827 870 359 [email protected] About The RANT Forum (Risk and Network Threat Forum) The RANT Forum
POSITION DESCRIPTION
BOYS & GIRLS CLUBS OF MONTEREY COUNTY POSITION DESCRIPTION Title: Work Schedule: Reports to: Lead Program Assistant, Technology - HYDC Part-time 30 hours per week, Monday Friday, generally scheduled between
The Value of Information Security Certifications
The Value of Information Security Certifications Ed Zeitler, CISSP Executive Director, (ISC) 2 www.isc2.org Overview Why professional certificate for information security? About (ISC) 2 and its credentials
Forensic Certifications
Forensic Certifications Mayuri Shakamuri CS 489-02 Digital Forensics October 31, 2006 New Mexico Tech Executive Summary Digital Forensics is rapidly growing and evolving to become a scientific practice
RARITAN VALLEY COMMUNITY COLLEGE COURSE OUTLINE. CISY 229 Information Security Fundamentals
RARITAN VALLEY COMMUNITY COLLEGE COURSE OUTLINE CISY 229 Information Security Fundamentals I. Basic Course Information A. Course Number & Title: CISY-229 Information Security Fundamentals B. New or Modified
THOMAS WELCH, CISSP, CPP, CISA, CISM, CFI, CHS-III [email protected] SUMMARY
, CISSP, CPP, CISA, CISM, CFI, CHS-III [email protected] SUMMARY Mr. Welch has over twenty years in the Security and Information Systems business, twelve of which he was directly responsible for
FedVTE Training Catalog SPRING 2015. advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov
FedVTE Training Catalog SPRING 2015 advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov If you need any assistance please contact the FedVTE Help Desk here or email the
NICE and Framework Overview
NICE and Framework Overview Bill Newhouse NIST NICE Leadership Team Computer Security Division Information Technology Lab National Institute of Standards and Technology TABLE OF CONTENTS Introduction to
How To Become A Cybersecurity Consultant
Strengthening the Nexus: Government-Business- University cooperation and collaboration on security, training and research November 1, 2011 Susan C. Aldridge, PhD University of Maryland University College
WILLIAM OETTINGER PHONE (702) 292-4645 [email protected]
WILLIAM OETTINGER PHONE (702) 292-4645 [email protected] SUMMARY OF QUALIFICATIONS Veteran investigator in a traditional and computer-related environment. A leader experienced in organizing, directing,
National Higher Education & Workforce Initiative Regional Economic Growth Through High skill, High demand Workforce Development
National Higher Education & Workforce Initiative Regional Economic Growth Through High skill, High demand Workforce Development 2015 Virginia Summit on Higher Education and Economic Competitiveness Brian
WOMEN'S SOCIETY OF CYBERJUTSU SPONSORSHIP OVERVIEW 2015. 2015 Women s Society of Cyberjutsu
WOMEN'S SOCIETY OF CYBERJUTSU SPONSORSHIP OVERVIEW 2015 ABOUT WOMEN S SOCIETY OF CYBERJUTSU Women s Society of Cyberjutsu (WSC), is a 501(c)3 organization serving hundreds of women across the globe by
P HRMA. THE PORTLAND HUMAN RESOURCE MANAGEMENT ASSOCIATION since 1947
P HRMA THE PORTLAND HUMAN RESOURCE MANAGEMENT ASSOCIATION since 1947... the voice of human resources for the Portland, Oregon, business community for over 60 years providing professional development, building
MARYLAND. Cyber Security White Paper. Defining the Role of State Government to Secure Maryland s Cyber Infrastructure.
MARYLAND Cyber Security White Paper Defining the Role of State Government to Secure Maryland s Cyber Infrastructure November 1, 2006 Robert L. Ehrlich, Jr., Governor Michael S. Steele, Lt. Governor Message
13 th Annual General Meeting
13 th Annual General Meeting Meet the Candidates You can hear from the candidates in the 2016 Board of Director Election by attending the Meet the Candidates webinar on Tuesday, May 3, 2016 from 3:00 pm
Work Toward Your Bachelor s Degree
By completing a series of Walden s Professional Development courses, you can earn credits toward a number of bachelor s programs at Walden University. To receive credit, you will need to complete all of
Certification Programs
Certification Programs 2014 The SBS Institute serves community banks by providing educational programs that will certify a banker has the knowledge and skills to protect against todays information security
National Association of Black Accountants, Incorporated Metropolitan Washington, DC Chapter. Fiscal Year 2015 Corporate Prospective
National Association of Black Accountants, Incorporated Metropolitan Washington, DC Chapter Fiscal Year 2015 Corporate Prospective Fiscal Year 2014 Corporate Partners Fiscal Year 2014 Corporate Patrons
Innovation, Partnership, Development
Innovation, Partnership, Development ECEHDA Annual Conference March 13, 2015 Chris Valentino Director of Strategy The Need Access to top talent to address our nations most challenging problems Diverse
WRITTEN TESTIMONY OF
WRITTEN TESTIMONY OF KEVIN MANDIA CHIEF EXECUTIVE OFFICER MANDIANT CORPORATION BEFORE THE SUBCOMMITTEE ON CRIME AND TERRORISM JUDICIARY COMMITTEE UNITED STATES SENATE May 8, 2013 Introduction Thank you
ASCE Richmond Branch Newsletter
ASCE Richmond Branch Newsletter Volume 5 Issue 4 January 2013 Important January Dates In This Issue 2013 General Assembly Informational Webinar January 16th, 12:00 PM, Online 2013 General Assembly Meet
The fast track to top skills and top jobs in cyber. Guaranteed.
