ISSA Baltimore Chapter Monthly Meeting April 22, 2015

Size: px
Start display at page:

Download "ISSA Baltimore Chapter Monthly Meeting April 22, 2015"

Transcription

1 ISSA Baltimore Chapter Monthly Meeting April 22, 2015, Websense

2 Board of Directors Bill Smith, CISSP, GSNA, CEH, GPEN, GCFA, GCFE - President Sidney Spunt, CISSP - VP Operations Kevin Drury Secretary Carol Klessig, CISSP - VP Professional Development Rod Zwainz, CISSP, PMP - VP Education Phil Rogofsky, CISSP, Network+, CPA Treasurer Steve Chan, CISSP, PMP VP Membership Dennis Dworkowski, CISSP-ISSEP VP Outreach, Websense

3 Baltimore Chapter Sponsors

4 Agenda / Announcements Welcome to Parsons, 7110 Samuel Morse Drive, Suite 200 Columbia, Maryland Non-U.S. Citizen Requirements Any guests or new members in attendance? (ISC) 2 CPE Submissions Individual Responsibility New CISSP and SSCP Domains Chapter Strategic Plan Chapter STEM Activity New Member Promotion CISSP Chapter Badges / Shirts and Jackets with ISSA-Baltimore Logo CISSP Study Group Spring 2015 February 24 thru May 19, 2015 New Location: Phoenix TS Amazon Affiliates program LinkedIn Group Facebook Page ISSA-Baltimore Chapter Future Meeting schedule

5 New Members Since February Meeting Bradley Cullum Shane Daniels Stephen Kapuschansky Christine L. Kelly Zachary Kline Scott Lansing 265 Total Members Ambyr Leidig Deborah Maletz George Manousoyianakis Dorothy Patterson Gary Szukalski

6 ISSA International Conference: October Keynote Speaker Vinton G. Cerf Vice President and Chief Internet Evangelist Google Register Now for the ISSA International Conference October 12-13, 2015 Chicago, Illinois, USA The first 100 paid attendees will enter into a raffle to receive a FREE ipad!

7 CISSP Domains, Effective April 15, 2015 Security and Risk Management (Security, Risk, Compliance, Law, Regulations, Business Continuity) Asset Security (Protecting Security of Assets) Security Engineering (Engineering and Management of Security) Communications and Network Security (Designing and Protecting Network Security) Identity and Access Management (Controlling Access and Managing Identity) Security Assessment and Testing (Designing, Performing, and Analyzing Security Testing) Security Operations (Foundational Concepts, Investigations, Incident Management, Disaster Recovery) Software Development Security (Understanding, Applying, and Enforcing Software Security)

8 Systems Security Certified Practitioner (SSCP) Domains, Effective April 15, 2015 * Access Controls * Cryptography * Security Operations and Administration * Networks and Communications Security * Risk Identification, Monitoring, and Analysis * Systems and Application Security * Incident Response and Recovery * The SSCP indicates a practitioner s technical ability to tackle the operational demands and responsibilities of security practitioners, including authentication, security testing, intrusion detection/prevention, incident response and recovery, attacks and countermeasures, cryptography, malicious code countermeasures, and more.

9 New Member Promotion Rules: 1. Promotion begins August 1, New member must identify referring member when joining 3. $25.00 Amazon Gift Card awarded to referring member 4. Referring member s registration must be current 5. Awards will be presented at monthly Chapter meeting 6. Program will run through December 31, 2015 and be reevaluated by the board after that time 7. Board of Directors not eligible to participate

10 Chapter Strategic Plan Vision - To be the community of choice for international cybersecurity professionals dedicated to advancing individual growth, managing technology risk and protecting critical information and infrastructure Mission - ISSA is a not-for-profit, international organization of information security professionals and practitioners. It provides educational forums, publications, and peer interaction opportunities that enhance the knowledge, skill, and professional growth of its members

11 Change to the Chapter By-laws ARTICLE I: Name Current: The name of this organization shall be the Baltimore Metropolitan Chapter, Information Systems Security Association, Inc., (ISSA) hereafter referred to as the "Chapter". Change: The name of this organization shall be the Central Maryland Chapter of the Information Systems Security Association, Inc., (ISSA) hereafter referred to as the "Chapter".

12 Chapter Strategic Plan-Core Values Collaboration - We believe that working together toward a common goal is essential to the success of the association. Knowledge Sharing - We encourage knowledge sharing as a result of our belief that all of us are smarter and more productive than any one of us. Leadership - We inspire each other to achieve and grow through a shared vision and passion to excel. Professional Development - We support the development of our people, association and profession through positive relationships, dynamic synergies and innovative growth opportunities. Innovation - We search for new avenues to improve the Cybersecurity community, ISSA International and our Chapter

13 Chapter Strategic Plan-Goals and Strategies Goal I:Expand Chapter Influence outside of Howard County Area Change chapter name to ISSA of Central Maryland Reach out to security companies outside Howard County Join and be active the Chesapeake region Tech Council Objective 2: Increase Benefit to Members Seek out more varied speakers for chapter meetings. Develop relationship with other organizations such as other ISSA Chapters, IIA, IEEE Baltimore, and ISACA. Create relationships with educational organizations to provide more costs training opportunities such as Phoenix Poll members to see what they what additional opportunities they would like the Chapter to pursue. Goal 3:Improve Relationship with Companies/Sponsors Create Corporate Ambassadors where members represent the Chapter to their employees, Start monthly communication/ newsletter to Sponsors Host on-site Meet and Greet Events at Large Companies. Poll Sponsors to determine what they would like out of Sponsorship. Goal 4-Promote Chapter's Identity Increase STEM involvement and participation events such in the HoCo STEM Festival. Increase involvement in local security events such as CyberMarylandConference;. Increase involvement with Howard Tech Council Increase support to our Student Chapter at UMBC and explore creating additional student chapters.

