CSX Fundamentals Workshop

Size: px
Start display at page:

Download "CSX Fundamentals Workshop"

Transcription

1 CSX Fundamentals Workshop October 2016 Early registration 19 September 2016 Final registration 26 September 2016 Offered by In association with ISACA Athens Chapter has been awarded four times as Best Large Chapter in Europe/Africa (2009, 2012, 2013, 2014)

2 Contents 1. Introduction 1. Introduction 1 2. Scope 1 3. Who should attend? 1 4. Why attend 2 5. Where? When? Who will be the Trainer? 2 6. What will you learn? 2 7. Course Summary 3 8. Registration Process 4 9. Frequently Asked Questions Travelling Information 6 Cybersecurity is a growing and rapidly changing field, and it is crucial that the central concepts that frame and define this increasingly pervasive field are understood by professionals who are involved and concerned with the security implications of Information Technologies (IT). Cybersecurity Nexus (CSX) is a new platform for security knowledge and a professional development and certification program in cybersecurity. Launched by ISACA, CSX provides IT security and cybersecurity professionals with the knowledge and technical skills to defend their organization from security breaches and cyber-attacks. A key part of Cybersecurity Nexus is its training workshops and innovative certification tracks. ISACA International notes that while other cyber security certifications assess knowledge in a question-and-answer format, CSX training and exams are conducted in a live, virtual cyber lab environment and test on whether an individual has the skills and technical savvy to do the job. The Certification Tracks CSX certifications are designed to test a candidate s ability to perform tasks of various degrees of complexity within 5 cybersecurity areas: identify protect detect respond recover. This new cybersecurity path begins with the CSX Fundamentals Certificate, which offers a knowledge-based credential on the introductory concepts that frame and define the standards, guidelines and practices of the industry. It also provides insight into the importance of cybersecurity and the integral role of cybersecurity professionals. The next 4 levels of CSX Certifications are based on the knowledge and concepts covered in the CSX Fundamentals Certificate but test competencies in scenarios that become more complex and sophisticated the higher the level. The CSX Fundamentals workshop is offered for the second time in Greece, after the quick sold out of the first course which was held, last November. The course is offered exclusively in Greece by ISACA Athens Chapter with the support of the Hellenic American Union. 2. Scope of the course This workshop is geared toward IT security professionals new to cyber security, recent graduates in IT-relevant fields, and IT professionals looking for a career change to cybersecurity. It prepares you for the CSX Fundamentals Exam covering the foundational areas of cyber security: Cybersecurity objectives and roles The difference between cybersecurity and information security The Principles of Cybersecurity Information Security within Lifecycle management Risks and Vulnerabilities Incident Response 2 ISACA Athens Chapter CSX Fundamentals Workshops

3 3. Who should attend? IT security professionals new to cybersecurity, IT oriented graduates and those IT professionals looking for a career change to cybersecurity. 4. Why attend? By the end of the course you will: Understand basic cybersecurity concepts and definitions Define network security architecture concepts Recognize malware analysis concepts and methodology Identify computer network defense (CND) and vulnerability assessment tools, including open source tools and their capabilities Explain network systems management principles, models, methods, and tools Distinguish system and application security threats and vulnerabilities Classify types of incidents (categories, responses, and timelines for responses) Outline disaster recovery and business continuity planning Comprehend incident response and handling methodologies Understand security event correlation tools, and how different file types can be used for a typical behavior Be aware of the basic concepts, practices, tools, tactics, techniques, and procedures for processing digital forensic data Recognize new and emerging information technology and information security technologies 5. Where? When? Who will be the Trainer? The course will be held at the Hellenic American Union Conference Center, Massalias 22, Athens, on 3-4 October 2016 (Monday, Tuesday), from 9.00 to Course leader: Dr. Konstantinos Papapanagiotou, CISSP, ITIL, Information Security Sales Manager, OTE, OWASP Chapter Leader. Dr. Konstantinos Papapanagiotou is the Information Security Services Sales Manager at OTE. In the past he has led teams of consultants, helping large organizations in Greece, Cyprus, Balkans and the Middle East improve their security posture. He has more than 12 years of experience in the field of information security both as a corporate consultant and as a researcher. Konstantinos holds a BSc and PhD in Information Security from the University of Athens and an MSc in Information Security with distinction from Royal Holloway. He is also leading the OWASP Greek Chapter and is an ISACA CyberSecurity Nexus Liaison for Greece. ISACA Athens Chapter CSX Fundamentals Workshops 3

4 6. What will you learn? Cybersecurity introduction and overview Cybersecurity architecture principles Cybersecurity definition Objectives of cybersecurity Key business and technology factors Cybersecurity roles and governance Domains of cybersecurity Cybersecurity concepts Risk management terms, concepts and frameworks Common attack types and vectors General process and attributes of cyber attacks Malware Framework and guidance for policies and procedures Cybersecurity control processes Security architecture Perimeter security concepts Security architectures and frameworks The OSI model and TCP/IP communication protocol Defense in depth Firewall concepts and implementations Isolation and segmentation Intrusion detection and prevention systems Antivirus and anti-malware Encryption fundamentals, techniques and applications Security of networks, systems, applications and data Risk analysis, risk assessments and risk mitigation strategies Scanning, assessment and management of vulnerabilities Penetration testing Network management and configuration Port numbers and protocols Risk and controls for remote and wireless access System hardening and virtualization Specialized systems Command line knowledge and tools System development life cycle (SDLC) OWASP top ten application security risk Data classification process and requirements Incident response Distinctions between events and incidents Incident categories and types Security event management Key elements of incident response plans Legal requirements of investigation and evidence preservation Requirements for forensic investigations Business continuity planning and disaster recovery The security implications of the adoption of emerging technologies Trends in the current threat landscape Characteristics and targets of advanced persistent threats (APTs) Mobile device vulnerabilities, threats and risk BYOD and consumerization of IT and mobile devices Risk and benefits of cloud and digital collaboration 4 ISACA Athens Chapter CSX Fundamentals Workshops

