ISSA Baltimore Chapter Monthly Meeting April 22, 2015
|
|
- Kelly Warner
- 8 years ago
- Views:
Transcription
1 ISSA Baltimore Chapter Monthly Meeting April 22, 2015, Websense
2 Board of Directors Bill Smith, CISSP, GSNA, CEH, GPEN, GCFA, GCFE - President Sidney Spunt, CISSP - VP Operations Kevin Drury Secretary Carol Klessig, CISSP - VP Professional Development Rod Zwainz, CISSP, PMP - VP Education Phil Rogofsky, CISSP, Network+, CPA Treasurer Steve Chan, CISSP, PMP VP Membership Dennis Dworkowski, CISSP-ISSEP VP Outreach, Websense
3 Baltimore Chapter Sponsors
4 Agenda / Announcements Welcome to Parsons, 7110 Samuel Morse Drive, Suite 200 Columbia, Maryland Non-U.S. Citizen Requirements Any guests or new members in attendance? (ISC) 2 CPE Submissions Individual Responsibility New CISSP and SSCP Domains Chapter Strategic Plan Chapter STEM Activity New Member Promotion CISSP Chapter Badges / Shirts and Jackets with ISSA-Baltimore Logo CISSP Study Group Spring 2015 February 24 thru May 19, 2015 New Location: Phoenix TS Amazon Affiliates program LinkedIn Group Facebook Page ISSA-Baltimore Chapter Future Meeting schedule
5 New Members Since February Meeting Bradley Cullum Shane Daniels Stephen Kapuschansky Christine L. Kelly Zachary Kline Scott Lansing 265 Total Members Ambyr Leidig Deborah Maletz George Manousoyianakis Dorothy Patterson Gary Szukalski
6 ISSA International Conference: October Keynote Speaker Vinton G. Cerf Vice President and Chief Internet Evangelist Google Register Now for the ISSA International Conference October 12-13, 2015 Chicago, Illinois, USA The first 100 paid attendees will enter into a raffle to receive a FREE ipad!
7 CISSP Domains, Effective April 15, 2015 Security and Risk Management (Security, Risk, Compliance, Law, Regulations, Business Continuity) Asset Security (Protecting Security of Assets) Security Engineering (Engineering and Management of Security) Communications and Network Security (Designing and Protecting Network Security) Identity and Access Management (Controlling Access and Managing Identity) Security Assessment and Testing (Designing, Performing, and Analyzing Security Testing) Security Operations (Foundational Concepts, Investigations, Incident Management, Disaster Recovery) Software Development Security (Understanding, Applying, and Enforcing Software Security)
8 Systems Security Certified Practitioner (SSCP) Domains, Effective April 15, 2015 * Access Controls * Cryptography * Security Operations and Administration * Networks and Communications Security * Risk Identification, Monitoring, and Analysis * Systems and Application Security * Incident Response and Recovery * The SSCP indicates a practitioner s technical ability to tackle the operational demands and responsibilities of security practitioners, including authentication, security testing, intrusion detection/prevention, incident response and recovery, attacks and countermeasures, cryptography, malicious code countermeasures, and more.
9 New Member Promotion Rules: 1. Promotion begins August 1, New member must identify referring member when joining 3. $25.00 Amazon Gift Card awarded to referring member 4. Referring member s registration must be current 5. Awards will be presented at monthly Chapter meeting 6. Program will run through December 31, 2015 and be reevaluated by the board after that time 7. Board of Directors not eligible to participate
10 Chapter Strategic Plan Vision - To be the community of choice for international cybersecurity professionals dedicated to advancing individual growth, managing technology risk and protecting critical information and infrastructure Mission - ISSA is a not-for-profit, international organization of information security professionals and practitioners. It provides educational forums, publications, and peer interaction opportunities that enhance the knowledge, skill, and professional growth of its members
11 Change to the Chapter By-laws ARTICLE I: Name Current: The name of this organization shall be the Baltimore Metropolitan Chapter, Information Systems Security Association, Inc., (ISSA) hereafter referred to as the "Chapter". Change: The name of this organization shall be the Central Maryland Chapter of the Information Systems Security Association, Inc., (ISSA) hereafter referred to as the "Chapter".
12 Chapter Strategic Plan-Core Values Collaboration - We believe that working together toward a common goal is essential to the success of the association. Knowledge Sharing - We encourage knowledge sharing as a result of our belief that all of us are smarter and more productive than any one of us. Leadership - We inspire each other to achieve and grow through a shared vision and passion to excel. Professional Development - We support the development of our people, association and profession through positive relationships, dynamic synergies and innovative growth opportunities. Innovation - We search for new avenues to improve the Cybersecurity community, ISSA International and our Chapter
13 Chapter Strategic Plan-Goals and Strategies Goal I:Expand Chapter Influence outside of Howard County Area Change chapter name to ISSA of Central Maryland Reach out to security companies outside Howard County Join and be active the Chesapeake region Tech Council Objective 2: Increase Benefit to Members Seek out more varied speakers for chapter meetings. Develop relationship with other organizations such as other ISSA Chapters, IIA, IEEE Baltimore, and ISACA. Create relationships with educational organizations to provide more costs training opportunities such as Phoenix Poll members to see what they what additional opportunities they would like the Chapter to pursue. Goal 3:Improve Relationship with Companies/Sponsors Create Corporate Ambassadors where members represent the Chapter to their employees, Start monthly communication/ newsletter to Sponsors Host on-site Meet and Greet Events at Large Companies. Poll Sponsors to determine what they would like out of Sponsorship. Goal 4-Promote Chapter's Identity Increase STEM involvement and participation events such in the HoCo STEM Festival. Increase involvement in local security events such as CyberMarylandConference;. Increase involvement with Howard Tech Council Increase support to our Student Chapter at UMBC and explore creating additional student chapters.