14 Chapter STEM Activities 3 rd HoCo STEM Festival-1-5 at HCC on June 7 th Chapter will be hosting a table 1 st Maryland STEM Festival November Chapter is an inaugural sponsor at the Supporter level Chapter may host an event

15 New Member Promotion Congratulations - $25.00 Amazon Gift Card winners: Chris Ambrose John Barker Scott Crum Jody Denner Chuck Dickens Charles Dickert * Devin Elmore * Ivan Gordon Monique Mitchner * Matt Morris Nick Rapp Katelin Rowley Oliver Thomas * Rod Zwainz *

16 ISSA-Baltimore CISSP Study Group Fall 2015 Schedule Phoenix TS, Little Patuxent Parkway, Suite 500 Columbia, MD Feb 15 Kickoff for CISSP - Cancelled Snow 24 Feb 15 Information Security Governance & Risk Management 3 Mar 15 Security Architecture & Design Cancelled Snow 10 Mar 15 Access Control 17 Mar 15 Access Control 24 Mar 15 Cryptography Part 1 31 Mar 15 Cryptography Part 2 7 Apr 15 Physical & Environmental Security 14 Apr 15 Software Development Security 21 Apr 15 Business Continuity & Disaster Recovery 28 Apr 15 Telecommunications & Network Security Part 1 5 May 15 Telecommunications & Network Security Part 2 12 May 15 Legal, Regulations, Investigations and Compliance 19 May 15 Security Architecture & Design 26 May 15 Operations Security 2 June 15 Practice Exam / Review

17 Our New Chapter Blog!! As 2015 is now underway, we wanted to provide you with a list of potential networking and volunteering opportunities tentatively scheduled for this year. We are always looking for members to assist with various outreach and chapter activities that need to be completed. You may be asking yourself, what is in it for me? Listed below are several benefits for volunteering your time to help the Baltimore ISSA chapter out. Volunteering provides a chance to learn new skills. Carol Klessig is learning to create a unique hash tag this weekend. Learning about social media (Twitter) may help Carol add to her resume. Please Carol at V_P_Professional_Development@issa.org If you would like to be considered for the new position known as Director of Publicity. Helping others learn and encouraging our youth feels great. Rewards are not always monetary. Encouraging a student can be your chance to pay it forward. This is especially beneficial for recent graduates or new members in the security field. Camaraderie. Social outings like our field trips can be a chance to form a new friendship with others in the IT field. CPE's. Working for the club can generate CPE's that can be used to maintain your certifications. Currently, we need our website updated and possibly redesigned. Does anyone have a experience in web design that could assist us with updating or redesigning our current website? You can volunteer for just a single event or on a regular basis. A variety of items exist that we could use assistance with. These items include writing a blog article, greeting members at the door or assisting with the setup/cleanup at chapter meetings. If you see a position aching to be filled, talk to one of the board members.

18 Rescheduled September 1, 2015

19 Open Software and Trust--Better Than Free? 2-Hour Live Event: Tuesday, April 28, 2015 Start Time: 9:00 a.m. US-Pacific/ 12:00 p.m. US-Eastern/ 5:00 p.m. London Web Conference Overview: Last year we were hit with multiple Open Source vulnerabilities. The most significant was Heartbleed, or was it the potential of Poodle or the other half dozen or so vulnerabilities. If it wasn t that, then what about ShellShock (the bash bug? The open source world is supposed to be safer as everyone can examine the software, but are enough experts examining it? Session Moderator: Phillip Griffin - ISSA Educational Advisory Council Member Speakers: Mark Kadrich- Chief Information Security & Privacy Officer, Health Connect Timothy Jarrett - Senior Director, Product Marketing, Veracode

20

21 2015 Meetings and Events Date Speaker Organization Topic January 28, 2015 Kathy Worgul Carroll County Business & Employment How Can LinkedIn Assist in Career Resource Center Advancement February 25, 2015 Robert K. Gardner New World Technology Partners Cyber Risk, Thru the Shareholder Lens March 25, 2015 Cancelled April 22, 2015 Anthony United States Department of Justice Insider Threats, or the Case of the Extra 8 Teelucksingh Lines of Code May 20, 2015 Brian E. Dykstra Atlantic Data Forensics, Inc. Murder or Self Defense? July 27, 2015 Rhonda Ferrell CyberSecurity & Your Professional Life: A Value-Add Approach September 1, 2015 Mid-Atlantic ISSA Security Conference, NIST, Gaithersburg, MD September 16, 2016 Joint Meeting w/ MD IMMA / Infragard October 12 13, 2015 ISSA International Conference Chicago Illinois

22 May 20, 2015 Speaker Brian E. Dykstra Atlantic Data Forensics, Inc. Mr. Dykstra has over 19 years experience in investigations, computer forensics, incident response, network and wireless security testing and information security. Mr. Dykstra was previously the CIO and Director of Professional Education at Mandiant, Inc. where he was responsible for the development and management of numerous advanced computer security and cybercrime investigation courses. Before founding Atlantic Data Forensics (formerly Jones Dykstra and Associates, Inc.), Mr. Dykstra was the CIO & Director of Professional Education and a founding member of Mandiant, where he was responsible for the development and management of numerous advanced computer security and cybercrime investigation courses. Prior to becoming a co-founder of Mandiant (formerly known as Red Cliff Consulting, LLC), Mr. Dykstra was a Senior Program Manager at Communications Technologies where he led commercialization efforts of computer security and managed services business groups; supervised the secure remote management of UNIX and Windows customer and network systems, and provided technical oversight for business development efforts and technical assistance to commercial and government sales groups.

23 May 20, 2015 Topic Murder or Self Defense? Brian Dykstra, CEO, Atlantic Data Forensics will review the West Virginia 1 st degree murder trial of Michael Ian Palmer for the pre-meditated killing of his father-in-law Everett Wilson during a home invasion break-in. Mr. Dykstra will recount the various testimony given during the trial and the digital evidence he was presented with as the defense computer forensics expert. From bar fights and brass knuckles to Facebook posts and crime scene investigations West Virginia v Michael Ian Palmer has it all.

24 April 22, 2015 Speaker Anthony Teelucksingh Senior Counsel at U.S. Department of Justice Federal prosecutor in the Criminal Division section responsible for the prosecution of cybercrime, including violations of the Computer Fraud and Abuse Act. Casework includes the prosecution of computer intrusions, damage to computers, illegal spam, online extortion, online stalking, identity theft, credit card fraud, and trafficking in counterfeit goods including luxury goods, pharmaceuticals, software, and motion pictures. Provide expertise to the U.S. Attorneys office and federal and state law enforcement agencies. Provide training to U.S. and foreign law enforcement agencies on electronic evidence, searching and seizing computers, and courtroom presentations in cybercrime cases. Represent the United States on cybercrime and privacy matters in multi-lateral international clients including the UN Office on Drugs and Crime Intergovernmental Experts Group on Cybercrime, International Telecommunications Union, Asia-Pacific Economic Cooperation Telecommunications Working Group, and Organization of American States. In bilateral discussions with numerous foreign governments on anti-cybercrime capacity building, privacy, data protection and law enforcement cooperation. Special Assistant United States Attorney, District of Maryland, to prosecute cases concerning cybercrime and criminal intellectual property violations

25 April 22, 2015 Topic Fannie Mae logic-bomb saboteur convicted A computer contractor has been convicted of planting a logic bomb on the servers of Fannie Mae, the financially troubled US housing and mortgage giant. Rajendrasinh Babubhai Makwana, 36, responded to the termination of his two-year-long spell as a software development contractor at Fannie Mae in October 2008 by planting a malicious script designed to wipe all the data from its network on 31 January Anyone attempting to access data on the system after the logic bomb went off would have received the message "Server Graveyard". Fortunately, Fannie Mae sysadmins found the malware days after Makwana left work at the Urbana, Maryland technology centre and weeks before the logic bomb was due to explode. Subsequent forensic analysis of computer logs traced the attempted attack back to Makwana's workplace laptop, which yielded more evidence. Because of his job developing software for Unix boxes, Makwana reportedly had access to the full range of Fannie Mae's 5,000 servers.