5 7. Course Summary Prerequisites Fundamental concepts of IT Security, IT academic background CPEs 16 Languages Greek Planning 3-4 October 2016 (Monday, Tuesday), Cost EARLY BIRD (registration until 19/9/2016) for ISACA members only 270 per participant STANDARD RATE (registration after 19/9/2016) 350 per participant for ISACA member 450 per participant for non-isaca member (same fee applies for non-members registrations before 19/9/2016) Unemployed ISACA members: 200 per participant Special price sponsored by ISACA Athens Chapter Cost includes course material Cost does not include exam fees This program is subsidized by LAEK/OAED 0,24% (for participants from Greek companies only) Registration fees to be paid until 26 September ISACA Athens Chapter CSX Fundamentals Workshops 5

6 8. Registration Process Step 1 Step 2 Step 3 Fill in the registration form at the end of this document and send it to Hellenic American Union by following the respective guidelines below the registration form. Hellenic American Union will send a registration confirmation receipt via . Send payment amount to Hellenic American Union by following the payment details on the registration form at the end of this document. For bank transfer information please contact the Hellenic American Union. We will send you bank transfer information once we receive your registration form. Please always quote the invoice number which you will receive once you have registered, or alternatively please quote your company s name or the delegates name in the transfer instructions. Step 4 The amount to be credited should be net of commissions. Any commissions/fees for bank deposits or transfers are payable by participants. You will receive a course registration invoice from Hellenic American Union after we receive your payment. Payments: All registrations & payments must be received by the Hellenic American Union the latest by Monday 26 September Invoices are issued by the Hellenic American Union. Cancellations/Substitutions must be made via and sent to training@hau.gr. A full refund can be given for cancellation requests received in writing 10 working days before the course commencement. No refund will be given for cancellation requests after this deadline. A replacement is always welcome at no extra cost! 6 ISACA Athens Chapter CSX Fundamentals Workshops

7 9. Frequently Asked Questions When is the CSX Fundamentals exam? Is there one combined registration process for the CSX exam and the ISACA Athens Chapter s CSX Fundamentals Course? Is attending this ISACA CSX Fundamentals sufficient enough for me to pass this exam successfully The Cybersecurity Fundamentals Certificate exam is available online, at your convenience. Simply schedule the date and time that works best for you and your exam will be remotely proctored. No, there are two separate registration processes because the exam is administered by ISACA International. One registration combining both CSX exam fees and CSX Fundamentals course fees is not possible. Yes What is the date of the next CSX Fundamentals course? Are there any special fees for unemployed members of ISACA Athens Chapter for this course? ISACA Athens Chapter will only run 2 CSX Fundamental Courses each year. Next course dates will be announced after the successful completion of this course. Yes, please refer to the registration form. ISACA Athens Chapter CSX Fundamentals Workshops 7

8 10. Travel Information Accommodation - Recommended hotel For those travelling to Athens or from abroad and need accommodation, we recommend Titania hotel ( In order to take advantage of special rates, please contact Ms Vasiliki Zafiri ( , vzafiri@hau.gr) at the Hellenic American Union. Transportation arrangements We highly recommend using our excellent Athens public transportation (metro). You need to validate your paper ticket at the beginning of your journey. Intergrated tickets (as well as Metro airport tickets) are valid for 90 minutes so you don t need to validate it again if you use another mode of transportation anywhere in Athens within 90 minutes of the first validation. Ticket price is 8 (one way) or 14 (for 2 journeys return ticket). One way ticket for 2 persons is 14 and for 3 persons is 20. Getting to/from the Athens International Airport and the city center, located about 36 km east can be achieved via metro: Take the Blue line (line 3 direction Anthoupoli ) of the metro from Athens International Airport and get off at Syntagma station. Trains run every 30 minutes, 7 days a week from 6:30 a.m. to 11:30 p.m. The trip from/to the Airport to Syntagma metro station (Athens center) lasts 40 minutes. See the Metro timetable to the airport here and also an Athens airport railway station map. For ticket info see Athens Transport tickets and cards. 8 ISACA Athens Chapter CSX Fundamentals Workshops

9 From Syntagma metro station you can: a. either change and take the Red line (line 2 direction Anthoupoli) in order to get off at next stop, Panepistimio metro station (exit National Library) and walk approximately 4-5 minutes towards Omonia square to Titania Hotel (it is just on your right hand side). b. Walk from Syntagma Square to Titania Hotel through Panepistimiou street (it is approximately minutes walk) Red route: from metro Syntagma Station (circled A) and Panepistimio Station (circle) to Hotel (B) and venue (C) Blue route: alternative route from Hotel (B) to venue (C) On last evening at the end of the Exam Preparation Course (at 17:00), you can take the metro from Syntagma directly to the airport. Alternatives: a. By Bus (map: From the Airport take Bus Line X95 Syntagma Athens Airport Express (Orange Line). From Syntagma Square you can either take the Metro (see above) or walk to Titania Hotel. You can also take a bus (most of them are passing by in front of the hotel, while some stop right in front of the hotel). b. By Taxi (Flat fare: 35 Euros) c. By Car (36 km, minutes depending however on traffic) Via Attiki Odos, route 6/Ε94, 31,6 km, 35 min Via Mesogeion Avenue, 20,8 km, 34 min Via Route 64, 26 km, 34 min ISACA Athens Chapter CSX Fundamentals Workshops 9

