BENJAMIN TOMHAVE, MS, CISSP
|
|
|
- Claud Goodman
- 10 years ago
- Views:
Transcription
1 Herndon, VA SENIOR SECURITY PROFESSIONAL An Information Security Leader with demonstrated success driving proactive security initiatives in a variety of organizations while participating in the development of progressive security architecture and security policy framework solutions in direct support of business objectives. Track record of improving risk resiliency through secure architecture design, information risk management, business requirements development, and security policy lifecycle management. Demonstrated competency in designing and implementing innovative security programs that promote awareness, decrease risk, and enhance the overall business. Adept at developing effective security policies, standards, guidelines, and procedures that blend with the corporate culture and incorporate business priorities and requirements. Outstanding leadership abilities; able to coordinate and direct all aspects of project-based security efforts; able to initiate and deliver security enhancements for a wide range of project-based work. Hands-on experience leading compliance and remediation efforts for SOX and PCI DSS, including requirements definition, design, and architecture, with specific experience in policy development, security requirements definition, and enterprise key management. CORE COMPETENCIES: Security Management; Governance, Risk Management, & Compliance (GRC); Information Risk Analysis & Management; Security Architecture Design and Assessment; Policy Framework Design & Development; Education, Training, and Awareness Program Development, Management, & Delivery; Secure Business Solutions; Encryption Key Management; Security Innovation. PROFESSIONAL EXPERIENCE K12, Inc., Herndon, VA March 2015 to Present Security Architect As a member of the enterprise architecture team, charged with broad responsibilities to inject security practices into the overall application stack. Reviewed overall environment and developed an incremental roadmap for addressing critical gaps and charting a progressive course to more effective enterprise security over time. Included collaborating with the team driving a DevOps initiative, as well as initiating changes to implement and leverage sec ops automation. Gartner, Inc., Herndon, VA June 2013 to March 2015 Research Director As a member of the Security & Risk Management Strategies team within Gartner for Technical Professionals, Mr. Tomhave conducted research into topics including risk management, security programs, security planning and management, application security, and SharePoint security. Additionally, he contributed as a speaker at several Gartner and non-gartner events and webinars. He also delivered advisory services to clients and provided direct support to the sales team, both virtually and in-person, in multiple regions. LockPath, Inc., Herndon, VA August 2011 to May 2013 Principal Consultant Hired to perform numerous duties as directed, including: Professional Services: Delivered consulting services supporting customer implementations of the Keylight platform and suite of applications.
2 Customer Training: Developed and delivered comprehensive customer training across all LockPath products. Curriculum was tailored to multiple learner styles, including use of visual, auditory, and tactile techniques. Writing: Produced multiple written pieces, including byline articles and white papers, ranging in length from a few hundred to a couple thousand words. Public Speaking: Delivered presentations at several security-related conferences, including the RSA USA Conference, Secure360, the Rocky Mountain Information Security Conference (RMISC), the ISC 2 Security Congress, and the ISSA International Conference. Partner Enablement: Worked with partners to ensure that they were well supported and able to fulfill their mission requirements as pertained to delivering services related to LockPath products. Other Duties As Assigned: Completed other activities as assigned, including performing market analysis, providing input on product design discussions, and assisting with security policy development. Gemini Security Solutions, Chantilly, VA May 2010 to August 2011 Sr. Security Analyst, Business Development Management Experienced consultant hired to develop business relationships and grow client-base. Contributed to billable projects, development of proposals and statements of work, and promotion of the company. Increased company profile through writing and speaking engagements. Provided subject matter expertise in core competencies for use on client projects, internal consulting, contributing to industry groups and initiatives, and overall knowledge development and transfer. Independent - Various, Fairfax, VA December 2009 to May 2010 Consultant / Author / Speaker Worked through a variety of sources to provide security professional services to clients. Engagements