ISSA Baltimore Chapter Monthly Meeting February 25, 2015

ISSA Baltimore Chapter Monthly Meeting February 25, 2015 ISSA Baltimore Chapter Monthly Meeting February 25, 2015 Interset!, CyberCore Technologies, Phoenix TS, Board of Directors Bill Smith, CISSP, GSNA, CEH, GPEN, GCFA, GCFE - President Sidney Spunt, CISSP

More information

ISSA Baltimore Chapter Monthly Meeting June 24, 2015

ISSA Baltimore Chapter Monthly Meeting June 24, 2015 ISSA Baltimore Chapter Monthly Meeting June 24, 2015, Websense Board of Directors Bill Smith, CISSP, GSNA, CEH, GPEN, GCFA, GCFE - President Sidney Spunt, CISSP - VP Operations Kevin Drury Secretary Carol

More information

ISSA Baltimore Chapter Monthly Meeting August 26, 2015

ISSA Baltimore Chapter Monthly Meeting August 26, 2015 ISSA Baltimore Chapter Monthly Meeting August 26, 2015 Board of Directors Bill Smith, CISSP, GSNA, CEH, GPEN, GCFA, GCFE - President Sidney Spunt, CISSP - VP Operations Kevin Drury, CISSP Secretary Carol

More information

ISSA Baltimore Chapter. Monthly Meeting October 28, 2015

ISSA Baltimore Chapter. Monthly Meeting October 28, 2015 ISSA Baltimore Chapter Monthly Meeting October 28, 2015 Agenda / Announcements Welcome to Parsons, 7110 Samuel Morse Drive, Suite 200 Columbia, Maryland 21046 Non-U.S. Citizen Requirements Any guests or

More information

U. S. Attorney Office Northern District of Texas March 2013

U. S. Attorney Office Northern District of Texas March 2013 U. S. Attorney Office Northern District of Texas March 2013 What Is Cybercrime? Hacking DDOS attacks Domain name hijacking Malware Other computer related offenses, i.e. computer and internet used to facilitate

More information

Information Systems Security Certificate Program

Information Systems Security Certificate Program Information Technologies Programs Information Systems Security Certificate Program Accelerate Your Career extension.uci.edu/infosec University of California, Irvine Extension s professional certificate

More information

ISSA SOUTH TEXAS CHAPTER NEWSLETTER

ISSA SOUTH TEXAS CHAPTER NEWSLETTER Page 1 of 5 ISSA SOUTH TEXAS CHAPTER NEWSLETTER For May 2013 Voted "Outstanding Chapter of 2007" by ISSA International As always, please feel free to contact me with any suggestions or requests to improve

More information

Kevin Savoy, CPA, CISA, CISSP Director of Information Technology Audits Brian Daniels, CISA, GCFA Senior IT Auditor

Kevin Savoy, CPA, CISA, CISSP Director of Information Technology Audits Brian Daniels, CISA, GCFA Senior IT Auditor IT Audit/Security Certifications Kevin Savoy, CPA, CISA, CISSP Director of Information Technology Audits Brian Daniels, CISA, GCFA Senior IT Auditor Certs Anyone? There are many certifications out there

More information

CYBERSECURITY NEXUS ROBERT E STROUD INTERNATIONAL PRESIDENT, ISACA RAMSÉS GALLEGO INTERNATIONAL VICE PRESIDENT, ISACA

CYBERSECURITY NEXUS ROBERT E STROUD INTERNATIONAL PRESIDENT, ISACA RAMSÉS GALLEGO INTERNATIONAL VICE PRESIDENT, ISACA CYBERSECURITY NEXUS ROBERT E STROUD INTERNATIONAL PRESIDENT, ISACA RAMSÉS GALLEGO INTERNATIONAL VICE PRESIDENT, ISACA Robert Stroud International President, ISACA VP Strategy & Innovation, CA Technologies

More information

Report on CAP Cybersecurity November 5, 2015

Report on CAP Cybersecurity November 5, 2015 Agenda Number 7. Report on CAP Cybersecurity November 5, 2015 Phil Cook CISSP, CISM Manager, Information Technologies Risk #1 External Attacks PR 81 Protect and secure CAP's Information Technology assets

More information

2014 Montana Government IT Conference. Securing Data Networks and People

2014 Montana Government IT Conference. Securing Data Networks and People Presenter: Matt Bennett, Genetec Leveraging the Cloud for Hybrid Video Surveillance Matt is based in Seattle, WA and is the Western North America pre-sales engineer for Genetec (the world s leader in unified

More information

JOINT EVENT WITH IIBA-LA. Trends & Best Practices in. Cybersecurity for networks, cloud computing and mobile

JOINT EVENT WITH IIBA-LA. Trends & Best Practices in. Cybersecurity for networks, cloud computing and mobile JOINT EVENT WITH IIBA-LA Trends & Best Practices in Cybersecurity for networks, cloud computing and mobile April 23 rd, 2015 Hands-on Experts Share Current Strategies to Manage Cybersecurity Today s enterprise

More information

MARYLAND. Cyber Security White Paper. Defining the Role of State Government to Secure Maryland s Cyber Infrastructure.

MARYLAND. Cyber Security White Paper. Defining the Role of State Government to Secure Maryland s Cyber Infrastructure. MARYLAND Cyber Security White Paper Defining the Role of State Government to Secure Maryland s Cyber Infrastructure November 1, 2006 Robert L. Ehrlich, Jr., Governor Michael S. Steele, Lt. Governor Message

More information

Financial Implications of Cybercrime Meeting the Information Security Management Challenge in the Cyber-Age

Financial Implications of Cybercrime Meeting the Information Security Management Challenge in the Cyber-Age Financial Implications of Cybercrime Meeting the Information Security Management Challenge in the Cyber-Age Southern California Association for Financial Professionals February 14, 2014 Stan Stahl, Ph.D.

More information

2015 Michigan NASCIO Award Nomination. Cyber Security Initiatives: Michigan Cyber Disruption Response Strategy

2015 Michigan NASCIO Award Nomination. Cyber Security Initiatives: Michigan Cyber Disruption Response Strategy 2015 Michigan NASCIO Award Nomination Cyber Security Initiatives: Michigan Cyber Disruption Response Strategy Sponsor: David Behen, DTMB Director and Chief Information Officer Program Manager: Rod Davenport,

More information

Encyclopedia of Information Assurance Suggested Titles: March 25, 2013 The following titles have not been contracted.