10 Registration Form I wish to register for the CSX Fundamentals Workshop, 3-4 October 2016 Please send this registration form to Hellenic American Union fax nr. (30) , or at training@hau.gr. Registration Fees Isaca Members Non Members Early bird fee until 19 September q 450 q Normal fee after 19 September q 450 q 200 q Unemployed ISACA members Special price sponsored by ISACA Athens Chapter q I wish to register the workshop for the 0,24 OAED-LAEK subsidy program In order to guarantee a place on the course and the exams, delegates are kindly requested to register until the 26th September PERSONAL DETAILS (Please print clearly) Family Name Company Home address* (individual/personal registrations only) City* First Name Tel* Fax Ε-mail Tax ID Nr./Tax Registration Office* INVOICE DETAILS COMPANY NAME Position/Title Postal Code* (*mandatory fields for individual registrations only) (for individual registrations only) (all fields are mandatory for company registrations) Area of Business Address City Postal Code Tel Tax ID Nr. Fax Tax Registration Office I/We understand and accept the registration and cancellation policies and procedures, and the protection of personal and credit card data policy. Signature/Company stamp PAYMENT DETAILS Payments are made to the Hellenic American Union immediately upon registration. Once the Hellenic American Union receives the registration form, we will send you confirmation and payment transfer information. PAYMENT METHOD q Please invoice my company Bank Transfer** q VISA q MASTERCARD q CANCELLATION POLICY Date ** For bank transfer information please contact the Hellenic American Union. We will send you bank transfer information once we receive your registration form. Please always quote the invoice number which you will receive once you have registered, or alternatively please quote your company s name or the delegates name in the transfer instructions. An invoice will be sent upon receipt of payment. A full refund will be given for cancellations requests received in writing up to 10 working days prior the course starts. Cancellations received within less than 10 working days before the course will not be refunded. A replacement is always welcome. Disclaimer: ISACA Athens Chapter and Hellenic American Union reserve the right to change or cancel any part of the published program due to unforeseen circumstances. In case the event is cancelled, registration fees will be returned in full to the delegates. The Hellenic American Union collects and uses personal information in order to communicate with the members of its public, to provide educational and cultural programs and services, and to improve the quality of services that it offers. The information we have requested in this form will be maintained in digital and/or physical form and used only for the purposes described above. You have the right to reasonable access to the personal information we have on you, to request a copy of this information, and to correct it if inaccurate. To find out more, contact the Hellenic American Union at privacy@hau.gr. In association with * * A recognized Center for Lifelong Learning (ΚεΔιΒιΜ2) that has been granted a license of operation by the National Organization for the Certification of Qualifications and Vocational Guidance (EOPPEP)

11 Information ISACA Athens Chapter For membership please contact: For certifications please contact: LinkedIn Group: ISACA Athens Chapter Twitter: isaca_gr Facebook: ISACA Athens Chapter For further information about the preparation course, please contact: Ηellenic American Union Tel: , Fax: , or ISACA Athens Chapter

CCSK Prep Course 2015

CCSK Prep Course 2015 CCSK Prep Course 2015 25 May 2015 Early registration 27 April 2015 Final registration 11 May 2015 Offered by ISACA Athens Chapter has been awarded four times as Best Large Chapter in Europe/Africa (2009,

More information

CYBERSECURITY: ISSUES AND ISACA S RESPONSE

CYBERSECURITY: ISSUES AND ISACA S RESPONSE CYBERSECURITY: ISSUES AND ISACA S RESPONSE June 2014 KEY TRENDS AND DRIVERS OF SECURITY Consumerization Emerging Trends Continual Regulatory and Compliance Pressures Mobile devices Social media Cloud services

More information

KEY TRENDS AND DRIVERS OF SECURITY

KEY TRENDS AND DRIVERS OF SECURITY CYBERSECURITY: ISSUES AND ISACA S RESPONSE Speaker: Renato Burazer, CISA,CISM,CRISC,CGEIT,CISSP KEY TRENDS AND DRIVERS OF SECURITY Consumerization Emerging Trends Continual Regulatory and Compliance Pressures

More information

Over 20 years experience in Information Security Management, Risk Management, Third Party Oversight and IT Audit.

Over 20 years experience in Information Security Management, Risk Management, Third Party Oversight and IT Audit. CYBERSECURITY: ISSUES AND ISACA S RESPONSE June 2014 BILL S BIO Over 20 years experience in Information Security Management, Risk Management, Third Party Oversight and IT Audit. Vice President Controls

More information

INSIGHTS AND RESOURCES FOR THE CYBERSECURITY PROFESSIONAL

INSIGHTS AND RESOURCES FOR THE CYBERSECURITY PROFESSIONAL INSIGHTS AND RESOURCES FOR THE CYBERSECURITY PROFESSIONAL BY 2 In enterprise IT, there is a single point where everything that matters in information, technology and business converges: Cybersecurity Nexus

More information

Logical Operations CyberSec First Responder: Threat Detection and Response (CFR) Exam CFR-110

Logical Operations CyberSec First Responder: Threat Detection and Response (CFR) Exam CFR-110 Logical Operations CyberSec First Responder: Threat Detection and Response (CFR) Exam CFR-110 Exam Information Candidate Eligibility: The CyberSec First Responder: Threat Detection and Response (CFR) exam

More information

Information Security Services

Information Security Services Information Security Services Information Security In 2013, Symantec reported a 62% increase in data breaches over 2012. These data breaches had tremendous impacts on many companies, resulting in intellectual

More information

A Channel Company White Paper. Online Security. Beyond Malware and Antivirus. Brought to You By:

A Channel Company White Paper. Online Security. Beyond Malware and Antivirus. Brought to You By: A Channel Company White Paper Online Security Beyond Malware and Antivirus Brought to You By: Abstract Security has always encompassed physical and logical components. But in the face of Bring Your Own

More information

IT AUDIT WHO WE ARE. Current Trends and Top Risks of 2015 10/9/2015. Eric Vyverberg. Randy Armknecht. David Kupinski

IT AUDIT WHO WE ARE. Current Trends and Top Risks of 2015 10/9/2015. Eric Vyverberg. Randy Armknecht. David Kupinski IT AUDIT Current Trends and Top Risks of 2015 2 02 Eric Vyverberg WHO WE ARE David Kupinski Randy Armknecht Associate Director Internal Audit Protiviti 317.510.4661 eric.vyverberg@protiviti.com Managing

More information

FedVTE Training Catalog SPRING 2015. advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov

FedVTE Training Catalog SPRING 2015. advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov FedVTE Training Catalog SPRING 2015 advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov If you need any assistance please contact the FedVTE Help Desk here or email the

More information

NSA/DHS Centers of Academic Excellence for Information Assurance/Cyber Defense

NSA/DHS Centers of Academic Excellence for Information Assurance/Cyber Defense NSA/DHS Centers of Academic Excellence for Information Assurance/Cyber Defense Cyber Investigations Data Management Systems Security Data Security Analysis Digital Forensics Health Care Security Industrial