The fast track to top skills and top jobs in cyber. Guaranteed. FREE TO QUALIFYING PARTICIPANTS WELCOME The SANS Institute is presenting the SANS CyberTalent Immersion Academy for Women to encourage women
Center for Identity. The University of Texas at Austin Partnership Program. 2015 Proprietary, The University of Texas at Austin, All Rights Reserved.
Center for Identity The University of Texas at Austin Partnership Program Bronze Partnership $5,000 annually Silver Partnership $10,000 annually Partnership Program Gold Strategic Partnership $25,000 annually
Cybercrime & Cybersecurity: the Ongoing Battle International Hellenic University
Cybercrime & Cybersecurity: the Ongoing Battle International Hellenic University Andreas Athanasoulias, CISM, CISSP Information Security Officer & Security Consultant Brief introduction My career path
Chamber After Hours Presenting Sponsor: $1,750 Chamber Christmas After Hours Presenting Sponsor: $1,950 Chamber Before Hours (new format)
Sponsorship Agreements are signed upon commitment. Invoices are sent for agreed upon sponsorships 90 days prior to event and must be paid 30 days prior to event. 10 th Annual Banquet and Red Carpet Reception
Social Media Security Training and Certifications. Stay Ahead. Get Certified. Ultimate Knowledge Institute. ultimateknowledge.com
Ultimate Knowledge Institute ultimateknowledge.com Social Media Security Training and Certifications Social Media Security Professional (SMSP) Social Media Engineering & Forensics Professional (SMEFP)
Business Babes By-Laws
Business Babes By-Laws ARTICLE I. Name of the Organization This group shall be known as the Business Babes Society (BBS), Chapter 1. ARTICLE II. Purpose Business Babes is a support and networking group
Big 4 Information Security Forum
San Francisco ISACA Chapter Proudly Presents: Big 4 Information Security Forum A Day-Long, Multi-Session Event, being held in San Francisco @ the Sir Francis Drake Hotel! *** PLEASE NOTE THIS EVENT WILL
Panel on Emerging Cyber Security Technologies. Robert F. Brammer, Ph.D., VP and CTO. Northrop Grumman Information Systems.
Panel on Emerging Cyber Security Technologies Robert F. Brammer, Ph.D., VP and CTO Northrop Grumman Information Systems Panel Moderator 27 May 2010 Panel on Emerging Cyber Security Technologies Robert
Report on CAP Cybersecurity November 5, 2015
Agenda Number 7. Report on CAP Cybersecurity November 5, 2015 Phil Cook CISSP, CISM Manager, Information Technologies Risk #1 External Attacks PR 81 Protect and secure CAP's Information Technology assets
INNOWEST BOOTCAMP Silicon Valley Technology Entrepreneurship Certificate Program
INNOWEST BOOTCAMP Silicon Valley Technology Entrepreneurship Certificate Program Innowest Innowest is a not-for-profit institution that exists to deliver solutions and provide resources to local and international
Framework for Improving Critical Infrastructure Cybersecurity
Framework for Improving Critical Infrastructure Cybersecurity Executive Order 13636 Improving Critical Infrastructure Cybersecurity 2014 ISACA Pittsburgh Information Security Awareness Day Victoria Yan
DHS. CMSI Webinar Series
DHS CMSI Webinar Series Renee Forney Executive Director As the Executive Director for the Cyberskills Management Support Initiative (CMSI), Ms. Forney supports the Undersecretary for Management (USM) for
2015-2016 BUSINESS PLAN
2015-2016 BUSINESS PLAN Purpose of the Plan This annual Business Plan is designed to outline actions and processes that will be undertaken to meet the Chamber s mission, vision and strategic plan. The
FedVTE Training Catalog SUMMER 2015. advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov
FedVTE Training Catalog SUMMER 2015 advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov Access FedVTE online at: fedvte.usalearning.gov If you need any assistance please
Community Cyber Security. Center for Infrastructure Assurance and Security
Community Cyber Security Overview CIAS program Nevada implementation Get involved Physical and Cyber Threats Intersect The most destructive scenarios involve cyber actors launching several attacks on our