Encyclopedia of Information Assurance Suggested Titles: March 25, 2013 The following titles have not been contracted. Encyclopedia of Information Assurance Suggested Titles: March 25, 2013 The following titles have not been contracted. Administrative Awareness Case Study: Government Offices Certification and Accreditation:

More information

How-To Guide: Cyber Security. Content Provided by

How-To Guide: Cyber Security. Content Provided by How-To Guide: Cyber Security Content Provided by Who needs cyber security? Businesses that have, use, or support computers, smartphones, email, websites, social media, or cloudbased services. Businesses

More information

THE ALABAMA CHAPTER OF THE ASSOCIATION OF CERTIFIED FRAUD EXAMINERS AND THE UNIVERSITY OF ALABAMA @ BIRMINGHAM SCHOOL OF BUSINESS

THE ALABAMA CHAPTER OF THE ASSOCIATION OF CERTIFIED FRAUD EXAMINERS AND THE UNIVERSITY OF ALABAMA @ BIRMINGHAM SCHOOL OF BUSINESS THE ALABAMA CHAPTER OF THE ASSOCIATION OF CERTIFIED FRAUD EXAMINERS THE UNIVERSITY OF ALABAMA @ BIRMINGHAM SCHOOL OF BUSINESS DAY ONE Fraud Trends 2012 AND PRESENT OUR 5th ANNUAL TRAINING SEMINAR DATE:

More information

InfoSec Academy Application & Secure Code Track

InfoSec Academy Application & Secure Code Track Fundamental Courses Foundational Courses InfoSec Academy Specialized Courses Advanced Courses Certification Preparation Courses Certified Information Systems Security Professional (CISSP) Texas Security

More information

InfoSec Academy Forensics Track

InfoSec Academy Forensics Track Fundamental Courses Foundational Courses InfoSec Academy Specialized Courses Advanced Courses Certification Preparation Courses Certified Information Systems Security Professional (CISSP) Texas Security

More information

NATIONAL POLICING CYBERCRIME SUMMIT. October 19 & 20, 2015 Toronto

NATIONAL POLICING CYBERCRIME SUMMIT. October 19 & 20, 2015 Toronto NATIONAL POLICING CYBERCRIME SUMMIT October 19 & 20, 2015 Toronto BACKGROUND Summit partners, the Canadian Association of Chiefs of Police and the Canadian Advanced Technology Alliance, believe the National

More information

The Top Ten of Information Security - For 2015

The Top Ten of Information Security - For 2015 7 th Annual Information Security Summit The Executive Forum Information Security Management Overview June 4, 2015 Copyright 2015. Citadel Information Group. All Rights Reserved. 2 Establishing Leadership.

More information

Open Software and Trust Better Than Free? April 28, 2015 Start Time: 9am US Pacific /12 noon US Eastern/ 5pm London Time

Open Software and Trust Better Than Free? April 28, 2015 Start Time: 9am US Pacific /12 noon US Eastern/ 5pm London Time Open Software and Trust Better Than Free? April 28, 2015 Start Time: 9am US Pacific /12 noon US Eastern/ 5pm London Time 1 T Sponsored by: #ISSAWebConf 2 Welcome Conference Moderator Phillip Griffin CISM,

More information

Testimony of. Before the United States House of Representatives Committee on Oversight and Government Reform And the Committee on Homeland Security

Testimony of. Before the United States House of Representatives Committee on Oversight and Government Reform And the Committee on Homeland Security Testimony of Dr. Phyllis Schneck Deputy Under Secretary for Cybersecurity and Communications National Protection and Programs Directorate United States Department of Homeland Security Before the United

More information

INSIGHTS AND RESOURCES FOR THE CYBERSECURITY PROFESSIONAL

INSIGHTS AND RESOURCES FOR THE CYBERSECURITY PROFESSIONAL INSIGHTS AND RESOURCES FOR THE CYBERSECURITY PROFESSIONAL BY 2 In enterprise IT, there is a single point where everything that matters in information, technology and business converges: Cybersecurity Nexus

More information

Certification and Training

Certification and Training Certification and Training CSE 4471: Information Security Instructor: Adam C. Champion Autumn Semester 2013 Based on slides by a former student (CSE 551) Outline Organizational information security personnel

More information

The Next Generation of Security Leaders

The Next Generation of Security Leaders The Next Generation of Security Leaders In an increasingly complex cyber world, there is a growing need for information security leaders who possess the breadth and depth of expertise necessary to establish

More information

Protecting Energy s Infrastructure and Beyond: Cybersecurity for the Smart Grid

Protecting Energy s Infrastructure and Beyond: Cybersecurity for the Smart Grid Protecting Energy s Infrastructure and Beyond: Cybersecurity for the Smart Grid Which is it? Cyber Security ~or~ Cybersecurity? Dr. Ernie Lara President Presenters Estrella Mountain Community College Dr.

More information

Auditing After a Cyber Attack JAX IIA Chapter Meeting Cybersecurity and Law Enforcement

Auditing After a Cyber Attack JAX IIA Chapter Meeting Cybersecurity and Law Enforcement Auditing After a Cyber Attack JAX IIA Chapter Meeting Cybersecurity and Law Enforcement Copyright Elevate Consult LLC. All Rights Reserved 1 Presenter Ray Guzman MBA, CISSP, CGEIT, CRISC, CISA Over 25

More information

Pacific Islands Telecommunications Association

Pacific Islands Telecommunications Association Pacific Islands Telecommunications Association 8 th Fl, Dominion Hse PHONE : (679) 331 1638 PO BOX 2027, Govt Bldg FAX : (679) 330 8750 SUVA, FIJI Islands E-mail: pita@connect.com.fj www.pita.org.fj INVITATION

More information

IRS/Tax Practitioners Symposium. 2014 The Illinois CPA Society

IRS/Tax Practitioners Symposium. 2014 The Illinois CPA Society EARLY BIRD DISCOUNT Register by September 30, 2014 2014 The Illinois CPA Society Tuesday, October 21, 2014 Rosemont, IL IRS/Tax Practitioners Symposium Interact with experts, hear the latest updates and

More information

2014 STRATEGIC PLAN: INTRODUCTION

2014 STRATEGIC PLAN: INTRODUCTION 2014 STRATEGIC PLAN: INTRODUCTION The Association of Inspectors General s Strategic Plan identifies our collective aspirations of what this organization may achieve in the years to come. It is designed

More information

Robert A. Bauerschmidt graduated cum laude from The University of Illinois College of Law in May, 1990 and received his Bachelor of Arts Degree from

Robert A. Bauerschmidt graduated cum laude from The University of Illinois College of Law in May, 1990 and received his Bachelor of Arts Degree from Robert A. Bauerschmidt graduated cum laude from The University of Illinois College of Law in May, 1990 and received his Bachelor of Arts Degree from The University of Michigan in May, 1987. In 1990, he

More information

Wednesday, March 11, 2015 8:00am to 4:30pm. Seats are filling fast, sign up today!