More information

FedVTE Training Catalog SUMMER 2015. advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov

FedVTE Training Catalog SUMMER 2015. advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov FedVTE Training Catalog SUMMER 2015 advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov Access FedVTE online at: fedvte.usalearning.gov If you need any assistance please

More information

External Supplier Control Requirements

External Supplier Control Requirements External Supplier Control s Cyber Security For Suppliers Categorised as Low Cyber Risk 1. Asset Protection and System Configuration Barclays Data and the assets or systems storing or processing it must

More information

Appendix. Key Areas of Concern. i. Inadequate coverage of cybersecurity risk assessment exercises

Appendix. Key Areas of Concern. i. Inadequate coverage of cybersecurity risk assessment exercises Appendix Key Areas of Concern i. Inadequate coverage of cybersecurity risk assessment exercises The scope coverage of cybersecurity risk assessment exercises, such as cybersecurity control gap analysis

More information

THE CYBERSECURITY SKILL GAP: WHAT EMPLOYERS WANT YOU TO KNOW

THE CYBERSECURITY SKILL GAP: WHAT EMPLOYERS WANT YOU TO KNOW www.isaca.org/cyber THE CYBERSECURITY SKILL GAP: WHAT EMPLOYERS WANT YOU TO KNOW ROBERT E STROUD CGEIT CRISC INTERNATIONAL PRESIDENT ISACA & VP STRATEGY & INNOVATION CA TECHNOLOGIES February 2015 ISACA

More information

CyberNEXS Global Services

CyberNEXS Global Services CyberNEXS Global Services CYBERSECURITY A cyber training, exercising, competition and certification product for maximizing the cyber skills of your workforce The Cyber Network EXercise System CyberNEXS

More information

Testimony of Eunice Santos. House Oversight and Government Affairs Committee Subcommittee on Information Technology

Testimony of Eunice Santos. House Oversight and Government Affairs Committee Subcommittee on Information Technology Testimony of Eunice Santos Before the House Oversight and Government Affairs Committee Subcommittee on Information Technology Federal Efforts to Improve Cybersecurity June 20 th, 2016 Chicago, Illinois

More information

Cyber threats are growing.

Cyber threats are growing. Cyber threats are growing. So are your career opportunities. Put the future of your cybersecurity career in the hands of a respected online education leader. Everything you need to succeed. Excelsior College

More information

CYBERSECURITY NEXUS ROBERT E STROUD INTERNATIONAL PRESIDENT, ISACA RAMSÉS GALLEGO INTERNATIONAL VICE PRESIDENT, ISACA

CYBERSECURITY NEXUS ROBERT E STROUD INTERNATIONAL PRESIDENT, ISACA RAMSÉS GALLEGO INTERNATIONAL VICE PRESIDENT, ISACA CYBERSECURITY NEXUS ROBERT E STROUD INTERNATIONAL PRESIDENT, ISACA RAMSÉS GALLEGO INTERNATIONAL VICE PRESIDENT, ISACA Robert Stroud International President, ISACA VP Strategy & Innovation, CA Technologies

More information

Defense-in-Depth Strategies for Secure, Open Remote Access to Control System Networks

Defense-in-Depth Strategies for Secure, Open Remote Access to Control System Networks Defense-in-Depth Strategies for Secure, Open Remote Access to Control System Networks A look at multi-vendor access strategies Joel Langill TÜV FSEng ID-1772/09, CEH, CPT, CCNA Security Consultant / Staff

More information

BUILDING A SECURITY OPERATION CENTER (SOC) ACI-BIT Vancouver, BC. Los Angeles World Airports

BUILDING A SECURITY OPERATION CENTER (SOC) ACI-BIT Vancouver, BC. Los Angeles World Airports BUILDING A SECURITY OPERATION CENTER (SOC) ACI-BIT Vancouver, BC. Los Angeles World Airports Building a Security Operation Center Agenda: Auditing Your Network Environment Selecting Effective Security

More information

Hackers are here. Where are you?

Hackers are here. Where are you? 1 2 What is EC-Council Certified Security Analyst Licensed Penetration Tester Program You are an ethical hacker. Your last name is Pwned. You dream about enumeration and you can scan networks in your sleep.

More information

Security+ P a g e 1 of 5. 5-Day Instructor Led Course

Security+ P a g e 1 of 5. 5-Day Instructor Led Course P a g e 1 of 5 Security+ 5-Day Instructor Led Course Overview This course is the primary course you will need to take if your job responsibilities include securing network services, devices, and traffic

More information

ISACA Tools Help Develop Cybersecurity Expertise

ISACA Tools Help Develop Cybersecurity Expertise Volume 21, 8 October 2014 ISACA Tools Help Develop Cybersecurity Expertise Nominate Qualified Candidates for the ISACA Board of Directors Tips for Solving Data Classification Challenges Earn CPE at Professional

More information

Cisco Cyber Security. Professional Courses. About. Course Outline

Cisco Cyber Security. Professional Courses. About. Course Outline Cisco Cyber Security Professional Courses About This course introduces the importance of cybersecurity and current trends, eight modules with presentations and panel discussions that feature industry experts.

More information

SPSP Phase III Recruiting, Selecting, and Developing Secure Power Systems Professionals: Job Profiles

SPSP Phase III Recruiting, Selecting, and Developing Secure Power Systems Professionals: Job Profiles PNNL-24138 SPSP Phase III Recruiting, Selecting, and Developing Secure Power Systems Professionals: Job Profiles March 2015 LR O Neil TJ Conway DH Tobey FL Greitzer AC Dalton PK Pusey Prepared for the

More information

Principles of Information Assurance Syllabus

Principles of Information Assurance Syllabus Course Number: Pre-requisite: Career Cluster/Pathway: Career Major: Locations: Length: 8130 (OHLAP Approved) Fundamentals of Technology or equivalent industry certifications and/or work experience. Information

More information

2015 Michigan NASCIO Award Nomination. Cyber Security Initiatives: Michigan Cyber Disruption Response Strategy

2015 Michigan NASCIO Award Nomination. Cyber Security Initiatives: Michigan Cyber Disruption Response Strategy 2015 Michigan NASCIO Award Nomination Cyber Security Initiatives: Michigan Cyber Disruption Response Strategy Sponsor: David Behen, DTMB Director and Chief Information Officer Program Manager: Rod Davenport,