and expertise include security and risk assessment, policy development, security program development and management, encryption key management, and secure application development. Client organizations have ranged in size from small to larger. Foreground Security, Fairfax, VA October 2009 to December 2009 Senior Security Engineer Team lead for implementation and project management of a complete security infrastructure upgrade for a large civilian government agency. Helped manage deployment of SIEM, NIDS, HIDS, FISMA tool, and network monitoring tool. Utilized products from Nitro Security, Trend Micro (formerly Third Brigade), Relational Security, and NetWitness. Highwinds, Phoenix, AZ January September 2009 Technical Director of Information Security & Compliance Recruited to serve as the first full-time security resource for the organization. Objectives included shepherding Payment Card Industry Data Security Standard (PCI DSS) compliance efforts for one Level 2 and two Level 3 merchants. Activities included addressing policy development, data cleanup, security scanning and testing, incident response management, network security, logging and monitoring, identity and access management, training and awareness, and application security. BT Professional Services, Reston, Virginia
3 BENJAMIN L. TOMHAVE, MS, CISSP Recruited to serve as a regional security practice lead to assist with the development, qualification, and execution of client opportunities. Led and participated in information security consulting engagements covering the full spectrum of information security, information security management, business consulting, information assurance, risk and compliance, and governance. Developed and delivered internal training programs that enhanced internal capabilities to support and promote the security portfolio. Provided presales support for security-related engagements. AOL, LLC, Dulles, Virginia Senior Technical Security Engineer Recruited as an individual contributor for a joint incident response management and security assurance team. Developed the position to take lead responsibilities for information security management, including security assurance, and the training and awareness program. The success of the information security management program, which was later separate from incident response management, resulted in a marked decrease in security incidents and an overall improvement in enterprise risk resiliency. IP3 Inc., Saginaw, Michigan Instructor Delivered a podcast titled "Making Sense of Models, Frameworks, and Methodologies" based on Masters thesis work, and then delivered CISSP boot camp training both in person and online. ITT Technical Institute, Springfield, Virginia 2006 Adjunct Professor Delivered ITT-designed curriculum to approximately 20 post-secondary students on the fundamentals of Linux operation system administration. I_TECH Corporation, a subsidiary of First Interstate Bancsystem, Billings, Montana 2003 WAN/Security Engineer Recruited to take over leadership of a comprehensive network security re-architecture project. Responsible for all aspects operational security within supported systems, including OS and router hardening, perimeter and internal firewalls, AV maintenance, etc. Sofast Communications, Great Falls, Montana , 2003 Senior Systems Engineer Served as lead systems administrator and secondary network administrator for national Internet Services Provider. Responsibilities included supporting dial-up, broadband and DSL customers for connectivity, and web hosting. Also provided systems administration to systems used for web hosting and portal services. ICSA Labs, Mechanicsburg, Pennsylvania 2002 Network Security Lab Analyst Hired to conduct comprehensive security testing and certification of firewall products, coordinating the resolution of issues with vendors. Testing was conducted in a processoriented, scientific environment and involved use of common penetration assessment tools, including Nessus, CyberCop, Nmap, hping, nemesis and tcpdump, among others.
4 Wells Fargo Services Corporation, Minneapolis, Minnesota Information Security Analyst 4 Recruited to provide technical project management to a team of 30+ engineers throughout the continental United States. Responsibilities included design review, workflow management, special project leadership, and point-of-contact for regular work requests. BORN Information Services, Minnetonka, Minnesota 2000 Recruited to help co-lead a new information security consulting practice that provided clients across multiple industries with technical professional services. Offered services included networking, information security and server administration. Practice development included development of a unique methodology for implementing an information security program. Responsibilities included provided pre-sales support to account executives as well as assisting with the identification, development, and