Wednesday, March 11, 2015 8:00am to 4:30pm. Seats are filling fast, sign up today! EVENT NOTICE Making the Business Case for Cybersecurity & Public-Private Sector Cooperation Wednesday, March 11, 2015 8:00am to 4:30pm Presented by: ISACA - Greater Hartford Chapter Guest Speaker: Judith

More information

Security Transcends Technology

Security Transcends Technology INTERNATIONAL INFORMATION SYSTEMS SECURITY CERTIFICATION CONSORTIUM, INC. Career Enhancement and Support Strategies for Information Security Professionals Paul Wang, MSc, CISA, CISSP Paul.Wang@ch.pwc.com

More information

CYBERSECURITY BEST PRACTICES FOR SMALL AND MEDIUM PENNSYLVANIA UTILITIES

CYBERSECURITY BEST PRACTICES FOR SMALL AND MEDIUM PENNSYLVANIA UTILITIES CYBERSECURITY BEST PRACTICES FOR SMALL AND MEDIUM PENNSYLVANIA UTILITIES The information provided in this document is presented as a courtesy to be used for informational purposes only. This information

More information

GRC/Cyber Insurance. February 18, 2014. Start Time: 9 AM US Pacific, Noon US Eastern, 5 pm London. Join the conversation: #ISSAWebConf

GRC/Cyber Insurance. February 18, 2014. Start Time: 9 AM US Pacific, Noon US Eastern, 5 pm London. Join the conversation: #ISSAWebConf GRC/Cyber Insurance February 18, 2014 Start Time: 9 AM US Pacific, Noon US Eastern, 5 pm London Join the conversation: 1 Generously sponsored by: 2 Welcome Conference Moderator Allan Wall ISSA Web Conference

More information

ISSA SOUTH TEXAS CHAPTER NEWSLETTER

ISSA SOUTH TEXAS CHAPTER NEWSLETTER Page 1 of 7 ISSA SOUTH TEXAS CHAPTER NEWSLETTER For November 2013 Voted "Outstanding Chapter of 2007 and 2013" by ISSA International As always, please feel free to contact me with any suggestions or requests

More information

Sponsorship Opportunities 5-2016. Thomas Odams. Events Manager, EMEA, RANT Events t: 0203 119 3387 m: 07827 870 359 todams@rantevents.

Sponsorship Opportunities 5-2016. Thomas Odams. Events Manager, EMEA, RANT Events t: 0203 119 3387 m: 07827 870 359 todams@rantevents. Sponsorship Opportunities 5-2016 Thomas Odams Events Manager, EMEA, RANT Events t: 0203 119 3387 m: 07827 870 359 todams@rantevents.com About The RANT Forum (Risk and Network Threat Forum) The RANT Forum

More information

ISSA SOUTH TEXAS CHAPTER

ISSA SOUTH TEXAS CHAPTER Page 1 of 5 ISSA SOUTH TEXAS CHAPTER ISSA News Letter For October 2012 Voted "Outstanding Chapter of 2007" by ISSA International As always, please feel free to contact me with any suggestions or requests

More information

Inaugural Conference

Inaugural Conference Rutgers Institute for Emergency Preparedness and Homeland Security Date/Time June 6, 2014 8:00 a.m. to 3:00 p.m. Location The Heldrich Hotel and Conference Center 10 Livingston Avenue, New Brunswick, NJ

More information

THOMAS WELCH, CISSP, CPP, CISA, CISM, CFI, CHS-III twelch@bullzisecurity.com SUMMARY

THOMAS WELCH, CISSP, CPP, CISA, CISM, CFI, CHS-III twelch@bullzisecurity.com SUMMARY , CISSP, CPP, CISA, CISM, CFI, CHS-III twelch@bullzisecurity.com SUMMARY Mr. Welch has over twenty years in the Security and Information Systems business, twelve of which he was directly responsible for

More information

WRITTEN TESTIMONY OF

WRITTEN TESTIMONY OF WRITTEN TESTIMONY OF KEVIN MANDIA CHIEF EXECUTIVE OFFICER MANDIANT CORPORATION BEFORE THE SUBCOMMITTEE ON CRIME AND TERRORISM JUDICIARY COMMITTEE UNITED STATES SENATE May 8, 2013 Introduction Thank you

More information

ESTATE PLANNING AND ADMINISTRATION SEMINAR

ESTATE PLANNING AND ADMINISTRATION SEMINAR ESTATE PLANNING AND ADMINISTRATION SEMINAR WEDNESDAY, JULY 30, 2014 8:30 AM Registration and Breakfast 9:00 AM 1:00 PM 3.0 CLE Credits Pending Kaye Scholer, LLP 425 Park Avenue New York, NY 1 Page AGENDA

More information

The Hunt for Fraud. September 25, 2014. Seminar / Training. September 26, 2014

The Hunt for Fraud. September 25, 2014. Seminar / Training. September 26, 2014 BYOD and Securing Mobile Devices September 25, 2014 The Hunt for Fraud September 26, 2014 Seminar / Training Central Arkansas Chapter Information Systems Audit and Control Association, Arkansas Division

More information

SENATE STANDING COMMITTEE ON LEGAL AND CONSTITUTIONAL AFFAIRS AUSTRALIAN FEDERAL POLICE. Question No. 100

SENATE STANDING COMMITTEE ON LEGAL AND CONSTITUTIONAL AFFAIRS AUSTRALIAN FEDERAL POLICE. Question No. 100 SENATE STANDING COMMITTEE ON LEGAL AND CONSTITUTIONAL AFFAIRS AUSTRALIAN FEDERAL POLICE Question No. 100 Senator McKenzie asked the following question at the hearing on 24 May 2012: a) How do you define

More information

Cyber Security Awareness Workshop

Cyber Security Awareness Workshop December 5, 2012 War Memorial Building, Balboa Park Participant Guide The San Diego Cyber Security Threat Awareness Response and Recovery Program (C-STARR) is hosted by the City of San Diego and the Securing

More information

April 2015. http://raleigh.issa.org. LinkedIn. Facebook. @RaleighISSA. Meeting Sponsor

April 2015. http://raleigh.issa.org. LinkedIn. Facebook. @RaleighISSA. Meeting Sponsor April 2015 http://raleigh.issa.org Meeting Sponsor LinkedIn Facebook @RaleighISSA 2015 Board President = Robert Martin VP = Mark Whitteker Treasurer = Mark Fontes Education Director = Chuck Kesler Communications

More information

DON T BE A VICTIM! IS YOUR INVESTMENT PROGRAM PROTECTED FROM CYBERSECURITY THREATS?