14 Chapter STEM Activities 3 rd HoCo STEM Festival-1-5 at HCC on June 7 th Chapter will be hosting a table 1 st Maryland STEM Festival November Chapter is an inaugural sponsor at the Supporter level Chapter may host an event
15 New Member Promotion Congratulations - $25.00 Amazon Gift Card winners: Chris Ambrose John Barker Scott Crum Jody Denner Chuck Dickens Charles Dickert * Devin Elmore * Ivan Gordon Monique Mitchner * Matt Morris Nick Rapp Katelin Rowley Oliver Thomas * Rod Zwainz *
16 ISSA-Baltimore CISSP Study Group Fall 2015 Schedule Phoenix TS, Little Patuxent Parkway, Suite 500 Columbia, MD Feb 15 Kickoff for CISSP - Cancelled Snow 24 Feb 15 Information Security Governance & Risk Management 3 Mar 15 Security Architecture & Design Cancelled Snow 10 Mar 15 Access Control 17 Mar 15 Access Control 24 Mar 15 Cryptography Part 1 31 Mar 15 Cryptography Part 2 7 Apr 15 Physical & Environmental Security 14 Apr 15 Software Development Security 21 Apr 15 Business Continuity & Disaster Recovery 28 Apr 15 Telecommunications & Network Security Part 1 5 May 15 Telecommunications & Network Security Part 2 12 May 15 Legal, Regulations, Investigations and Compliance 19 May 15 Security Architecture & Design 26 May 15 Operations Security 2 June 15 Practice Exam / Review
17 Our New Chapter Blog!! As 2015 is now underway, we wanted to provide you with a list of potential networking and volunteering opportunities tentatively scheduled for this year. We are always looking for members to assist with various outreach and chapter activities that need to be completed. You may be asking yourself, what is in it for me? Listed below are several benefits for volunteering your time to help the Baltimore ISSA chapter out. Volunteering provides a chance to learn new skills. Carol Klessig is learning to create a unique hash tag this weekend. Learning about social media (Twitter) may help Carol add to her resume. Please Carol at V_P_Professional_Development@issa.org If you would like to be considered for the new position known as Director of Publicity. Helping others learn and encouraging our youth feels great. Rewards are not always monetary. Encouraging a student can be your chance to pay it forward. This is especially beneficial for recent graduates or new members in the security field. Camaraderie. Social outings like our field trips can be a chance to form a new friendship with others in the IT field. CPE's. Working for the club can generate CPE's that can be used to maintain your certifications. Currently, we need our website updated and possibly redesigned. Does anyone have a experience in web design that could assist us with updating or redesigning our current website? You can volunteer for just a single event or on a regular basis. A variety of items exist that we could use assistance with. These items include writing a blog article, greeting members at the door or assisting with the setup/cleanup at chapter meetings. If you see a position aching to be filled, talk to one of the board members.
18 Rescheduled September 1, 2015
19 Open Software and Trust--Better Than Free? 2-Hour Live Event: Tuesday, April 28, 2015 Start Time: 9:00 a.m. US-Pacific/ 12:00 p.m. US-Eastern/ 5:00 p.m. London Web Conference Overview: Last year we were hit with multiple Open Source vulnerabilities. The most significant was Heartbleed, or was it the potential of Poodle or the other half dozen or so vulnerabilities. If it wasn t that, then what about ShellShock (the bash bug? The open source world is supposed to be safer as everyone can examine the software, but are enough experts examining it? Session Moderator: Phillip Griffin - ISSA Educational Advisory Council Member Speakers: Mark Kadrich- Chief Information Security & Privacy Officer, Health Connect Timothy Jarrett - Senior Director, Product Marketing, Veracode
20
21 2015 Meetings and Events Date Speaker Organization Topic January 28, 2015 Kathy Worgul Carroll County Business & Employment How Can LinkedIn Assist in Career Resource Center Advancement February 25, 2015 Robert K. Gardner New World Technology Partners Cyber Risk, Thru the Shareholder Lens March 25, 2015 Cancelled April 22, 2015 Anthony United States Department of Justice Insider Threats, or the Case of the Extra 8 Teelucksingh Lines of Code May 20, 2015 Brian E. Dykstra Atlantic Data Forensics, Inc. Murder or Self Defense? July 27, 2015 Rhonda Ferrell CyberSecurity & Your Professional Life: A Value-Add Approach September 1, 2015 Mid-Atlantic ISSA Security Conference, NIST, Gaithersburg, MD September 16, 2016 Joint Meeting w/ MD IMMA / Infragard October 12 13, 2015 ISSA International Conference Chicago Illinois
22 May 20, 2015 Speaker Brian E. Dykstra Atlantic Data Forensics, Inc. Mr. Dykstra has over 19 years experience in investigations, computer forensics, incident response, network and wireless security testing and information security. Mr. Dykstra was previously the CIO and Director of Professional Education at Mandiant, Inc. where he was responsible for the development and management of numerous advanced computer security and cybercrime investigation courses. Before founding Atlantic Data Forensics (formerly Jones Dykstra and Associates, Inc.), Mr. Dykstra was the CIO & Director of Professional Education and a founding member of Mandiant, where he was responsible for the development and management of numerous advanced computer security and cybercrime investigation courses. Prior to becoming a co-founder of Mandiant (formerly known as Red Cliff Consulting, LLC), Mr. Dykstra was a Senior Program Manager at Communications Technologies where he led commercialization efforts of computer security and managed services business groups; supervised the secure remote management of UNIX and Windows customer and network systems, and provided technical oversight for business development efforts and technical assistance to commercial and government sales groups.