qualification of sales leads. Ernst & Young LLP, Minneapolis, Minnesota Recruited to perform and lead IT audits, including documenting and providing expert analysis of system and network security. Audit and security assessment findings, sometimes based on SAS 70, included business-justified recommendations for remediation. International Network Services, Chicago, Illinois & Minneapolis, Minnesota Associate Network Systems Engineer Provided network professional services to a variety of clients in the Chicago, Illinois, and Minneapolis, Minnesota, metropolitan areas. Services included troubleshooting, network design and implementation, and fulfilling numerous other network administration functions on behalf of customers. EDUCATION AND CREDENTIALS Master of Science Degree in Engineering Management Concentration: Information Security Management THE GEORGE WASHINGTON UNIVERSITY Washington, District of Columbia Bachelor of Arts Degree in Computer Science LUTHER COLLEGE Decorah, Iowa Professional Certifications CISSP Certified Information Systems Security Professional #46697 Certified FAIR Basic Analyst FAIR Certified Trainer HITRUST Certified CSF Practitioner (CCSFP) #55570 NSA IAM & IEM Certified (deprecated) NSTISSI 4011, 4012, 4013, and 4015 Public Speaking Appearances Please See: Papers & Publications Please See:
5 BENJAMIN L. TOMHAVE, MS, CISSP PROFESSIONAL TRAINING AND CONFERENCES RSA Conference USA 2008, 2009, 2010, 2011, 2012, 2013, 2014 Secure , 2012, 2013 Rocky Mountain Information Security Conference 2011, 2012, 2013, 2014 ISSA International Conference 2010, 2011, 2012 ISC 2 Security Congress 2012 Society of Information Risk Analysts Conference (SIRAcon) 2012 NESCO Town Hall: Security Risk Management Practices for Electric Utilities (May 2012) OWASP AppSec USA (2010), AppSec DC (2010), Summit (2011) Security B-Sides Attendee: Las Vegas (2009), San Francisco (2010) Security B-Sides Organizer: Austin (2010, 2011), Ottawa (2010) ISSA International Conference 2010, 2011, 2012 EnergySec Summit 2010 Cyber Information Security Conference (CIScon) 2009 BlackHat USA Conference 2009 ISACA Information Security Management Conference 2005, 2006 NRA Range Safety Officer (2013) NSA INFOSEC Assessment Methodology (IAM) Training (2006) NSA INFOSEC Evaluation Methodology (IEM) Training (2006) BSi ISO Implementation (2005) Facilitative Leadership by Interaction Associates (2007) Managing Conflict by Ridge Associates (2005) Intercultural Training: Working with Indian Nationals by Prudential Financial (2007) SANS Track 8: System Forensics, Investigations, and Response (2004) PROFESSIONAL AFFILIATIONS Member American Bar Association Information Security Committee Member American Bar Association ediscovery and Digital Evidence Committee Senior Member Information Systems Security Association Previous Affiliations Former Member OASIS EKMI and KMIP Technical Committees Former Member Information Systems Audit and Control Association Former Member Open Web Application Security Program (OWASP) Former Board Member OWASP Northern Virgina (NoVA) Chapter Former Contributing Author / Core Guide (Practical Security) Truth to Power Association Former Member SANS Technology Institute Strategic Planning Advisory Committee Organizer, Co-Founder Security B-Sides Austin (2010, 2011) Former Member IEEE Computer Society Former Board Member Society of Information Risk Analysts Former Co-Chair American Bar Association Information Security Committee
Amit Garg BERKELEY RESEARCH GROUP, LLC 1800 M Street, N.W. 2 nd Floor Washington, D.C. 20036. Direct: 202.747.3483 agarg@thinkbrg.
Curriculum Vitae Amit Garg BERKELEY RESEARCH GROUP, LLC 1800 M Street, N.W. 2 nd Floor Washington, D.C. 20036 Direct: 202.747.3483 [email protected] SUMMARY Amit Garg brings over 17 years of information
Corporate Overview. MindPoint Group, LLC 8078 Edinburgh Drive, Springfield, VA 22153 Office: 703.636.2033 Fax: 866.761.7457 www.mindpointgroup.
Corporate Overview MindPoint Group, LLC 8078 Edinburgh Drive, Springfield, VA 22153 Office: 703.636.2033 Fax: 866.761.7457 www.mindpointgroup.com IS&P Practice Areas Core Competencies Clients & Services
Click to edit Master title style. How To Choose The Right MSSP
How To Choose The Right MSSP Meet Eric Eric Devansky Director of Global Security Services 15 Years of experience in the Cyber Security industry CISSP Palo Alto CNSE VMWare VCP Connect with me: @TruShield
Payment Card Industry Data Security Standard
Symantec Managed Security Services support for IT compliance Solution Overview: Symantec Managed Services Overviewview The (PCI DSS) was developed to facilitate the broad adoption of consistent data security
Business Case Outsourcing Information Security: The Benefits of a Managed Security Service
Business Case Outsourcing Information Security: The Benefits of a Managed Security Service seccuris.com (866) 644-8442 Contents Introduction... 3 Full- Time Experts vs. a Part- Time In- House Staff...