DON T BE A VICTIM! IS YOUR INVESTMENT PROGRAM PROTECTED FROM CYBERSECURITY THREATS? HEALTH WEALTH CAREER DON T BE A VICTIM! IS YOUR INVESTMENT PROGRAM PROTECTED FROM CYBERSECURITY THREATS? Gregg Sommer, CAIA Head of Operational Risk Assessments St. Louis MERCER 2015 0 CYBERSECURITY BREACHES

More information

Sponsorship Opportunities

Sponsorship Opportunities Sponsorship Opportunities Thomas Odams Events Manager EMEA, RANT Events t: 0207 510 9039 m: 07827 870 359 todams@rantevents.com Sponsorship Opportunities About The Risk and Network Threat Forum (RANT)

More information

Cynthia E. Jones. David A. Clark School of Law, University of the District of Columbia Summer 1996 Adjunct Instructor (Appellate Advocacy)

Cynthia E. Jones. David A. Clark School of Law, University of the District of Columbia Summer 1996 Adjunct Instructor (Appellate Advocacy) Cynthia E. Jones Teaching Experience Assistant Professor of Law Fall 2004-present Visiting Professor 2002-2004 Courses: Evidence, Criminal Law, Criminal Procedure and Race, Crime and Politics seminar George

More information

U.S. Cyber Security Readiness

U.S. Cyber Security Readiness U.S. Cyber Security Readiness Anthony V. Teelucksingh Senior Counsel United States Department of Justice John Chris Dowd Special Agent Federal Bureau of Investigation Overview U.S. National Plan National

More information

Forensic & Investigative Accounting (FIA) Section American Accounting Association Mission, Objectives and 2013-2015 Strategy.

Forensic & Investigative Accounting (FIA) Section American Accounting Association Mission, Objectives and 2013-2015 Strategy. Forensic & Investigative Accounting (FIA) Section American Accounting Association Mission, Objectives and 2013-2015 Strategy Mission The mission of the Forensic & Investigative (FIA) Section of the American

More information

KEY TRENDS AND DRIVERS OF SECURITY

KEY TRENDS AND DRIVERS OF SECURITY CYBERSECURITY: ISSUES AND ISACA S RESPONSE Speaker: Renato Burazer, CISA,CISM,CRISC,CGEIT,CISSP KEY TRENDS AND DRIVERS OF SECURITY Consumerization Emerging Trends Continual Regulatory and Compliance Pressures

More information

University of Maryland University College 2013 Spring Job Fair & Career Expo

University of Maryland University College 2013 Spring Job Fair & Career Expo Aflac University of Maryland University College Address: 152 Rollins Avenue Suite 210 Rockville, Maryland 20852 Website: www.aflac.com Position(s): Sales and Marketing Associate, Human Resources and Corporate

More information

Services. Computer Forensic Investigations

Services. Computer Forensic Investigations DataTriangle, Inc. is uniquely structured to provide you with a high quality expert as expeditiously as possible. Charles Snipes has nearly 15 years of experience with criminal investigations in the areas

More information

Keynote: FBI Wednesday, February 4 noon 1:10 p.m.

Keynote: FBI Wednesday, February 4 noon 1:10 p.m. Keynote: FBI Wednesday, February 4 noon 1:10 p.m. Speaker: Leo Taddeo Special Agent in Change, Cyber/Special Operations Division Federal Bureau of Investigation Biography: Leo Taddeo Leo Taddeo is the

More information

Over 20 years experience in Information Security Management, Risk Management, Third Party Oversight and IT Audit.

Over 20 years experience in Information Security Management, Risk Management, Third Party Oversight and IT Audit. CYBERSECURITY: ISSUES AND ISACA S RESPONSE June 2014 BILL S BIO Over 20 years experience in Information Security Management, Risk Management, Third Party Oversight and IT Audit. Vice President Controls

More information

CURRICULUM VITAE JAMES R. SWAUGER Digital Forensic Examiner

CURRICULUM VITAE JAMES R. SWAUGER Digital Forensic Examiner CURRICULUM VITAE JAMES R. SWAUGER Digital Forensic Examiner Binary Intelligence, LLC 150 Industrial Drive Franklin, Ohio 45005 Phone: 866.246.2794 x703 Email: jswauger@binaryintel.com CERTIFICATIONS AND

More information

FedVTE Training Catalog SPRING 2015. advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov

FedVTE Training Catalog SPRING 2015. advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov FedVTE Training Catalog SPRING 2015 advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov If you need any assistance please contact the FedVTE Help Desk here or email the

More information

PRESENTATION TO THE UNIVERSITY SYSTEM OF MARYLAND S BOARD OF REGENTS

PRESENTATION TO THE UNIVERSITY SYSTEM OF MARYLAND S BOARD OF REGENTS CYBERSECURITY PRESENTATION TO THE UNIVERSITY SYSTEM OF MARYLAND S BOARD OF REGENTS by Dr. Lawrence A. Gordon (Lgordon@rhsmith.umd.edu) EY Professor of Managerial Accounting and Information Assurance Affiliate

More information

ELEMENTS OF FINANCIAL CRIMES INVESTIGATIONS

ELEMENTS OF FINANCIAL CRIMES INVESTIGATIONS ELEMENTS OF FINANCIAL CRIMES INVESTIGATIONS This one-day course will provide an officer with the essential investigative foundation to conduct a financial crimes investigation in today s technology driven

More information

ELEMENTS OF FINANCIAL CRIMES INVESTIGATIONS

ELEMENTS OF FINANCIAL CRIMES INVESTIGATIONS ELEMENTS OF FINANCIAL CRIMES INVESTIGATIONS This one-day course will provide an officer with the essential investigative foundation to conduct a financial crimes investigation in today s technology driven

More information

WRITTEN TESTIMONY BEFORE THE HEARING ON PROTECTING PERSONAL CONSUMER INFORMATION FROM CYBER ATTACKS AND DATA BREACHES MARCH 26, 2014 2:30 PM

WRITTEN TESTIMONY BEFORE THE HEARING ON PROTECTING PERSONAL CONSUMER INFORMATION FROM CYBER ATTACKS AND DATA BREACHES MARCH 26, 2014 2:30 PM WRITTEN TESTIMONY BEFORE THE SENATE COMMITTEE ON COMMERCE, SCIENCE, & TRANSPORTATION HEARING ON PROTECTING PERSONAL CONSUMER INFORMATION FROM CYBER ATTACKS AND DATA BREACHES MARCH 26, 2014 2:30 PM TESTIMONY

More information

Forensic Certifications

Forensic Certifications Forensic Certifications Mayuri Shakamuri CS 489-02 Digital Forensics October 31, 2006 New Mexico Tech Executive Summary Digital Forensics is rapidly growing and evolving to become a scientific practice