More information

Logging In: Auditing Cybersecurity in an Unsecure World

Logging In: Auditing Cybersecurity in an Unsecure World About This Course Logging In: Auditing Cybersecurity in an Unsecure World Course Description $5.4 million that s the average cost of a data breach to a U.S.-based company. It s no surprise, then, that

More information

The Cyber OODA Loop: How Your Attacker Should Help You Design Your Defense. Tony Sager The Center for Internet Security

The Cyber OODA Loop: How Your Attacker Should Help You Design Your Defense. Tony Sager The Center for Internet Security The Cyber OODA Loop: How Your Attacker Should Help You Design Your Defense Tony Sager The Center for Internet Security Classic Risk Equation Risk = { Vulnerability, Threat, Consequence } countermeasures

More information

North American Electric Reliability Corporation (NERC) Cyber Security Standard

North American Electric Reliability Corporation (NERC) Cyber Security Standard North American Electric Reliability Corporation (NERC) Cyber Security Standard Symantec Managed Security Services Support for CIP Compliance Overviewview The North American Electric Reliability Corporation

More information

1st CONFERENCE IN ETHNOMUSICOLOGY AND ANTHROPOLOGY OF MUSIC Methods, approaches and perspectives for the study of music within culture

1st CONFERENCE IN ETHNOMUSICOLOGY AND ANTHROPOLOGY OF MUSIC Methods, approaches and perspectives for the study of music within culture 1st CONFERENCE IN ETHNOMUSICOLOGY AND ANTHROPOLOGY OF MUSIC Methods, approaches and perspectives for the study of music within culture Universitat Autònoma de Barcelona (UAB) 2nd-3rd, July 2015 Barcelona,

More information

Security in the smart grid

Security in the smart grid Security in the smart grid Security in the smart grid It s hard to avoid news reports about the smart grid, and one of the media s favorite topics is security, cyber security in particular. It s understandable

More information

Hydra s streets are narrow, stone paved and vehicle free not even any bicycles. Donkeys and water taxis are the principal modes of transport.

Hydra s streets are narrow, stone paved and vehicle free not even any bicycles. Donkeys and water taxis are the principal modes of transport. Hydra XII: European Summer School 2016 Hydra Hydra is a small, cosmopolitan Greek island situated between Poros and Spetses. It s 37 nautical miles from the port of Piraeus (Athens) and is near the coast

More information

4. Meetings Financial Support

4. Meetings Financial Support 4. Meetings Financial Support The MC must determine from amongst eligible participants those who are entitled to be reimbursed. The Action Chair (or Vice Chair if the Action Chair is affiliated to the

More information

DCO Modeling and Visualization Workshop: Toward a 4D Planetary Carbon Model 11-13 May 2015 Washington, DC, USA. Logistical Information

DCO Modeling and Visualization Workshop: Toward a 4D Planetary Carbon Model 11-13 May 2015 Washington, DC, USA. Logistical Information DCO Modeling and Visualization Workshop: Toward a 4D Planetary Carbon Model 11-13 May 2015 Washington, DC, USA Logistical Information BRIEF SCHEDULE 10 May: Icebreaker reception at the Mayflower Renaissance

More information

Cybercrime & Cybersecurity: the Ongoing Battle International Hellenic University

Cybercrime & Cybersecurity: the Ongoing Battle International Hellenic University Cybercrime & Cybersecurity: the Ongoing Battle International Hellenic University Andreas Athanasoulias, CISM, CISSP Information Security Officer & Security Consultant Brief introduction My career path

More information

ISSA SOUTH TEXAS CHAPTER NEWSLETTER

ISSA SOUTH TEXAS CHAPTER NEWSLETTER Page 1 of 5 ISSA SOUTH TEXAS CHAPTER NEWSLETTER For May 2013 Voted "Outstanding Chapter of 2007" by ISSA International As always, please feel free to contact me with any suggestions or requests to improve

More information

Cybersecurity The role of Internal Audit

Cybersecurity The role of Internal Audit Cybersecurity The role of Internal Audit Cyber risk High on the agenda Audit committees and board members are seeing cybersecurity as a top risk, underscored by recent headlines and increased government

More information

Cyber Watch. Written by Peter Buxbaum

Cyber Watch. Written by Peter Buxbaum Cyber Watch Written by Peter Buxbaum Security is a challenge for every agency, said Stanley Tyliszczak, vice president for technology integration at General Dynamics Information Technology. There needs

More information

What if you could spend three exciting days surrounded by peers, focused on exploring the topics most important to you and your organization?

What if you could spend three exciting days surrounded by peers, focused on exploring the topics most important to you and your organization? What if you could spend three exciting days surrounded by peers, focused on exploring the topics most important to you and your organization? What if you could not only maintain, but update and upgrade

More information

Table of Contents. Introduction. Audience. At Course Completion

Table of Contents. Introduction. Audience. At Course Completion Table of Contents Introduction Audience At Course Completion Prerequisites Certified Professional Exams Student Materials Course Outline Introduction This four-day, instructor-led course provides students

More information

European Regional Environmental Information Network Conference. Istanbul, Turkey 13-17 April 2015

European Regional Environmental Information Network Conference. Istanbul, Turkey 13-17 April 2015 UNITED NATIONS ENVIRONMENT PROGRAMME UNITED NATIONS ECONOMIC COMMISSION FOR EUROPE European Regional Environmental Information Network Conference Istanbul, Turkey 13-17 April 2015 INFORMATION NOTE Meeting

More information

IVF AROUND THE WORLD DR GEORGIOU CLINIC

IVF AROUND THE WORLD DR GEORGIOU CLINIC TRAVEL INFORMATION Travelling from Athens airport to IVF Around the World or to your hotel: You have several options: 1. Taxi 35-55 (night time rates are higher) 2. IVF Around the World driver 60 3. Airport

More information

Network Segmentation

Network Segmentation Network Segmentation The clues to switch a PCI DSS compliance s nightmare into an easy path Although best security practices should be implemented in all systems of an organization, whether critical or

More information

Program Overview. CDP is a registered certification designed and administered by Identity Management Institute (IMI).

