CSX Fundamentals Workshop
|
|
- Elmer Robbins
- 7 years ago
- Views:
Transcription
1 CSX Fundamentals Workshop October 2016 Early registration 19 September 2016 Final registration 26 September 2016 Offered by In association with ISACA Athens Chapter has been awarded four times as Best Large Chapter in Europe/Africa (2009, 2012, 2013, 2014)
2 Contents 1. Introduction 1. Introduction 1 2. Scope 1 3. Who should attend? 1 4. Why attend 2 5. Where? When? Who will be the Trainer? 2 6. What will you learn? 2 7. Course Summary 3 8. Registration Process 4 9. Frequently Asked Questions Travelling Information 6 Cybersecurity is a growing and rapidly changing field, and it is crucial that the central concepts that frame and define this increasingly pervasive field are understood by professionals who are involved and concerned with the security implications of Information Technologies (IT). Cybersecurity Nexus (CSX) is a new platform for security knowledge and a professional development and certification program in cybersecurity. Launched by ISACA, CSX provides IT security and cybersecurity professionals with the knowledge and technical skills to defend their organization from security breaches and cyber-attacks. A key part of Cybersecurity Nexus is its training workshops and innovative certification tracks. ISACA International notes that while other cyber security certifications assess knowledge in a question-and-answer format, CSX training and exams are conducted in a live, virtual cyber lab environment and test on whether an individual has the skills and technical savvy to do the job. The Certification Tracks CSX certifications are designed to test a candidate s ability to perform tasks of various degrees of complexity within 5 cybersecurity areas: identify protect detect respond recover. This new cybersecurity path begins with the CSX Fundamentals Certificate, which offers a knowledge-based credential on the introductory concepts that frame and define the standards, guidelines and practices of the industry. It also provides insight into the importance of cybersecurity and the integral role of cybersecurity professionals. The next 4 levels of CSX Certifications are based on the knowledge and concepts covered in the CSX Fundamentals Certificate but test competencies in scenarios that become more complex and sophisticated the higher the level. The CSX Fundamentals workshop is offered for the second time in Greece, after the quick sold out of the first course which was held, last November. The course is offered exclusively in Greece by ISACA Athens Chapter with the support of the Hellenic American Union. 2. Scope of the course This workshop is geared toward IT security professionals new to cyber security, recent graduates in IT-relevant fields, and IT professionals looking for a career change to cybersecurity. It prepares you for the CSX Fundamentals Exam covering the foundational areas of cyber security: Cybersecurity objectives and roles The difference between cybersecurity and information security The Principles of Cybersecurity Information Security within Lifecycle management Risks and Vulnerabilities Incident Response 2 ISACA Athens Chapter CSX Fundamentals Workshops
3 3. Who should attend? IT security professionals new to cybersecurity, IT oriented graduates and those IT professionals looking for a career change to cybersecurity. 4. Why attend? By the end of the course you will: Understand basic cybersecurity concepts and definitions Define network security architecture concepts Recognize malware analysis concepts and methodology Identify computer network defense (CND) and vulnerability assessment tools, including open source tools and their capabilities Explain network systems management principles, models, methods, and tools Distinguish system and application security threats and vulnerabilities Classify types of incidents (categories, responses, and timelines for responses) Outline disaster recovery and business continuity planning Comprehend incident response and handling methodologies Understand security event correlation tools, and how different file types can be used for a typical behavior Be aware of the basic concepts, practices, tools, tactics, techniques, and procedures for processing digital forensic data Recognize new and emerging information technology and information security technologies 5. Where? When? Who will be the Trainer? The course will be held at the Hellenic American Union Conference Center, Massalias 22, Athens, on 3-4 October 2016 (Monday, Tuesday), from 9.00 to Course leader: Dr. Konstantinos Papapanagiotou, CISSP, ITIL, Information Security Sales Manager, OTE, OWASP Chapter Leader. Dr. Konstantinos Papapanagiotou is the Information Security Services Sales Manager at OTE. In the past he has led teams of consultants, helping large organizations in Greece, Cyprus, Balkans and the Middle East improve their security posture. He has more than 12 years of experience in the field of information security both as a corporate consultant and as a researcher. Konstantinos holds a BSc and PhD in Information Security from the University of Athens and an MSc in Information Security with distinction from Royal Holloway. He is also leading the OWASP Greek Chapter and is an ISACA CyberSecurity Nexus Liaison for Greece. ISACA Athens Chapter CSX Fundamentals Workshops 3
4 6. What will you learn? Cybersecurity introduction and overview Cybersecurity architecture principles Cybersecurity definition Objectives of cybersecurity Key business and technology factors Cybersecurity roles and governance Domains of cybersecurity Cybersecurity concepts Risk management terms, concepts and frameworks Common attack types and vectors General process and attributes of cyber attacks Malware Framework and guidance for policies and procedures Cybersecurity control processes Security architecture Perimeter security concepts Security architectures and frameworks The OSI model and TCP/IP communication protocol Defense in depth Firewall concepts and implementations Isolation and segmentation Intrusion detection and prevention systems Antivirus and anti-malware Encryption fundamentals, techniques and applications Security of networks, systems, applications and data Risk analysis, risk assessments and risk mitigation strategies Scanning, assessment and management of vulnerabilities Penetration testing Network management and configuration Port numbers and protocols Risk and controls for remote and wireless access System hardening and virtualization Specialized systems Command line knowledge and tools System development life cycle (SDLC) OWASP top ten application security risk Data classification process and requirements Incident response Distinctions between events and incidents Incident categories and types Security event management Key elements of incident response plans Legal requirements of investigation and evidence preservation Requirements for forensic investigations Business continuity planning and disaster recovery The security implications of the adoption of emerging technologies Trends in the current threat landscape Characteristics and targets of advanced persistent threats (APTs) Mobile device vulnerabilities, threats and risk BYOD and consumerization of IT and mobile devices Risk and benefits of cloud and digital collaboration 4 ISACA Athens Chapter CSX Fundamentals Workshops