National Railroad Passenger Corp. (AMTRAK) Session 1 Threats and Constraints. Continuous. - Continuous Monitoring. - Continuous Assessment
0 National Railroad Passenger Corp. (AMTRAK) Session 1 Threats and Constraints Continuous - Continuous Monitoring - Continuous Assessment - Continuous Education 1 Amtrak Information Security Challenges
PCI DSS READINESS AND RESPONSE
PCI DSS READINESS AND RESPONSE EMC Consulting Services offers a lifecycle approach to holistic, proactive PCI program management ESSENTIALS Partner with EMC Consulting for your PCI program management and
An enterprise grade information security & forensic technical team
An enterprise grade information security & forensic technical team 1-647-892-3363 About Us Pyramid Cyber Security & Forensic (P) Limited is an ISO 9001-2008 and ISO 27001-2005 certified boutique Digital
Digi Device Cloud: Security You Can Trust
Digi Device Cloud: Security You Can Trust Abstract Historically, security has oftentimes been an afterthought or a bolt-on to any engineering product. In today s markets, however, security is taking a
Cyber Defense Operations Graduate Certificate
The SANS Technology Institute makes shorter groups of courses available to students who are unable to commit to a full master s degree program. These certificate programs will augment your skills, provide
The Protection Mission a constant endeavor
a constant endeavor The IT Protection Mission a constant endeavor As businesses become more and more dependent on IT, IT must face a higher bar for preparedness Cyber preparedness is the process of ensuring
Cautela Labs Cloud Agile. Secured. Threat Management Security Solutions at Work
Cautela Labs Cloud Agile. Secured. Threat Management Security Solutions at Work Security concerns and dangers come both from internal means as well as external. In order to enhance your security posture
PINK ELEPHANT THOUGHT LEADERSHIP WHITE PAPER DEVELOPING AN IT SERVICE MANAGEMENT TRAINING STRATEGY & PLAN
PINK ELEPHANT THOUGHT LEADERSHIP WHITE PAPER DEVELOPING AN IT SERVICE MANAGEMENT TRAINING STRATEGY & PLAN Executive Summary Developing and implementing an overall IT Service Management (ITSM) training
BMS Consulting Cyber Security and IT Technology Team
BMS Consulting Cyber Security and IT Technology Team Cyber Security and IT Technology Team Who we are High professional team from Ukraine which specializes on InfoSec and complex IT projects around the
FedVTE Training Catalog SUMMER 2015. advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov
FedVTE Training Catalog SUMMER 2015 advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov Access FedVTE online at: fedvte.usalearning.gov If you need any assistance please
NERC Cyber Security. Compliance Consulting. Services. HCL Governance, Risk & Compliance Practice
NERC Cyber Security Compliance Consulting Services HCL Governance, Risk & Compliance Practice Overview The North American Electric Reliability Corporation (NERC) is a nonprofit corporation designed to
FedVTE Training Catalog SPRING 2015. advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov
FedVTE Training Catalog SPRING 2015 advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov If you need any assistance please contact the FedVTE Help Desk here or email the
ISACA S CYBERSECURITY NEXUS (CSX) October 2015
ISACA S CYBERSECURITY NEXUS (CSX) October 2015 DO2 EXECUTIVE OVERVIEW Will you be a Cyber defender? ISACA launched the Cybersecurity Nexus (CSX) program earlier this year. CSX, developed in collaboration
Current IBAT Endorsed Services
Current IBAT Endorsed Services Managed Network Intrusion Prevention and Detection Service SecureWorks provides proactive management and real-time security event monitoring and analysis across your network
From 0 to Secure in 1 Minute APPSEC IL 2015. Moshe Ferber CCSK, CCSP
From 0 to Secure in 1 Minute APPSEC IL 2015 Moshe Ferber CCSK, CCSP #About Information security professional for over 20 years Popular industry speaker & lecturer (DefCon, BlackHat, Infosec and more) Co-Contributor
Tom VAN DEN EYNDE CISSP, CISA, CISM
Tom VAN DEN EYNDE CISSP, CISA, CISM Personal information First Name Tom Last Name Van den Eynde E-mail: [email protected] Phone: +32 - (0)495 91 20 62 Address: Meerminnenstraat 34, 2800 Birthday: May
PCI DSS. Payment Card Industry Data Security Standard. www.tuv.com/id
PCI DSS Payment Card Industry Data Security Standard www.tuv.com/id What Is PCI DSS? PCI DSS (Payment Card Industry Data Security Standard) is the common security standard of all major credit cards brands.the
INTEGRITY FORENSICS. Where the Evidence Tells the Truth. Marjorie E. Harris 2545 Bellwood Road Richmond, Virginia 23237 margie@integrity-forensics.