23 May 20, 2015 Topic Murder or Self Defense? Brian Dykstra, CEO, Atlantic Data Forensics will review the West Virginia 1 st degree murder trial of Michael Ian Palmer for the pre-meditated killing of his father-in-law Everett Wilson during a home invasion break-in. Mr. Dykstra will recount the various testimony given during the trial and the digital evidence he was presented with as the defense computer forensics expert. From bar fights and brass knuckles to Facebook posts and crime scene investigations West Virginia v Michael Ian Palmer has it all.
24 April 22, 2015 Speaker Anthony Teelucksingh Senior Counsel at U.S. Department of Justice Federal prosecutor in the Criminal Division section responsible for the prosecution of cybercrime, including violations of the Computer Fraud and Abuse Act. Casework includes the prosecution of computer intrusions, damage to computers, illegal spam, online extortion, online stalking, identity theft, credit card fraud, and trafficking in counterfeit goods including luxury goods, pharmaceuticals, software, and motion pictures. Provide expertise to the U.S. Attorneys office and federal and state law enforcement agencies. Provide training to U.S. and foreign law enforcement agencies on electronic evidence, searching and seizing computers, and courtroom presentations in cybercrime cases. Represent the United States on cybercrime and privacy matters in multi-lateral international clients including the UN Office on Drugs and Crime Intergovernmental Experts Group on Cybercrime, International Telecommunications Union, Asia-Pacific Economic Cooperation Telecommunications Working Group, and Organization of American States. In bilateral discussions with numerous foreign governments on anti-cybercrime capacity building, privacy, data protection and law enforcement cooperation. Special Assistant United States Attorney, District of Maryland, to prosecute cases concerning cybercrime and criminal intellectual property violations
25 April 22, 2015 Topic Fannie Mae logic-bomb saboteur convicted A computer contractor has been convicted of planting a logic bomb on the servers of Fannie Mae, the financially troubled US housing and mortgage giant. Rajendrasinh Babubhai Makwana, 36, responded to the termination of his two-year-long spell as a software development contractor at Fannie Mae in October 2008 by planting a malicious script designed to wipe all the data from its network on 31 January Anyone attempting to access data on the system after the logic bomb went off would have received the message "Server Graveyard". Fortunately, Fannie Mae sysadmins found the malware days after Makwana left work at the Urbana, Maryland technology centre and weeks before the logic bomb was due to explode. Subsequent forensic analysis of computer logs traced the attempted attack back to Makwana's workplace laptop, which yielded more evidence. Because of his job developing software for Unix boxes, Makwana reportedly had access to the full range of Fannie Mae's 5,000 servers.
ISSA Baltimore Chapter Monthly Meeting February 25, 2015
ISSA Baltimore Chapter Monthly Meeting February 25, 2015 Interset!, CyberCore Technologies, Phoenix TS, Board of Directors Bill Smith, CISSP, GSNA, CEH, GPEN, GCFA, GCFE - President Sidney Spunt, CISSP
More informationISSA Baltimore Chapter Monthly Meeting June 24, 2015
ISSA Baltimore Chapter Monthly Meeting June 24, 2015, Websense Board of Directors Bill Smith, CISSP, GSNA, CEH, GPEN, GCFA, GCFE - President Sidney Spunt, CISSP - VP Operations Kevin Drury Secretary Carol
More informationISSA Baltimore Chapter Monthly Meeting August 26, 2015
ISSA Baltimore Chapter Monthly Meeting August 26, 2015 Board of Directors Bill Smith, CISSP, GSNA, CEH, GPEN, GCFA, GCFE - President Sidney Spunt, CISSP - VP Operations Kevin Drury, CISSP Secretary Carol
More informationISSA Baltimore Chapter. Monthly Meeting October 28, 2015
ISSA Baltimore Chapter Monthly Meeting October 28, 2015 Agenda / Announcements Welcome to Parsons, 7110 Samuel Morse Drive, Suite 200 Columbia, Maryland 21046 Non-U.S. Citizen Requirements Any guests or
More informationU. S. Attorney Office Northern District of Texas March 2013
U. S. Attorney Office Northern District of Texas March 2013 What Is Cybercrime? Hacking DDOS attacks Domain name hijacking Malware Other computer related offenses, i.e. computer and internet used to facilitate
More informationInformation Systems Security Certificate Program
Information Technologies Programs Information Systems Security Certificate Program Accelerate Your Career extension.uci.edu/infosec University of California, Irvine Extension s professional certificate
More informationISSA SOUTH TEXAS CHAPTER NEWSLETTER
Page 1 of 5 ISSA SOUTH TEXAS CHAPTER NEWSLETTER For May 2013 Voted "Outstanding Chapter of 2007" by ISSA International As always, please feel free to contact me with any suggestions or requests to improve
More informationKevin Savoy, CPA, CISA, CISSP Director of Information Technology Audits Brian Daniels, CISA, GCFA Senior IT Auditor
IT Audit/Security Certifications Kevin Savoy, CPA, CISA, CISSP Director of Information Technology Audits Brian Daniels, CISA, GCFA Senior IT Auditor Certs Anyone? There are many certifications out there
More informationCYBERSECURITY NEXUS ROBERT E STROUD INTERNATIONAL PRESIDENT, ISACA RAMSÉS GALLEGO INTERNATIONAL VICE PRESIDENT, ISACA
CYBERSECURITY NEXUS ROBERT E STROUD INTERNATIONAL PRESIDENT, ISACA RAMSÉS GALLEGO INTERNATIONAL VICE PRESIDENT, ISACA Robert Stroud International President, ISACA VP Strategy & Innovation, CA Technologies
More informationReport on CAP Cybersecurity November 5, 2015
Agenda Number 7. Report on CAP Cybersecurity November 5, 2015 Phil Cook CISSP, CISM Manager, Information Technologies Risk #1 External Attacks PR 81 Protect and secure CAP's Information Technology assets
More information2014 Montana Government IT Conference. Securing Data Networks and People
Presenter: Matt Bennett, Genetec Leveraging the Cloud for Hybrid Video Surveillance Matt is based in Seattle, WA and is the Western North America pre-sales engineer for Genetec (the world s leader in unified
More informationJOINT EVENT WITH IIBA-LA. Trends & Best Practices in. Cybersecurity for networks, cloud computing and mobile
JOINT EVENT WITH IIBA-LA Trends & Best Practices in Cybersecurity for networks, cloud computing and mobile April 23 rd, 2015 Hands-on Experts Share Current Strategies to Manage Cybersecurity Today s enterprise
More informationMARYLAND. Cyber Security White Paper. Defining the Role of State Government to Secure Maryland s Cyber Infrastructure.