Program Overview. CDP is a registered certification designed and administered by Identity Management Institute (IMI). Overview Certified in Data Protection (CDP) is a comprehensive global training and certification program which leverages international security standards and privacy laws to teach candidates on how to

More information

2014 Entry Form (Complete one for each entry.) Fill out the entry name exactly as you want it listed in the program.

2014 Entry Form (Complete one for each entry.) Fill out the entry name exactly as you want it listed in the program. 2014 Entry Form (Complete one for each entry.) Fill out the entry name exactly as you want it listed in the program. Entry Name HFA Submission Contact Phone Email Qualified Entries must be received by

More information

Oil & Gas Cybersecurity

Oil & Gas Cybersecurity COurse Oil & Gas Cybersecurity Best Practices & Future Trends Sheraton Pentagon City Hotel Supporting Organization is authorized by IACET to offer 0.6 CEUs for the course. 1 Overview The energy industry

More information

HOW TO ADDRESS THE CURRENT IT SECURITY SKILLS SHORTAGE

HOW TO ADDRESS THE CURRENT IT SECURITY SKILLS SHORTAGE HOW TO ADDRESS THE CURRENT IT SECURITY SKILLS SHORTAGE ISACA S CYBER SECURITY NEXUS Ivan Sanchez-Lopez Senior Manager Information Security, IT Risk & Continuity, DHL Global Forwarding ISACA Luxembourg

More information

FFIEC Cybersecurity Assessment Tool

FFIEC Cybersecurity Assessment Tool Overview In light of the increasing volume and sophistication of cyber threats, the Federal Financial Institutions Examination Council 1 (FFIEC) developed the Cybersecurity Tool (), on behalf of its members,

More information

Access FedVTE online at: fedvte.usalearning.gov

Access FedVTE online at: fedvte.usalearning.gov FALL 2015 Access FedVTE online at: fedvte.usalearning.gov If you need any assistance please contact the FedVTE Help Desk her e or email the Help Desk at support@usalearning.net. To speak with a Help Desk

More information

Course Design Document. Information Security Management. Version 2.0

Course Design Document. Information Security Management. Version 2.0 Course Design Document Information Security Management Version 2.0 January 2015 Table of Content 1 Versions History... 3 2 Overview of Security and Trust Course... 4 Synopsis... 4 2.1 Prerequisites...

More information

Track 2: Introductory Track PREREQUISITE: BASIC COMPUTER EXPERIENCE

Track 2: Introductory Track PREREQUISITE: BASIC COMPUTER EXPERIENCE Anne Arundel Community College Tracks Anne Arundel Community College s computer technologies courses have been organized into 10 suggested tracks. The tracks are arranged to ensure that students have the

More information

CESG CIR SCHEME AND CREST CSIR SCHEME FREQUENTLY ASKED QUESTIONS

CESG CIR SCHEME AND CREST CSIR SCHEME FREQUENTLY ASKED QUESTIONS CESG CIR SCHEME AND CREST CSIR SCHEME FREQUENTLY ASKED QUESTIONS QUESTION General What is the Cyber Security Incident Response (CSIR) Scheme? What is the Cyber Incident Response (CIR) scheme? Why have

More information

X 420.5 Network, Operating System, and Database Security. Fall 2014, Registration Number 249343W. UCLA EXTENSION: Computer Science.

X 420.5 Network, Operating System, and Database Security. Fall 2014, Registration Number 249343W. UCLA EXTENSION: Computer Science. X 420.5 Network, Operating System, and Database Security Fall 2014, Registration Number 249343W UCLA EXTENSION: Computer Science Course Syllabus 12 Sessions: Mondays, 6-9 pm, September 29 - December 15,

More information

CYBER SECURITY TRAINING SAFE AND SECURE

CYBER SECURITY TRAINING SAFE AND SECURE CYBER SECURITY TRAINING KEEPING YOU SAFE AND SECURE Experts in Cyber Security training. Hardly a day goes by without a cyber attack being reported. With this ever-increasing threat there is a growing need

More information

The Protection Mission a constant endeavor

The Protection Mission a constant endeavor a constant endeavor The IT Protection Mission a constant endeavor As businesses become more and more dependent on IT, IT must face a higher bar for preparedness Cyber preparedness is the process of ensuring

More information

IRAP Policy and Procedures up to date as of 16 September 2014.

IRAP Policy and Procedures up to date as of 16 September 2014. Australian Signals Directorate Cyber and Information Security Division Information Security Registered Assessors Program Policy and Procedures 09/2014 IRAP Policy and Procedures 09/2014 1 IRAP Policy and

More information

Cyber Defense Operations Graduate Certificate

Cyber Defense Operations Graduate Certificate The SANS Technology Institute makes shorter groups of courses available to students who are unable to commit to a full master s degree program. These certificate programs will augment your skills, provide

More information

EC-Council Certified Security Analyst (ECSA)

EC-Council Certified Security Analyst (ECSA) EC-Council Certified Security Analyst (ECSA) v8 Eğitim Tipi ve Süresi: 5 Days VILT 5 Day VILT EC-Council Certified Security Analyst (ECSA) v8 Learn penetration testing methodologies while preparing for

More information

167 th Air Wing Fast Track Cyber Program Blue Ridge Community and Technical College

167 th Air Wing Fast Track Cyber Program Blue Ridge Community and Technical College 167 th Air Wing Fast Track Cyber Program Blue Ridge Community and Technical College Information Security Certificate: Designed to introduce students to programming, security basics, network monitoring,

More information

Protecting against cyber threats and security breaches

Protecting against cyber threats and security breaches Protecting against cyber threats and security breaches IBM APT Survival Kit Alberto Benavente Martínez abenaventem@es.ibm.com IBM Security Services Jun 11, 2015 (Madrid, Spain) 12015 IBM Corporation So

More information

Department of Management Services. Request for Information

Department of Management Services. Request for Information Department of Management Services Request for Information Cyber-Security Assessment, Remediation, and Identity Protection, Monitoring, and Restoration Services September 3, 2015 Submitted By: Carlos Henley