Marjorie E. Harris 2545 Bellwood Road Richmond, Virginia 23237 [email protected] My career began in forensics as a criminalist with the Independence, Missouri, Police Department Crime Laboratory
Caretower s SIEM Managed Security Services
Caretower s SIEM Managed Security Services Enterprise Security Manager MSS -TRUE 24/7 Service I.T. Security Specialists Caretower s SIEM Managed Security Services 1 Challenges & Solution Challenges During
Penetration testing & Ethical Hacking. Security Week 2014
Penetration testing & Ethical Hacking Security Week 2014 Agenda Penetration Testing Vulnerability Scanning Social engineering Security Services offered by Endava 2 3 Who I am Catanoi Maxim Information
SANS Vendor Marketing Programs
SANS Vendor Marketing Programs The audience at SANS represent some of the most forward thinking IT security practitioners looking for new ideas and realworld solutions. Phillip Lin Director of Marketing
Information & Asset Protection with SIEM and DLP
Information & Asset Protection with SIEM and DLP Keeping the Good Stuff in and the Bad Stuff Out Professional Services: Doug Crich Practice Leader Infrastructure Protection Solutions What s driving the
Network Management and Defense Telos offers a full range of managed services for:
Network Management and Defense Telos offers a full range of managed services for: Network Management Operations Defense Cybersecurity and Information Assurance Software and Application Assurance Telos:
Building a Security Operations Center. Randy Marchany VA Tech IT Security Office and Lab [email protected]
Building a Security Operations Center Randy Marchany VA Tech IT Security Office and Lab [email protected] CyberSecurity Operations Center Security Operations Center (SOC) term is being taken over by physical
Network Test Labs Inc Security Assessment Service Description Complementary Service Offering for New Clients
Network Test Labs Inc Security Assessment Service Description Complementary Service Offering for New Clients Network Test Labs Inc. Head Office 170 422 Richards Street, Vancouver BC, V6B 2Z4 E-mail: [email protected]
Ernesto F. Rojas CISSP, DFCP, IAM, IEM, DABRI, PSC, MBA
Ernesto F. Rojas CISSP, DFCP, IAM, IEM, DABRI, PSC, MBA Mr. Rojas has over 25 years of information systems consulting, supervisory, managerial and executive experience in various industries. He is considered
We are Passionate about Total Security Management Architecture & Infrastructure Optimisation Review
We are Passionate about Total Security Management Architecture & Infrastructure Optimisation Review The security threat landscape is constantly changing and it is important to periodically review a business
Deputy Chief Financial Officer Peggy Sherry. And. Chief Information Security Officer Robert West. U.S. Department of Homeland Security.
Deputy Chief Financial Officer Peggy Sherry And Chief Information Security Officer Robert West U.S. Department of Homeland Security Testimony Before the Subcommittee on Government Organization, Efficiency
CYBER SECURITY TRAINING SAFE AND SECURE
CYBER SECURITY TRAINING KEEPING YOU SAFE AND SECURE Experts in Cyber Security training. Hardly a day goes by without a cyber attack being reported. With this ever-increasing threat there is a growing need
Professional Services Overview
Professional Services Overview INFORMATION SECURITY ASSESSMENT AND ADVISORY NETWORK APPLICATION MOBILE CLOUD IOT Praetorian Company Overview HISTORY Founded in 2010 Headquartered in Austin, TX Self-funded
IT Cloud / Data Security Vendor Risk Management Associated with Data Security. September 9, 2014
IT Cloud / Data Security Vendor Risk Management Associated with Data Security September 9, 2014 Speakers Brian Thomas, CISA, CISSP In charge of Weaver s IT Advisory Services, broad focus on IT risk, security
SESSION 703 Wednesday, November 4, 9:00am - 10:00am Track: Advancing ITSM
SESSION 703 Wednesday, November 4, 9:00am - 10:00am Track: Advancing ITSM Optimizing ITSM for Cloud Computing Reginald Lo Director, Accelerate Management, VMware [email protected] Session Description Organizations
Payment Card Industry Data Security Standard (PCI DSS) v1.2
Payment Card Industry Data Security Standard (PCI DSS) v1.2 Joint LA-ISACA and SFV-IIA Meeting February 19, 2009 Presented by Mike O. Villegas, CISA, CISSP 2009-1- Agenda Introduction to PCI DSS Overview
Ellucian Cloud Services. Joe Street Cloud Services, Sr. Solution Consultant
Ellucian Cloud Services Joe Street Cloud Services, Sr. Solution Consultant Confidentiality Statement The information contained herein is considered proprietary and highly confidential by Ellucian Managed
Table of Contents EXECUTIVE SUMMARY ACKNOWLEDGEMENT AND DISCLAIMERS ENGAGEMENT SCOPE AND OBJECTIVES EXECUTIVE SUMMARY OF ASSESSMENT RESULTS
Table of Contents EXECUTIVE SUMMARY ACKNOWLEDGEMENT AND DISCLAIMERS ENGAGEMENT SCOPE AND OBJECTIVES EXECUTIVE SUMMARY OF ASSESSMENT RESULTS Jefferson Wells has prepared this report for Corporate Creations.