MARYLAND Cyber Security White Paper Defining the Role of State Government to Secure Maryland s Cyber Infrastructure November 1, 2006 Robert L. Ehrlich, Jr., Governor Michael S. Steele, Lt. Governor Message
More informationFinancial Implications of Cybercrime Meeting the Information Security Management Challenge in the Cyber-Age
Financial Implications of Cybercrime Meeting the Information Security Management Challenge in the Cyber-Age Southern California Association for Financial Professionals February 14, 2014 Stan Stahl, Ph.D.
More information2015 Michigan NASCIO Award Nomination. Cyber Security Initiatives: Michigan Cyber Disruption Response Strategy
2015 Michigan NASCIO Award Nomination Cyber Security Initiatives: Michigan Cyber Disruption Response Strategy Sponsor: David Behen, DTMB Director and Chief Information Officer Program Manager: Rod Davenport,
More informationEncyclopedia of Information Assurance Suggested Titles: March 25, 2013 The following titles have not been contracted.
Encyclopedia of Information Assurance Suggested Titles: March 25, 2013 The following titles have not been contracted. Administrative Awareness Case Study: Government Offices Certification and Accreditation:
More informationHow-To Guide: Cyber Security. Content Provided by
How-To Guide: Cyber Security Content Provided by Who needs cyber security? Businesses that have, use, or support computers, smartphones, email, websites, social media, or cloudbased services. Businesses
More informationTHE ALABAMA CHAPTER OF THE ASSOCIATION OF CERTIFIED FRAUD EXAMINERS AND THE UNIVERSITY OF ALABAMA @ BIRMINGHAM SCHOOL OF BUSINESS
THE ALABAMA CHAPTER OF THE ASSOCIATION OF CERTIFIED FRAUD EXAMINERS THE UNIVERSITY OF ALABAMA @ BIRMINGHAM SCHOOL OF BUSINESS DAY ONE Fraud Trends 2012 AND PRESENT OUR 5th ANNUAL TRAINING SEMINAR DATE:
More informationInfoSec Academy Application & Secure Code Track
Fundamental Courses Foundational Courses InfoSec Academy Specialized Courses Advanced Courses Certification Preparation Courses Certified Information Systems Security Professional (CISSP) Texas Security
More informationInfoSec Academy Forensics Track
Fundamental Courses Foundational Courses InfoSec Academy Specialized Courses Advanced Courses Certification Preparation Courses Certified Information Systems Security Professional (CISSP) Texas Security
More informationNATIONAL POLICING CYBERCRIME SUMMIT. October 19 & 20, 2015 Toronto
NATIONAL POLICING CYBERCRIME SUMMIT October 19 & 20, 2015 Toronto BACKGROUND Summit partners, the Canadian Association of Chiefs of Police and the Canadian Advanced Technology Alliance, believe the National
More informationThe Top Ten of Information Security - For 2015
7 th Annual Information Security Summit The Executive Forum Information Security Management Overview June 4, 2015 Copyright 2015. Citadel Information Group. All Rights Reserved. 2 Establishing Leadership.
More informationOpen Software and Trust Better Than Free? April 28, 2015 Start Time: 9am US Pacific /12 noon US Eastern/ 5pm London Time
Open Software and Trust Better Than Free? April 28, 2015 Start Time: 9am US Pacific /12 noon US Eastern/ 5pm London Time 1 T Sponsored by: #ISSAWebConf 2 Welcome Conference Moderator Phillip Griffin CISM,
More informationTestimony of. Before the United States House of Representatives Committee on Oversight and Government Reform And the Committee on Homeland Security
Testimony of Dr. Phyllis Schneck Deputy Under Secretary for Cybersecurity and Communications National Protection and Programs Directorate United States Department of Homeland Security Before the United
More informationINSIGHTS AND RESOURCES FOR THE CYBERSECURITY PROFESSIONAL
INSIGHTS AND RESOURCES FOR THE CYBERSECURITY PROFESSIONAL BY 2 In enterprise IT, there is a single point where everything that matters in information, technology and business converges: Cybersecurity Nexus
More informationCertification and Training
Certification and Training CSE 4471: Information Security Instructor: Adam C. Champion Autumn Semester 2013 Based on slides by a former student (CSE 551) Outline Organizational information security personnel
More informationThe Next Generation of Security Leaders
The Next Generation of Security Leaders In an increasingly complex cyber world, there is a growing need for information security leaders who possess the breadth and depth of expertise necessary to establish
More informationProtecting Energy s Infrastructure and Beyond: Cybersecurity for the Smart Grid
Protecting Energy s Infrastructure and Beyond: Cybersecurity for the Smart Grid Which is it? Cyber Security ~or~ Cybersecurity? Dr. Ernie Lara President Presenters Estrella Mountain Community College Dr.