More information

ANGIE SINGER KEATING CHIEF EXECUTIVE OFFICER, CO-FOUNDER

ANGIE SINGER KEATING CHIEF EXECUTIVE OFFICER, CO-FOUNDER CERTIFICATIONS ANGIE SINGER KEATING CHIEF EXECUTIVE OFFICER, CO-FOUNDER Certified Information Privacy Professional (CIPP) by the International Association of Privacy Professionals (IAPP) Certified Information

More information

Cyber Liability Insurance:

Cyber Liability Insurance: Cyber Liability Insurance: Reg Harnish, CISSP, CISM, CISA Chief Security Strategist GreyCastle Security Steve Lobel Vice President Anchor Agency October 17, 2013 1,200 Introduction Cybercrime Today Major

More information

2015 Cybersecurity Campaign. Improving Today, Protecting Tomorrow

2015 Cybersecurity Campaign. Improving Today, Protecting Tomorrow 2015 Cybersecurity Campaign Improving Today, Protecting Tomorrow THE STATE OF U.S. CYBERSECURITY: OUR NATION S ECONOMIC AND NATIONAL SECURITY ARE AT SIGNIFICANT RISK Hackers have breached the computer

More information

Summary Report from the Girls Workshop Cool Careers for Girls in Cybersecurity October 4 th, 2007. University of Maryland, College Park, MD

Summary Report from the Girls Workshop Cool Careers for Girls in Cybersecurity October 4 th, 2007. University of Maryland, College Park, MD Summary Report from the Girls Workshop Cool Careers for Girls in Cybersecurity October 4 th, 2007 University of Maryland, College Park, MD University of Maryland CyberWATCH Subcontract Deliverables by

More information

The FBI and the Internet

The FBI and the Internet The FBI and the Internet Special Agent Robert Flaim Federal Bureau of Investigation Presentation Goals To give you a better understanding of: The FBI Cyber Division, its priorities, and its mission The

More information

INVESTIGATING AND PROSECUTING MONEY LAUNDERING

INVESTIGATING AND PROSECUTING MONEY LAUNDERING INVESTIGATING AND PROSECUTING MONEY LAUNDERING This one-day course will discuss the criminal elements and case law for N.J.S.A criminal statue 2C:21-25, Financial Facilitation of Criminal Activity, also

More information

Corporate Compliance Programs - Industry Best Practices. November 18, 2010 (Thursday) 8:00 a.m. to 12:00p.m.

Corporate Compliance Programs - Industry Best Practices. November 18, 2010 (Thursday) 8:00 a.m. to 12:00p.m. The Healthcare Financial Management Association of Northeastern New York is pleased to present the following education session: Event Forum: Where: When: Corporate Compliance Programs - Industry Best Practices

More information

Information Security Policy

Information Security Policy Information Security Policy Steve R. Hutchens, CISSP EDS, Global Leader, Homeland Security Agenda Security Architecture Threats and Vulnerabilities Design Considerations Information Security Policy Current

More information

Cybersecurity Opportunities. Presented to: National Professional Science Masters Association November 13, 2013

Cybersecurity Opportunities. Presented to: National Professional Science Masters Association November 13, 2013 Cybersecurity Opportunities Presented to: National Professional Science Masters Association November 13, 2013 Overall Themes For Discussion Advice for Grads Your Degree Is A Place To Start. It does not

More information

About Our 2015 WTA Cyber Security Speakers and Sessions

About Our 2015 WTA Cyber Security Speakers and Sessions About Our 2015 WTA Cyber Security Speakers and Sessions The constant threat of cyber security attacks is the number one concern for most businesses today. Weaknesses in networks and data security can expose

More information

JOB ANNOUNCEMENT. Chief Security Officer, Cheniere Energy, Inc.

JOB ANNOUNCEMENT. Chief Security Officer, Cheniere Energy, Inc. JOB ANNOUNCEMENT Chief Security Officer, Cheniere Energy, Inc. Position Overview The Vice President and Chief Security Risk Officer (CSRO) reports to the Chairman, Chief Executive Officer and President

More information

Bio Summary and CV. curriculum vitae of John C. Villines; Introduction; page 1 of 5 (rev Jan 2013)

Bio Summary and CV. curriculum vitae of John C. Villines; Introduction; page 1 of 5 (rev Jan 2013) Bio Summary and CV John Villines has dedicated his adult life to security, investigations and crime prevention. He has maintained a company license (Security and Investigations) in Georgia for approximately

More information

Building the Next Generation of Computer Security Professionals. Chris Simpson

Building the Next Generation of Computer Security Professionals. Chris Simpson Building the Next Generation of Computer Security Professionals Chris Simpson Overview Why teach computer security to high school students Deciding what to teach What I taught Community Support Lessons

More information

Name of presentation Company name

Name of presentation Company name Name of presentation Company name Thank you for your consideration CyberSecurity Awareness Month Cybercrime and Copyright Infringement Amber Chris Burgess Marcus Rogers Amber Purdue student sued by RIAA

More information

PREPARE YOUR INCIDENT RESPONSE TEAM

PREPARE YOUR INCIDENT RESPONSE TEAM PREPARE YOUR INCIDENT RESPONSE TEAM JUNE 2015 Michael Harrington, Fidelis Cybersecurity It s a big problem... The ongoing cyber-thefts from The scale of international theft the In networks 2013, the of

More information

Business Babes By-Laws

Business Babes By-Laws Business Babes By-Laws ARTICLE I. Name of the Organization This group shall be known as the Business Babes Society (BBS), Chapter 1. ARTICLE II. Purpose Business Babes is a support and networking group

More information

CST 244 Computer Forensics and Investigation Spring, 2010

CST 244 Computer Forensics and Investigation Spring, 2010 CST 244 Computer Forensics and Investigation Spring, 2010 Instructor: Guy Theriault Class Room: 221 Office: Rm 221 Class Hours: Mon thru Fri 8:00 to 10:50 Class Dates: Mar 8 to Apr 16 Office hours: Monday,

More information

Working with the FBI

Working with the FBI Working with the FBI WMACCA Data Privacy & Security Conference September 17, 2014 Individuals Organized Crime Syndicates Hacktivist Groups Nation States Nation-States Individuals Industry Law Enforcement

More information

Commonwealth Approach to Cybergovernance and Cybersecurity. By the Commonwealth Telecommunications Organisation

Commonwealth Approach to Cybergovernance and Cybersecurity. By the Commonwealth Telecommunications Organisation Commonwealth Approach to Cybergovernance and Cybersecurity By the Commonwealth Telecommunications Organisation Trends in Cyberspace Cyberspace provides access to ICT Bridging the digital divide and influencing

More information

Breaching Bad: New Cyber Security Risks & Regulations Affecting Suppliers At All Tiers