Access FedVTE online at: fedvte.usalearning.gov
FALL 2015 Access FedVTE online at: fedvte.usalearning.gov If you need any assistance please contact the FedVTE Help Desk her e or email the Help Desk at [email protected]. To speak with a Help Desk
Security & IT Governance: Strategies to Building a Sustainable Model for Your Organization
Security & IT Governance: Strategies to Building a Sustainable Model for Your Organization Outside View of Increased Regulatory Requirements Regulatory compliance is often seen as sand in the gears requirements
KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES. www.kaspersky.com
KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES www.kaspersky.com EXPERT SERVICES Expert Services from Kaspersky Lab are exactly that the services of our in-house experts, many of them global
Vulnerability Management
Vulnerability Management Buyer s Guide Buyer s Guide 01 Introduction 02 Key Components 03 Other Considerations About Rapid7 01 INTRODUCTION Exploiting weaknesses in browsers, operating systems and other
State of Web Application Security. Ralph Durkee Durkee Consulting, Inc. Rochester ISSA & OWASP Chapters [email protected]
Ralph Durkee Durkee Consulting, Inc. Rochester ISSA & OWASP Chapters [email protected] Ralph Durkee Founder of Durkee Consulting since 1996 Founder of Rochester OWASP since 2004 President of Rochester ISSA chapter
Cyber-Security Assessment, Remediation, and Identity Protection, Monitoring, and Restoration Services
4937 Fargo Street North Charleston SC 29418 Phone 843.266.2330 Fax 843.266.2333 w w w. c o d e l y n x. c o m Request for Information: Cyber-Security Assessment, Remediation, and Identity Protection, Monitoring,
Using Free Tools To Test Web Application Security
Using Free Tools To Test Web Application Security Speaker Biography Matt Neely, CISSP, CTGA, GCIH, and GCWN Manager of the Profiling Team at SecureState Areas of expertise: wireless, penetration testing,
Job Market Intelligence: Cybersecurity Jobs, 2015. 2015 Burning Glass Technologies
Job Market Intelligence: Cybersecurity Jobs, 2015 Introduction: Cybersecurity and the Job Market American employers have realized the vital importance of cybersecurity but that realization has created
Building Energy Security Framework
Building Energy Security Framework Philosophy, Design, and Implementation Building Energy manages multiple subsets of customer data. Customers have strict requirements for regulatory compliance, privacy
Critical Controls for Cyber Security. www.infogistic.com
Critical Controls for Cyber Security www.infogistic.com Understanding Risk Asset Threat Vulnerability Managing Risks Systematic Approach for Managing Risks Identify, characterize threats Assess the vulnerability
(BDT) BDT/POL/CYB/Circular-002. +41 22 730 6057 +41 22 730 5484 [email protected]
2011 15 (BDT) BDT/POL/CYB/Circular-002 +41 22 730 6057 +41 22 730 5484 [email protected] 2008 2010 2010 International Telecommunication Union Place des Nations CH-1211 Geneva 20 Switzerland Tel: +41
TCS Managed Security Services
IT OUTSOURCING VENDOR PROFILE OF: TCS Managed Security Services 1. Background... 1 2. Revenue Summary... 1 3. Key Offerings... 2 3.1.. Security Monitoring and Incident Management... 2 3.2.. Network security...
Accelerate your mission with GTSI Integration Services
Accelerate your mission with GTSI Integration Services GTSI delivers deep technical expertise and integrates advanced computer and networking technologies. Organizations requiring technology integration
DoD Directive (DoDD) 8570 & GIAC Certification
DoD Directive (DoDD) 8570 & GIAC Certification Date Updated: January 2014 National Account Manager 678-714-5712 Director 703-968-0103 What is DoDD 8570? Department of Defense Directive 8570 provides guidance
CyberSecurity: Trends, Careers, & the Next Generation
CyberSecurity: Trends, Careers, & the Next Generation Ludwig Goon March 2-4, 2016 Disclaimer: The view and opinions expressed in the presentation are that of the presenter and is not affiliated with employers.