More informationAuditing After a Cyber Attack JAX IIA Chapter Meeting Cybersecurity and Law Enforcement
Auditing After a Cyber Attack JAX IIA Chapter Meeting Cybersecurity and Law Enforcement Copyright Elevate Consult LLC. All Rights Reserved 1 Presenter Ray Guzman MBA, CISSP, CGEIT, CRISC, CISA Over 25
More informationPacific Islands Telecommunications Association
Pacific Islands Telecommunications Association 8 th Fl, Dominion Hse PHONE : (679) 331 1638 PO BOX 2027, Govt Bldg FAX : (679) 330 8750 SUVA, FIJI Islands E-mail: pita@connect.com.fj www.pita.org.fj INVITATION
More informationIRS/Tax Practitioners Symposium. 2014 The Illinois CPA Society
EARLY BIRD DISCOUNT Register by September 30, 2014 2014 The Illinois CPA Society Tuesday, October 21, 2014 Rosemont, IL IRS/Tax Practitioners Symposium Interact with experts, hear the latest updates and
More information2014 STRATEGIC PLAN: INTRODUCTION
2014 STRATEGIC PLAN: INTRODUCTION The Association of Inspectors General s Strategic Plan identifies our collective aspirations of what this organization may achieve in the years to come. It is designed
More informationRobert A. Bauerschmidt graduated cum laude from The University of Illinois College of Law in May, 1990 and received his Bachelor of Arts Degree from
Robert A. Bauerschmidt graduated cum laude from The University of Illinois College of Law in May, 1990 and received his Bachelor of Arts Degree from The University of Michigan in May, 1987. In 1990, he
More informationWednesday, March 11, 2015 8:00am to 4:30pm. Seats are filling fast, sign up today!
EVENT NOTICE Making the Business Case for Cybersecurity & Public-Private Sector Cooperation Wednesday, March 11, 2015 8:00am to 4:30pm Presented by: ISACA - Greater Hartford Chapter Guest Speaker: Judith
More informationSecurity Transcends Technology
INTERNATIONAL INFORMATION SYSTEMS SECURITY CERTIFICATION CONSORTIUM, INC. Career Enhancement and Support Strategies for Information Security Professionals Paul Wang, MSc, CISA, CISSP Paul.Wang@ch.pwc.com
More informationCYBERSECURITY BEST PRACTICES FOR SMALL AND MEDIUM PENNSYLVANIA UTILITIES
CYBERSECURITY BEST PRACTICES FOR SMALL AND MEDIUM PENNSYLVANIA UTILITIES The information provided in this document is presented as a courtesy to be used for informational purposes only. This information
More informationGRC/Cyber Insurance. February 18, 2014. Start Time: 9 AM US Pacific, Noon US Eastern, 5 pm London. Join the conversation: #ISSAWebConf
GRC/Cyber Insurance February 18, 2014 Start Time: 9 AM US Pacific, Noon US Eastern, 5 pm London Join the conversation: 1 Generously sponsored by: 2 Welcome Conference Moderator Allan Wall ISSA Web Conference
More informationISSA SOUTH TEXAS CHAPTER NEWSLETTER
Page 1 of 7 ISSA SOUTH TEXAS CHAPTER NEWSLETTER For November 2013 Voted "Outstanding Chapter of 2007 and 2013" by ISSA International As always, please feel free to contact me with any suggestions or requests
More informationSponsorship Opportunities 5-2016. Thomas Odams. Events Manager, EMEA, RANT Events t: 0203 119 3387 m: 07827 870 359 todams@rantevents.
Sponsorship Opportunities 5-2016 Thomas Odams Events Manager, EMEA, RANT Events t: 0203 119 3387 m: 07827 870 359 todams@rantevents.com About The RANT Forum (Risk and Network Threat Forum) The RANT Forum
More informationISSA SOUTH TEXAS CHAPTER
Page 1 of 5 ISSA SOUTH TEXAS CHAPTER ISSA News Letter For October 2012 Voted "Outstanding Chapter of 2007" by ISSA International As always, please feel free to contact me with any suggestions or requests
More informationInaugural Conference
Rutgers Institute for Emergency Preparedness and Homeland Security Date/Time June 6, 2014 8:00 a.m. to 3:00 p.m. Location The Heldrich Hotel and Conference Center 10 Livingston Avenue, New Brunswick, NJ
More informationTHOMAS WELCH, CISSP, CPP, CISA, CISM, CFI, CHS-III twelch@bullzisecurity.com SUMMARY
, CISSP, CPP, CISA, CISM, CFI, CHS-III twelch@bullzisecurity.com SUMMARY Mr. Welch has over twenty years in the Security and Information Systems business, twelve of which he was directly responsible for
More informationWRITTEN TESTIMONY OF
WRITTEN TESTIMONY OF KEVIN MANDIA CHIEF EXECUTIVE OFFICER MANDIANT CORPORATION BEFORE THE SUBCOMMITTEE ON CRIME AND TERRORISM JUDICIARY COMMITTEE UNITED STATES SENATE May 8, 2013 Introduction Thank you
More informationESTATE PLANNING AND ADMINISTRATION SEMINAR
ESTATE PLANNING AND ADMINISTRATION SEMINAR WEDNESDAY, JULY 30, 2014 8:30 AM Registration and Breakfast 9:00 AM 1:00 PM 3.0 CLE Credits Pending Kaye Scholer, LLP 425 Park Avenue New York, NY 1 Page AGENDA
More informationThe Hunt for Fraud. September 25, 2014. Seminar / Training. September 26, 2014
BYOD and Securing Mobile Devices September 25, 2014 The Hunt for Fraud September 26, 2014 Seminar / Training Central Arkansas Chapter Information Systems Audit and Control Association, Arkansas Division
More informationSENATE STANDING COMMITTEE ON LEGAL AND CONSTITUTIONAL AFFAIRS AUSTRALIAN FEDERAL POLICE. Question No. 100
SENATE STANDING COMMITTEE ON LEGAL AND CONSTITUTIONAL AFFAIRS AUSTRALIAN FEDERAL POLICE Question No. 100 Senator McKenzie asked the following question at the hearing on 24 May 2012: a) How do you define
More informationCyber Security Awareness Workshop
December 5, 2012 War Memorial Building, Balboa Park Participant Guide The San Diego Cyber Security Threat Awareness Response and Recovery Program (C-STARR) is hosted by the City of San Diego and the Securing
More informationApril 2015. http://raleigh.issa.org. LinkedIn. Facebook. @RaleighISSA. Meeting Sponsor
April 2015 http://raleigh.issa.org Meeting Sponsor LinkedIn Facebook @RaleighISSA 2015 Board President = Robert Martin VP = Mark Whitteker Treasurer = Mark Fontes Education Director = Chuck Kesler Communications
More informationDON T BE A VICTIM! IS YOUR INVESTMENT PROGRAM PROTECTED FROM CYBERSECURITY THREATS?