More information

Introduction to Cyber Security / Information Security

Introduction to Cyber Security / Information Security Introduction to Cyber Security / Information Security Syllabus for Introduction to Cyber Security / Information Security program * for students of University of Pune is given below. The program will be

More information

Check Point and Security Best Practices. December 2013 Presented by David Rawle

Check Point and Security Best Practices. December 2013 Presented by David Rawle Check Point and Security Best Practices December 2013 Presented by David Rawle Housekeeping o Mobiles on Silent o No File Alarms planned o Fire exits are in front and behind and down the stairs o Downstairs

More information

Course Descriptions November 2014

Course Descriptions November 2014 Master of Science In Information Security Management Course Descriptions November 2014 Master of Science in Information Security Management The Master of Science in Information Security Management (MSISM)

More information

CESG Certification of Cyber Security Training Courses

CESG Certification of Cyber Security Training Courses CESG Certification of Cyber Security Training Courses Supporting Assessment Criteria for the CESG Certified Training (CCT) Scheme Portions of this work are copyright The Institute of Information Security

More information

Cisco Advanced Malware Protection for Endpoints

Cisco Advanced Malware Protection for Endpoints Data Sheet Cisco Advanced Malware Protection for Endpoints Product Overview With today s sophisticated malware, you have to protect endpoints before, during, and after attacks. Cisco Advanced Malware Protection

More information

Threat Intelligence Pty Ltd info@threatintelligence.com 1300 809 437. Specialist Security Training Catalogue

Threat Intelligence Pty Ltd info@threatintelligence.com 1300 809 437. Specialist Security Training Catalogue Threat Intelligence Pty Ltd info@threatintelligence.com 1300 809 437 Specialist Security Training Catalogue Did you know that the faster you detect a security breach, the lesser the impact to the organisation?

More information

MEMORANDUM. Date: October 28, 2013. Federally Regulated Financial Institutions. Subject: Cyber Security Self-Assessment Guidance

MEMORANDUM. Date: October 28, 2013. Federally Regulated Financial Institutions. Subject: Cyber Security Self-Assessment Guidance MEMORANDUM Date: October 28, 2013 To: Federally Regulated Financial Institutions Subject: Guidance The increasing frequency and sophistication of recent cyber-attacks has resulted in an elevated risk profile

More information

Cyber Security. BDS PhantomWorks. Boeing Energy. Copyright 2011 Boeing. All rights reserved.

Cyber Security. BDS PhantomWorks. Boeing Energy. Copyright 2011 Boeing. All rights reserved. Cyber Security Automation of energy systems provides attack surfaces that previously did not exist Cyber attacks have matured from teenage hackers to organized crime to nation states Centralized control

More information

e2e Secure Cloud Connect Service - Service Definition Document

e2e Secure Cloud Connect Service - Service Definition Document e2e Secure Cloud Connect Service - Service Definition Document Overview A cloud connectivity service that connects users, devices, offices and clouds together over the Internet. Organisations can choose

More information

Bellevue University Cybersecurity Programs & Courses

Bellevue University Cybersecurity Programs & Courses Undergraduate Course List Core Courses: CYBR 250 Introduction to Cyber Threats, Technologies and Security CIS 311 Network Security CIS 312 Securing Access Control CIS 411 Assessments and Audits CYBR 320

More information

Network Security Administrator

Network Security Administrator Network Security Administrator Course ID ECC600 Course Description This course looks at the network security in defensive view. The ENSA program is designed to provide fundamental skills needed to analyze

More information

Cloud Security Primer MALICIOUS NETWORK COMMUNICATIONS: WHAT ARE YOU OVERLOOKING?

Cloud Security Primer MALICIOUS NETWORK COMMUNICATIONS: WHAT ARE YOU OVERLOOKING? A Cloud Security Primer : WHAT ARE YOU OVERLOOKING? LEGAL DISCLAIMER The information provided herein is for general information and educational purposes only. It is not intended and should not be construed

More information

167 th Air Wing Fast Track Cyber Security Blue Ridge Community and Technical College

167 th Air Wing Fast Track Cyber Security Blue Ridge Community and Technical College 167 th Air Wing Fast Track Cyber Security Blue Ridge Community and Technical College Information Security Certificate: Designed to introduce students to programming, security basics, network monitoring,

More information

Assessing the Legacy of the ICTY

Assessing the Legacy of the ICTY 23-24 February 2010 World Forum conference centre, The Hague A Conference of the International Criminal Tribunal for the former Yugoslavia Co-organised and co-sponsored by the Government of the Netherlands

More information

CIP- 005 R2: Understanding the Security Requirements for Secure Remote Access to the Bulk Energy System

CIP- 005 R2: Understanding the Security Requirements for Secure Remote Access to the Bulk Energy System CIP- 005 R2: Understanding the Security Requirements for Secure Remote Access to the Bulk Energy System Purpose CIP-005-5 R2 is focused on ensuring that the security of the Bulk Energy System is not compromised

More information

Cyber Security Trends 2016. Market trends from leading security analysts and consultants at TÜV Rheinland, OpenSky, and OpenSky UK

Cyber Security Trends 2016. Market trends from leading security analysts and consultants at TÜV Rheinland, OpenSky, and OpenSky UK Cyber Security Trends 2016 Market trends from leading security analysts and consultants at TÜV Rheinland, OpenSky, and OpenSky UK December, 2015 Cyber security Trends 2016 What do new technologies and

More information

Local Information. Below you will find travel tips and estimated costs for travel both to and from the airport and around town.