Breaching Bad: New Cyber Security Risks & Regulations Affecting Suppliers At All Tiers Breaching Bad: New Cyber Security Risks & Regulations Affecting Suppliers At All Tiers Securing the Infrastructure April 2015 Stan Stahl, Ph.D. President Citadel Information Group Phone: 323.428.0441 Stan@Citadel-Information.com

More information

The global challenge

The global challenge The global challenge CYBERCRIME The global challenge Cybercrime has developed from an emerging crime to a serious manifestation of crime with great practical relevance With the emerging use of computer

More information

GLOBAL BUSINESS DIALOGUE ON ELECTRONIC COMMERCE CYBER SECURITY AND CYBER CRIME SEPTEMBER 26, 2000. CEO EDS Corporation

GLOBAL BUSINESS DIALOGUE ON ELECTRONIC COMMERCE CYBER SECURITY AND CYBER CRIME SEPTEMBER 26, 2000. CEO EDS Corporation GLOBAL BUSINESS DIALOGUE ON ELECTRONIC COMMERCE CYBER SECURITY AND CYBER CRIME SEPTEMBER 26, 2000 Issue Chair: Issue Sherpa: Dick Brown CEO EDS Corporation Bill Poulos EDS Corporation Tel: (202) 637-6708

More information

About MicroSolved, Inc. Company Profile, Experience, Capabilities and Differentiators

About MicroSolved, Inc. Company Profile, Experience, Capabilities and Differentiators About MicroSolved, Inc. Company Profile, Experience, Capabilities and Differentiators Profile MicroSolved, Inc. is an Ohio corporation with a Dun and Bradstreet number of 022904119. Since 1992, MSI has

More information

Amit Garg BERKELEY RESEARCH GROUP, LLC 1800 M Street, N.W. 2 nd Floor Washington, D.C. 20036. Direct: 202.747.3483 agarg@thinkbrg.

Amit Garg BERKELEY RESEARCH GROUP, LLC 1800 M Street, N.W. 2 nd Floor Washington, D.C. 20036. Direct: 202.747.3483 agarg@thinkbrg. Curriculum Vitae Amit Garg BERKELEY RESEARCH GROUP, LLC 1800 M Street, N.W. 2 nd Floor Washington, D.C. 20036 Direct: 202.747.3483 agarg@thinkbrg.com SUMMARY Amit Garg brings over 17 years of information

More information

FedVTE Training Catalog SUMMER 2015. advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov

FedVTE Training Catalog SUMMER 2015. advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov FedVTE Training Catalog SUMMER 2015 advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov Access FedVTE online at: fedvte.usalearning.gov If you need any assistance please

More information

Cybersecurity Global status update. Dr. Hamadoun I. Touré Secretary-General, ITU

Cybersecurity Global status update. Dr. Hamadoun I. Touré Secretary-General, ITU Cybersecurity Global status update Dr. Hamadoun I. Touré Secretary-General, ITU Cybercrime takes a toll on the global economy - Online fraud, identity theft, and lost intellectual property; - On governments,

More information

Cybercrime & Cybersecurity: the Ongoing Battle International Hellenic University

Cybercrime & Cybersecurity: the Ongoing Battle International Hellenic University Cybercrime & Cybersecurity: the Ongoing Battle International Hellenic University Andreas Athanasoulias, CISM, CISSP Information Security Officer & Security Consultant Brief introduction My career path

More information

University of Maryland Cybersecurity Center (MC 2 )

University of Maryland Cybersecurity Center (MC 2 ) University of Maryland Cybersecurity Center (MC 2 ) Responding to the Needs of the State, the Nation, and the Global Community Pat Prof. Michael Hicks Director www.cyber.umd.edu/ Cybersecurity Challenge

More information

E-Newsletter SUMMER 2006 PUBLIC INTEREST FELLOWSHIPS. In This Issue

E-Newsletter SUMMER 2006 PUBLIC INTEREST FELLOWSHIPS. In This Issue E-Newsletter March 14, 2006 In This Issue Summer 2006 Public Interest Fellowships Williams Freshman Trial Competition ABA Regional National Appellate Advocacy Competition Fall 2006 Registration March 14

More information

HIGH-RISK SECURITY VULNERABILITIES IDENTIFIED DURING REVIEWS OF INFORMATION TECHNOLOGY GENERAL CONTROLS

HIGH-RISK SECURITY VULNERABILITIES IDENTIFIED DURING REVIEWS OF INFORMATION TECHNOLOGY GENERAL CONTROLS Department of Health and Human Services OFFICE OF INSPECTOR GENERAL HIGH-RISK SECURITY VULNERABILITIES IDENTIFIED DURING REVIEWS OF INFORMATION TECHNOLOGY GENERAL CONTROLS AT STATE MEDICAID AGENCIES Inquiries

More information

CYBERSECURITY: ISSUES AND ISACA S RESPONSE

CYBERSECURITY: ISSUES AND ISACA S RESPONSE CYBERSECURITY: ISSUES AND ISACA S RESPONSE June 2014 KEY TRENDS AND DRIVERS OF SECURITY Consumerization Emerging Trends Continual Regulatory and Compliance Pressures Mobile devices Social media Cloud services

More information

JAMES R. SWAUGER Digital Forensic Examiner

JAMES R. SWAUGER Digital Forensic Examiner CURRICULUM VITAE JAMES R. SWAUGER Digital Forensic Examiner Binary Intelligence, LLC 726 East Main Street, Suite F #150 Lebanon, Ohio 45036 Phone: 866.246.2794 x703 Email: jswauger@binaryintel.com CERTIFICATIONS

More information

KIMMONS INVESTIGATIVE SERVICES, INC. Texas Largest & Most Experienced Investigative Firm

KIMMONS INVESTIGATIVE SERVICES, INC. Texas Largest & Most Experienced Investigative Firm KIMMONS INVESTIGATIVE SERVICES, INC. Texas Largest & Most Experienced Investigative Firm HOUSTON AUSTIN KIMMONS INVESTIGATIVE SERVICES, INC. HIGHLY RESPECTED, SKILLED TEAM OF INVESTIGATORS Rob Kimmons,

More information

TALKING POINTS ON DOMESTIC AND YOUTH VIOLENCE ATTORNEY GENERAL'S IOWA TELECONFERENCE OCTOBER 25, 1995 11:30 P.M. STARC ARMORY-DES MOINES, IOWA

TALKING POINTS ON DOMESTIC AND YOUTH VIOLENCE ATTORNEY GENERAL'S IOWA TELECONFERENCE OCTOBER 25, 1995 11:30 P.M. STARC ARMORY-DES MOINES, IOWA TALKING POINTS ON DOMESTIC AND YOUTH VIOLENCE ATTORNEY GENERAL'S IOWA TELECONFERENCE OCTOBER 25, 1995 11:30 P.M. STARC ARMORY-DES MOINES, IOWA I. INTRODUCTORY REMARKS * * * It is wonderful to be back here

More information