HEALTH WEALTH CAREER DON T BE A VICTIM! IS YOUR INVESTMENT PROGRAM PROTECTED FROM CYBERSECURITY THREATS? Gregg Sommer, CAIA Head of Operational Risk Assessments St. Louis MERCER 2015 0 CYBERSECURITY BREACHES
More informationSponsorship Opportunities
Sponsorship Opportunities Thomas Odams Events Manager EMEA, RANT Events t: 0207 510 9039 m: 07827 870 359 todams@rantevents.com Sponsorship Opportunities About The Risk and Network Threat Forum (RANT)
More informationCynthia E. Jones. David A. Clark School of Law, University of the District of Columbia Summer 1996 Adjunct Instructor (Appellate Advocacy)
Cynthia E. Jones Teaching Experience Assistant Professor of Law Fall 2004-present Visiting Professor 2002-2004 Courses: Evidence, Criminal Law, Criminal Procedure and Race, Crime and Politics seminar George
More informationU.S. Cyber Security Readiness
U.S. Cyber Security Readiness Anthony V. Teelucksingh Senior Counsel United States Department of Justice John Chris Dowd Special Agent Federal Bureau of Investigation Overview U.S. National Plan National
More informationForensic & Investigative Accounting (FIA) Section American Accounting Association Mission, Objectives and 2013-2015 Strategy.
Forensic & Investigative Accounting (FIA) Section American Accounting Association Mission, Objectives and 2013-2015 Strategy Mission The mission of the Forensic & Investigative (FIA) Section of the American
More informationKEY TRENDS AND DRIVERS OF SECURITY
CYBERSECURITY: ISSUES AND ISACA S RESPONSE Speaker: Renato Burazer, CISA,CISM,CRISC,CGEIT,CISSP KEY TRENDS AND DRIVERS OF SECURITY Consumerization Emerging Trends Continual Regulatory and Compliance Pressures
More informationUniversity of Maryland University College 2013 Spring Job Fair & Career Expo
Aflac University of Maryland University College Address: 152 Rollins Avenue Suite 210 Rockville, Maryland 20852 Website: www.aflac.com Position(s): Sales and Marketing Associate, Human Resources and Corporate
More informationServices. Computer Forensic Investigations
DataTriangle, Inc. is uniquely structured to provide you with a high quality expert as expeditiously as possible. Charles Snipes has nearly 15 years of experience with criminal investigations in the areas
More informationKeynote: FBI Wednesday, February 4 noon 1:10 p.m.
Keynote: FBI Wednesday, February 4 noon 1:10 p.m. Speaker: Leo Taddeo Special Agent in Change, Cyber/Special Operations Division Federal Bureau of Investigation Biography: Leo Taddeo Leo Taddeo is the
More informationOver 20 years experience in Information Security Management, Risk Management, Third Party Oversight and IT Audit.
CYBERSECURITY: ISSUES AND ISACA S RESPONSE June 2014 BILL S BIO Over 20 years experience in Information Security Management, Risk Management, Third Party Oversight and IT Audit. Vice President Controls
More informationCURRICULUM VITAE JAMES R. SWAUGER Digital Forensic Examiner
CURRICULUM VITAE JAMES R. SWAUGER Digital Forensic Examiner Binary Intelligence, LLC 150 Industrial Drive Franklin, Ohio 45005 Phone: 866.246.2794 x703 Email: jswauger@binaryintel.com CERTIFICATIONS AND
More informationFedVTE Training Catalog SPRING 2015. advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov
FedVTE Training Catalog SPRING 2015 advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov If you need any assistance please contact the FedVTE Help Desk here or email the
More informationPRESENTATION TO THE UNIVERSITY SYSTEM OF MARYLAND S BOARD OF REGENTS
CYBERSECURITY PRESENTATION TO THE UNIVERSITY SYSTEM OF MARYLAND S BOARD OF REGENTS by Dr. Lawrence A. Gordon (Lgordon@rhsmith.umd.edu) EY Professor of Managerial Accounting and Information Assurance Affiliate
More informationELEMENTS OF FINANCIAL CRIMES INVESTIGATIONS
ELEMENTS OF FINANCIAL CRIMES INVESTIGATIONS This one-day course will provide an officer with the essential investigative foundation to conduct a financial crimes investigation in today s technology driven
More informationELEMENTS OF FINANCIAL CRIMES INVESTIGATIONS
ELEMENTS OF FINANCIAL CRIMES INVESTIGATIONS This one-day course will provide an officer with the essential investigative foundation to conduct a financial crimes investigation in today s technology driven
More informationWRITTEN TESTIMONY BEFORE THE HEARING ON PROTECTING PERSONAL CONSUMER INFORMATION FROM CYBER ATTACKS AND DATA BREACHES MARCH 26, 2014 2:30 PM
WRITTEN TESTIMONY BEFORE THE SENATE COMMITTEE ON COMMERCE, SCIENCE, & TRANSPORTATION HEARING ON PROTECTING PERSONAL CONSUMER INFORMATION FROM CYBER ATTACKS AND DATA BREACHES MARCH 26, 2014 2:30 PM TESTIMONY
More informationForensic Certifications
Forensic Certifications Mayuri Shakamuri CS 489-02 Digital Forensics October 31, 2006 New Mexico Tech Executive Summary Digital Forensics is rapidly growing and evolving to become a scientific practice
More informationANGIE SINGER KEATING CHIEF EXECUTIVE OFFICER, CO-FOUNDER