Peter Dulay, CISSP Senior Architect, Security BU
CA Enterprise Log Manager 12.5 Peter Dulay, CISSP Senior Architect, Security BU Agenda ELM Overview ELM 12.5: What s new? ELM to CA Access Control/PUPM Integration CA CONFIDENTIAL - Internal Use Only Overview
3rd Party Assurance & Information Governance 2014-2016 outlook IIA Ireland Annual Conference 2014. Straightforward Security and Compliance
3rd Party Assurance & Information Governance 2014-2016 outlook IIA Ireland Annual Conference 2014 Continuous Education Services (elearning/workshops) Compliance Management Portals Information Security
Hosted by Lunarline: School of Cyber Security
Hosted by Lunarline: School of Cyber Security Please Fax Government Purchase Orders and SF 182s To (22) 315-33 Cybersecurity is one of the hottest issues for today s Federal and DOD Agencies and commercial
PCI DATA SECURITY STANDARD OVERVIEW
PCI DATA SECURITY STANDARD OVERVIEW According to Visa, All members, merchants and service providers must adhere to the Payment Card Industry (PCI) Data Security Standard. In order to be PCI compliant,
White Paper Achieving PCI Data Security Standard Compliance through Security Information Management. White Paper / PCI
White Paper Achieving PCI Data Security Standard Compliance through Security Information Management White Paper / PCI Contents Executive Summary... 1 Introduction: Brief Overview of PCI...1 The PCI Challenge:
HP ESP Partner Enablement Fortify Proof of Concept Boot Camp Training
HP ESP Partner Enablement Fortify Proof of Concept Boot Camp Training HP and HP Enterprise Security Products are committed to your success as an HP Partner. In the Fortify Proof of Concept Boot Camp Training,
Security Breaches and Vulnerability Experiences Overview of PCI DSS Initiative and CISP Payment Application Best Practices Questions and Comments
Security in the Payment Card Industry OWASP AppSec Seattle Oct 2006 Hap Huynh, Information Security Specialist, Visa USA [email protected] Copyright 2006 - The OWASP Foundation Permission is granted to copy,
Discover & Investigate Advanced Threats. OVERVIEW
Discover & Investigate Advanced Threats. OVERVIEW HIGHLIGHTS Introducing RSA Security Analytics, Providing: Security monitoring Incident investigation Compliance reporting Providing Big Data Security Analytics
Cloud IaaS: Security Considerations
G00210095 Cloud IaaS: Security Considerations Published: 7 March 2011 Analyst(s): Lydia Leong, Neil MacDonald Ensuring adherence to your organization's security and compliance requirements is one of the
persistent security in a changing world.
persistent security in a changing world. We do Everything for the Secure Success of your Company ISPIN AG is a leading supplier of cyber securityand network solutions as well as consulting services regarding
VMware vcloud Air Security TECHNICAL WHITE PAPER
TECHNICAL WHITE PAPER The Shared Security Model for vcloud Air The end-to-end security of VMware vcloud Air (the Service ) is shared between VMware and the customer. VMware provides security for the aspects
Introduction to QualysGuard IT Compliance SaaS Services. Marek Skalicky, CISM, CRISC Regional Account Manager for Central & Adriatic Eastern Europe
Introduction to QualysGuard IT Compliance SaaS Services Marek Skalicky, CISM, CRISC Regional Account Manager for Central & Adriatic Eastern Europe A Unified and Continuous View of ICT Security, Risks and
CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL
CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL WHAT IS CDM? The continuous stream of high profile cybersecurity breaches demonstrates the need to move beyond purely periodic, compliance-based approaches to
DEVELOPING AN IT SERVICE MANAGEMENT TRAINING STRATEGY & PLAN. Version : 1.0 Date : April 2009 : Pink Elephant
DEVELOPING AN IT SERVICE MANAGEMENT TRAINING STRATEGY & PLAN Version : 1.0 Date : April 2009 Author : Pink Elephant Table of Contents 1 Executive Overview... 3 2 Manager Responsibilities... 4 2.1 Before
Certification Programs
Registration Questions? Please contact us directly. 507 S. Grand Ave., Lansing, MI 48933 [email protected] (517) 342-9057 Certification Programs 2015 Following the lecture on day 2, students have the
Q1 Labs Corporate Overview
Q1 Labs Corporate Overview The Security Intelligence Leader Who we are: Innovative Security Intelligence software company One of the largest and most successful SIEM vendors Leader in Gartner 2011, 2010,
Anypoint Platform Cloud Security and Compliance. Whitepaper
Anypoint Platform Cloud Security and Compliance Whitepaper 1 Overview Security is a top concern when evaluating cloud services, whether it be physical, network, infrastructure, platform or data security.