Local Information. Below you will find travel tips and estimated costs for travel both to and from the airport and around town. Local Information Travel/Transportation Below you will find travel tips and estimated costs for travel both to and from the airport and around town. Transportation To/From Airports Below, a list of transportation

More information

Penetration Testing //Vulnerability Assessment //Remedy

Penetration Testing //Vulnerability Assessment //Remedy A Division Penetration Testing //Vulnerability Assessment //Remedy In Penetration Testing, part of a security assessment practice attempts to simulate the techniques adopted by an attacker in compromising

More information

Professional Services Overview

Professional Services Overview Professional Services Overview INFORMATION SECURITY ASSESSMENT AND ADVISORY NETWORK APPLICATION MOBILE CLOUD IOT Praetorian Company Overview HISTORY Founded in 2010 Headquartered in Austin, TX Self-funded

More information

ACCOMMODATION FORM. Distance to the Symposium Venue

ACCOMMODATION FORM. Distance to the Symposium Venue Please complete the form in capital letters and keep a copy for your records. A separate registration form must be completed for each participant. Participant Information Registration ID (the ID you have

More information

Intel Security Certified Product Specialist Security Information Event Management (SIEM)

Intel Security Certified Product Specialist Security Information Event Management (SIEM) Intel Security Certified Product Specialist Security Information Event Management (SIEM) Why Get Intel Security Certified? As technology and security threats continue to evolve, organizations are looking

More information

i Network, Inc Technology Solutions, Products & Services Providing the right information, to the right customer, at the right time.

i Network, Inc Technology Solutions, Products & Services Providing the right information, to the right customer, at the right time. Technology Solutions, Products & Services Providing the right information, to the right customer, at the right time. 2 Barry Brueseke (619) 401 7334 www.inetwork west.com 4/3/2014 IEEE Cyber Security Workshop

More information

GE Oil & Gas. Cyber Security for NERC CIP Versions 5 & 6 Compliance

GE Oil & Gas. Cyber Security for NERC CIP Versions 5 & 6 Compliance GE Oil & Gas Cyber Security for NERC CIP Versions 5 & 6 Compliance Cyber Security for NERC CIP Versions 5 & 6 Compliance 2 Contents Cyber Security for NERC CIP Compliance... 5 Sabotage Reporting... 6 Security

More information

Intel Security Certified Product Specialist Data Loss Prevention Endpoint (DLPe)

Intel Security Certified Product Specialist Data Loss Prevention Endpoint (DLPe) Intel Security Certified Product Specialist Data Loss Prevention Endpoint (DLPe) Why Get Intel Security Certified? As technology and security threats continue to evolve, organizations are looking for employees

More information

Enterprise Security Tactical Plan

Enterprise Security Tactical Plan Enterprise Security Tactical Plan Fiscal Years 2011 2012 (July 1, 2010 to June 30, 2012) Prepared By: State Chief Information Security Officer The Information Security Council State of Minnesota Enterprise

More information

Infor CloudSuite. Defense-in-depth. Table of Contents. Technical Paper Plain talk about Infor CloudSuite security

Infor CloudSuite. Defense-in-depth. Table of Contents. Technical Paper Plain talk about Infor CloudSuite security Technical Paper Plain talk about security When it comes to Cloud deployment, security is top of mind for all concerned. The Infor CloudSuite team uses best-practice protocols and a thorough, continuous

More information

Reliable, Repeatable, Measurable, Affordable

Reliable, Repeatable, Measurable, Affordable Reliable, Repeatable, Measurable, Affordable Defense-in-Depth Across Your Cyber Security Life-Cycle Faced with today s intensifying threat environment, where do you turn for cyber security answers you

More information

Hackers are here. Where are you?

Hackers are here. Where are you? 1 2 What is EC-Council Certified Security Analyst Licensed Penetration Tester Program You are an ethical hacker. Your last name is Pwned. You dream about enumeration and you can scan networks in your sleep.

More information

10233B: Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010

10233B: Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010 Course: 10233B: Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010 Description: About this Course This five-day, instructor-led course provides you with the knowledge and skills

More information

EMERGING THREATS & STRATEGIES FOR DEFENSE. Stephen Coty Chief Security Evangelist @StephenCoty

EMERGING THREATS & STRATEGIES FOR DEFENSE. Stephen Coty Chief Security Evangelist @StephenCoty EMERGING THREATS & STRATEGIES FOR DEFENSE Stephen Coty Chief Security Evangelist @StephenCoty Industry Analysis 2014 Data Breaches - Ponemon Ponemon 2014 Data Breach Report *Statistics from 2013 Verizon

More information

Advanced Threat Protection with Dell SecureWorks Security Services

Advanced Threat Protection with Dell SecureWorks Security Services Advanced Threat Protection with Dell SecureWorks Security Services Table of Contents Summary... 2 What are Advanced Threats?... 3 How do advanced threat actors operate?... 3 Addressing the Threat... 5

More information

Protecting critical infrastructure from Cyber-attack

Protecting critical infrastructure from Cyber-attack Protecting critical infrastructure from Cyber-attack ACI-NA BIT Workshop, Session 6 (Cybersecurity) Long Beach, California October 4, 2015 Ben Trethowan Aviation Systems & Security Architect The scale

More information

EEI Business Continuity. Threat Scenario Project (TSP) April 4, 2012. EEI Threat Scenario Project

EEI Business Continuity. Threat Scenario Project (TSP) April 4, 2012. EEI Threat Scenario Project EEI Business Continuity Conference Threat Scenario (TSP) April 4, 2012 EEI Threat Scenario 1 Background EEI, working with a group of CIOs and Subject Matter Experts, conducted a survey with member companies

More information

Phone: +44 20 8123 2220 Fax: +44 207 900 3970 office@marketpublishers.com https://marketpublishers.com

Phone: +44 20 8123 2220 Fax: +44 207 900 3970 office@marketpublishers.com https://marketpublishers.com Cyber Security Market by Solution (IAM, Encryption, DLP, Risk and Compliance Management, IDS/IPS, UTM, Firewall, Antivirus/Antimalware, SIEM, Disaster Recovery, DDOS Mitigation, Web Filtering, and Security

More information

Stephen Coty Director, Threat Research

Stephen Coty Director, Threat Research Emerging threats facing Cloud Computing Stephen Coty Director, Threat Research Cloud Environments 101 Cloud Adoption is Gaining Momentum Cloud market revenue will increase at a 36% annual rate Analyst

More information

Network Security in Building Networks

Network Security in Building Networks Network Security in Building Networks Prof. Dr. (TU NN) Norbert Pohlmann Institute for Internet Security - if(is) Westphalian University of Applied Sciences Gelsenkirchen, Germany www.if-is.net Content

More information