CERTIFICATIONS ANGIE SINGER KEATING CHIEF EXECUTIVE OFFICER, CO-FOUNDER Certified Information Privacy Professional (CIPP) by the International Association of Privacy Professionals (IAPP) Certified Information
More informationCyber Liability Insurance:
Cyber Liability Insurance: Reg Harnish, CISSP, CISM, CISA Chief Security Strategist GreyCastle Security Steve Lobel Vice President Anchor Agency October 17, 2013 1,200 Introduction Cybercrime Today Major
More information2015 Cybersecurity Campaign. Improving Today, Protecting Tomorrow
2015 Cybersecurity Campaign Improving Today, Protecting Tomorrow THE STATE OF U.S. CYBERSECURITY: OUR NATION S ECONOMIC AND NATIONAL SECURITY ARE AT SIGNIFICANT RISK Hackers have breached the computer
More informationSummary Report from the Girls Workshop Cool Careers for Girls in Cybersecurity October 4 th, 2007. University of Maryland, College Park, MD
Summary Report from the Girls Workshop Cool Careers for Girls in Cybersecurity October 4 th, 2007 University of Maryland, College Park, MD University of Maryland CyberWATCH Subcontract Deliverables by
More informationThe FBI and the Internet
The FBI and the Internet Special Agent Robert Flaim Federal Bureau of Investigation Presentation Goals To give you a better understanding of: The FBI Cyber Division, its priorities, and its mission The
More informationINVESTIGATING AND PROSECUTING MONEY LAUNDERING
INVESTIGATING AND PROSECUTING MONEY LAUNDERING This one-day course will discuss the criminal elements and case law for N.J.S.A criminal statue 2C:21-25, Financial Facilitation of Criminal Activity, also
More informationCorporate Compliance Programs - Industry Best Practices. November 18, 2010 (Thursday) 8:00 a.m. to 12:00p.m.
The Healthcare Financial Management Association of Northeastern New York is pleased to present the following education session: Event Forum: Where: When: Corporate Compliance Programs - Industry Best Practices
More informationInformation Security Policy
Information Security Policy Steve R. Hutchens, CISSP EDS, Global Leader, Homeland Security Agenda Security Architecture Threats and Vulnerabilities Design Considerations Information Security Policy Current
More informationCybersecurity Opportunities. Presented to: National Professional Science Masters Association November 13, 2013
Cybersecurity Opportunities Presented to: National Professional Science Masters Association November 13, 2013 Overall Themes For Discussion Advice for Grads Your Degree Is A Place To Start. It does not
More informationAbout Our 2015 WTA Cyber Security Speakers and Sessions
About Our 2015 WTA Cyber Security Speakers and Sessions The constant threat of cyber security attacks is the number one concern for most businesses today. Weaknesses in networks and data security can expose
More informationJOB ANNOUNCEMENT. Chief Security Officer, Cheniere Energy, Inc.
JOB ANNOUNCEMENT Chief Security Officer, Cheniere Energy, Inc. Position Overview The Vice President and Chief Security Risk Officer (CSRO) reports to the Chairman, Chief Executive Officer and President
More informationBio Summary and CV. curriculum vitae of John C. Villines; Introduction; page 1 of 5 (rev Jan 2013)
Bio Summary and CV John Villines has dedicated his adult life to security, investigations and crime prevention. He has maintained a company license (Security and Investigations) in Georgia for approximately
More informationBuilding the Next Generation of Computer Security Professionals. Chris Simpson
Building the Next Generation of Computer Security Professionals Chris Simpson Overview Why teach computer security to high school students Deciding what to teach What I taught Community Support Lessons
More informationName of presentation Company name
Name of presentation Company name Thank you for your consideration CyberSecurity Awareness Month Cybercrime and Copyright Infringement Amber Chris Burgess Marcus Rogers Amber Purdue student sued by RIAA
More informationPREPARE YOUR INCIDENT RESPONSE TEAM
PREPARE YOUR INCIDENT RESPONSE TEAM JUNE 2015 Michael Harrington, Fidelis Cybersecurity It s a big problem... The ongoing cyber-thefts from The scale of international theft the In networks 2013, the of
More informationBusiness Babes By-Laws
Business Babes By-Laws ARTICLE I. Name of the Organization This group shall be known as the Business Babes Society (BBS), Chapter 1. ARTICLE II. Purpose Business Babes is a support and networking group
More informationCST 244 Computer Forensics and Investigation Spring, 2010
CST 244 Computer Forensics and Investigation Spring, 2010 Instructor: Guy Theriault Class Room: 221 Office: Rm 221 Class Hours: Mon thru Fri 8:00 to 10:50 Class Dates: Mar 8 to Apr 16 Office hours: Monday,
More informationWorking with the FBI
Working with the FBI WMACCA Data Privacy & Security Conference September 17, 2014 Individuals Organized Crime Syndicates Hacktivist Groups Nation States Nation-States Individuals Industry Law Enforcement