NEC Managed Security Services
NEC Managed Security Services www.necam.com/managedsecurity How do you know your company is protected? Are you keeping up with emerging threats? Are security incident investigations holding you back? Is
Autodesk PLM 360 Security Whitepaper
Autodesk PLM 360 Autodesk PLM 360 Security Whitepaper May 1, 2015 trust.autodesk.com Contents Introduction... 1 Document Purpose... 1 Cloud Operations... 1 High Availability... 1 Physical Infrastructure
Alcatel-Lucent Services
SOLUTION DESCRIPTION Alcatel-Lucent Services Security Introduction Security is a sophisticated business and technical challenge, and it plays an important role in the success of any network, service or
North American Electric Reliability Corporation (NERC) Cyber Security Standard
North American Electric Reliability Corporation (NERC) Cyber Security Standard Symantec Managed Security Services Support for CIP Compliance Overviewview The North American Electric Reliability Corporation
An Introduction to SIEM & RSA envision (Security Information and Event Management) January, 2011
An Introduction to SIEM & RSA envision (Security Information and Event Management) January, 2011 Brian McLean, CISSP Sr Technology Consultant, RSA Changing Threats and More Demanding Regulations External
Interdisciplinary Program in Information Security and Assurance. By Kossi Edoh NC A&T State University Greensboro
Interdisciplinary Program in Information Security and Assurance By Kossi Edoh NC A&T State University Greensboro Information Assurance The protection of electronic information and infrastructures that
Enterprise level security, the Huddle way.
Enterprise level security, the Huddle way. Security whitepaper TABLE OF CONTENTS 5 Huddle s promise Hosting environment Network infrastructure Multiple levels of security Physical security System & network
IoT & INFOSEC: A REPORT FROM THE TRENCHES - AGC IT Conference- July 2015 [email protected]
IoT & INFOSEC: A REPORT FROM THE TRENCHES - AGC IT Conference- July 2015 SECURITY IS A PROCESS, NOT A STATE CARVE SYSTEMS LLC [email protected] Carve s Roots (tl;dr)
Big 4 Information Security Forum
San Francisco ISACA Chapter Proudly Presents: Big 4 Information Security Forum A Day-Long, Multi-Session Event, being held in San Francisco @ the Sir Francis Drake Hotel! *** PLEASE NOTE THIS EVENT WILL
Managed Intrusion, Detection, & Prevention Services (MIDPS) Why E-mail Sorting Solutions? Why ProtectPoint?
Managed Intrusion, Detection, & Prevention Services (MIDPS) Why E-mail Sorting Solutions? Why ProtectPoint? Why? Focused on Managed Intrusion Security Superior-Architected Hardened Technology Security
Vendor Risk Management Financial Organizations
Webinar Series Vendor Risk Management Financial Organizations Bob Justus Chief Security Officer Allgress Randy Potts Managing Consultant FishNet Security Bob Justus Chief Security Officer, Allgress Current
C21 Introduction to User Access
C21 Introduction to User Access Management Introduction to User Access Management What we'll cover today What is it? Why do I care? Current trends in Identity & Access Management How do I audit it? What
Master of Arts, Social Justice & Equity Studies, Brock University 2006. Bachelor of Arts, Highest Honours, Carleton University 2003
TOMEE E. SOJOURNER, M.A. Suite 919, 61 Heintzman Street. Toronto, ON M6P 5A2 Email: [email protected] Work: (437) 889-8352 www.tomeesojourner.com Twitter: beyonddiversity SUMMARY Experienced Management,
Information Security Officer (# 1773) Salary: Grade 25 ($81,808-$102,167) / Grade 27 ($90,595 to $113,141) Summary of Duties. Minimum Qualifications
Thomas K. Lee, Executive Director/CIO Human Resources Department (518) 447-2906 Information Security Officer (# 1773) Salary: Grade 25 ($81,808-$102,167) / Grade 27 ($90,595 to $113,141) The New York State