More informationCommonwealth Approach to Cybergovernance and Cybersecurity. By the Commonwealth Telecommunications Organisation
Commonwealth Approach to Cybergovernance and Cybersecurity By the Commonwealth Telecommunications Organisation Trends in Cyberspace Cyberspace provides access to ICT Bridging the digital divide and influencing
More informationBreaching Bad: New Cyber Security Risks & Regulations Affecting Suppliers At All Tiers
Breaching Bad: New Cyber Security Risks & Regulations Affecting Suppliers At All Tiers Securing the Infrastructure April 2015 Stan Stahl, Ph.D. President Citadel Information Group Phone: 323.428.0441 Stan@Citadel-Information.com
More informationThe global challenge
The global challenge CYBERCRIME The global challenge Cybercrime has developed from an emerging crime to a serious manifestation of crime with great practical relevance With the emerging use of computer
More informationGLOBAL BUSINESS DIALOGUE ON ELECTRONIC COMMERCE CYBER SECURITY AND CYBER CRIME SEPTEMBER 26, 2000. CEO EDS Corporation
GLOBAL BUSINESS DIALOGUE ON ELECTRONIC COMMERCE CYBER SECURITY AND CYBER CRIME SEPTEMBER 26, 2000 Issue Chair: Issue Sherpa: Dick Brown CEO EDS Corporation Bill Poulos EDS Corporation Tel: (202) 637-6708
More informationAbout MicroSolved, Inc. Company Profile, Experience, Capabilities and Differentiators
About MicroSolved, Inc. Company Profile, Experience, Capabilities and Differentiators Profile MicroSolved, Inc. is an Ohio corporation with a Dun and Bradstreet number of 022904119. Since 1992, MSI has
More informationAmit Garg BERKELEY RESEARCH GROUP, LLC 1800 M Street, N.W. 2 nd Floor Washington, D.C. 20036. Direct: 202.747.3483 agarg@thinkbrg.
Curriculum Vitae Amit Garg BERKELEY RESEARCH GROUP, LLC 1800 M Street, N.W. 2 nd Floor Washington, D.C. 20036 Direct: 202.747.3483 agarg@thinkbrg.com SUMMARY Amit Garg brings over 17 years of information
More informationFedVTE Training Catalog SUMMER 2015. advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov
FedVTE Training Catalog SUMMER 2015 advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov Access FedVTE online at: fedvte.usalearning.gov If you need any assistance please
More informationCybersecurity Global status update. Dr. Hamadoun I. Touré Secretary-General, ITU
Cybersecurity Global status update Dr. Hamadoun I. Touré Secretary-General, ITU Cybercrime takes a toll on the global economy - Online fraud, identity theft, and lost intellectual property; - On governments,
More informationCybercrime & Cybersecurity: the Ongoing Battle International Hellenic University
Cybercrime & Cybersecurity: the Ongoing Battle International Hellenic University Andreas Athanasoulias, CISM, CISSP Information Security Officer & Security Consultant Brief introduction My career path
More informationUniversity of Maryland Cybersecurity Center (MC 2 )
University of Maryland Cybersecurity Center (MC 2 ) Responding to the Needs of the State, the Nation, and the Global Community Pat Prof. Michael Hicks Director www.cyber.umd.edu/ Cybersecurity Challenge
More informationE-Newsletter SUMMER 2006 PUBLIC INTEREST FELLOWSHIPS. In This Issue
E-Newsletter March 14, 2006 In This Issue Summer 2006 Public Interest Fellowships Williams Freshman Trial Competition ABA Regional National Appellate Advocacy Competition Fall 2006 Registration March 14
More informationHIGH-RISK SECURITY VULNERABILITIES IDENTIFIED DURING REVIEWS OF INFORMATION TECHNOLOGY GENERAL CONTROLS
Department of Health and Human Services OFFICE OF INSPECTOR GENERAL HIGH-RISK SECURITY VULNERABILITIES IDENTIFIED DURING REVIEWS OF INFORMATION TECHNOLOGY GENERAL CONTROLS AT STATE MEDICAID AGENCIES Inquiries
More informationCYBERSECURITY: ISSUES AND ISACA S RESPONSE
CYBERSECURITY: ISSUES AND ISACA S RESPONSE June 2014 KEY TRENDS AND DRIVERS OF SECURITY Consumerization Emerging Trends Continual Regulatory and Compliance Pressures Mobile devices Social media Cloud services
More informationJAMES R. SWAUGER Digital Forensic Examiner
CURRICULUM VITAE JAMES R. SWAUGER Digital Forensic Examiner Binary Intelligence, LLC 726 East Main Street, Suite F #150 Lebanon, Ohio 45036 Phone: 866.246.2794 x703 Email: jswauger@binaryintel.com CERTIFICATIONS
More informationKIMMONS INVESTIGATIVE SERVICES, INC. Texas Largest & Most Experienced Investigative Firm
KIMMONS INVESTIGATIVE SERVICES, INC. Texas Largest & Most Experienced Investigative Firm HOUSTON AUSTIN KIMMONS INVESTIGATIVE SERVICES, INC. HIGHLY RESPECTED, SKILLED TEAM OF INVESTIGATORS Rob Kimmons,
More informationTALKING POINTS ON DOMESTIC AND YOUTH VIOLENCE ATTORNEY GENERAL'S IOWA TELECONFERENCE OCTOBER 25, 1995 11:30 P.M. STARC ARMORY-DES MOINES, IOWA
TALKING POINTS ON DOMESTIC AND YOUTH VIOLENCE ATTORNEY GENERAL'S IOWA TELECONFERENCE OCTOBER 25, 1995 11:30 P.M. STARC ARMORY-DES MOINES, IOWA I. INTRODUCTORY REMARKS * * * It is wonderful to be back here
More information