5 7. Course Summary Prerequisites Fundamental concepts of IT Security, IT academic background CPEs 16 Languages Greek Planning 3-4 October 2016 (Monday, Tuesday), Cost EARLY BIRD (registration until 19/9/2016) for ISACA members only 270 per participant STANDARD RATE (registration after 19/9/2016) 350 per participant for ISACA member 450 per participant for non-isaca member (same fee applies for non-members registrations before 19/9/2016) Unemployed ISACA members: 200 per participant Special price sponsored by ISACA Athens Chapter Cost includes course material Cost does not include exam fees This program is subsidized by LAEK/OAED 0,24% (for participants from Greek companies only) Registration fees to be paid until 26 September ISACA Athens Chapter CSX Fundamentals Workshops 5
6 8. Registration Process Step 1 Step 2 Step 3 Fill in the registration form at the end of this document and send it to Hellenic American Union by following the respective guidelines below the registration form. Hellenic American Union will send a registration confirmation receipt via . Send payment amount to Hellenic American Union by following the payment details on the registration form at the end of this document. For bank transfer information please contact the Hellenic American Union. We will send you bank transfer information once we receive your registration form. Please always quote the invoice number which you will receive once you have registered, or alternatively please quote your company s name or the delegates name in the transfer instructions. Step 4 The amount to be credited should be net of commissions. Any commissions/fees for bank deposits or transfers are payable by participants. You will receive a course registration invoice from Hellenic American Union after we receive your payment. Payments: All registrations & payments must be received by the Hellenic American Union the latest by Monday 26 September Invoices are issued by the Hellenic American Union. Cancellations/Substitutions must be made via and sent to training@hau.gr. A full refund can be given for cancellation requests received in writing 10 working days before the course commencement. No refund will be given for cancellation requests after this deadline. A replacement is always welcome at no extra cost! 6 ISACA Athens Chapter CSX Fundamentals Workshops
7 9. Frequently Asked Questions When is the CSX Fundamentals exam? Is there one combined registration process for the CSX exam and the ISACA Athens Chapter s CSX Fundamentals Course? Is attending this ISACA CSX Fundamentals sufficient enough for me to pass this exam successfully The Cybersecurity Fundamentals Certificate exam is available online, at your convenience. Simply schedule the date and time that works best for you and your exam will be remotely proctored. No, there are two separate registration processes because the exam is administered by ISACA International. One registration combining both CSX exam fees and CSX Fundamentals course fees is not possible. Yes What is the date of the next CSX Fundamentals course? Are there any special fees for unemployed members of ISACA Athens Chapter for this course? ISACA Athens Chapter will only run 2 CSX Fundamental Courses each year. Next course dates will be announced after the successful completion of this course. Yes, please refer to the registration form. ISACA Athens Chapter CSX Fundamentals Workshops 7
8 10. Travel Information Accommodation - Recommended hotel For those travelling to Athens or from abroad and need accommodation, we recommend Titania hotel ( In order to take advantage of special rates, please contact Ms Vasiliki Zafiri ( , vzafiri@hau.gr) at the Hellenic American Union. Transportation arrangements We highly recommend using our excellent Athens public transportation (metro). You need to validate your paper ticket at the beginning of your journey. Intergrated tickets (as well as Metro airport tickets) are valid for 90 minutes so you don t need to validate it again if you use another mode of transportation anywhere in Athens within 90 minutes of the first validation. Ticket price is 8 (one way) or 14 (for 2 journeys return ticket). One way ticket for 2 persons is 14 and for 3 persons is 20. Getting to/from the Athens International Airport and the city center, located about 36 km east can be achieved via metro: Take the Blue line (line 3 direction Anthoupoli ) of the metro from Athens International Airport and get off at Syntagma station. Trains run every 30 minutes, 7 days a week from 6:30 a.m. to 11:30 p.m. The trip from/to the Airport to Syntagma metro station (Athens center) lasts 40 minutes. See the Metro timetable to the airport here and also an Athens airport railway station map. For ticket info see Athens Transport tickets and cards. 8 ISACA Athens Chapter CSX Fundamentals Workshops
9 From Syntagma metro station you can: a. either change and take the Red line (line 2 direction Anthoupoli) in order to get off at next stop, Panepistimio metro station (exit National Library) and walk approximately 4-5 minutes towards Omonia square to Titania Hotel (it is just on your right hand side). b. Walk from Syntagma Square to Titania Hotel through Panepistimiou street (it is approximately minutes walk) Red route: from metro Syntagma Station (circled A) and Panepistimio Station (circle) to Hotel (B) and venue (C) Blue route: alternative route from Hotel (B) to venue (C) On last evening at the end of the Exam Preparation Course (at 17:00), you can take the metro from Syntagma directly to the airport. Alternatives: a. By Bus (map: From the Airport take Bus Line X95 Syntagma Athens Airport Express (Orange Line). From Syntagma Square you can either take the Metro (see above) or walk to Titania Hotel. You can also take a bus (most of them are passing by in front of the hotel, while some stop right in front of the hotel). b. By Taxi (Flat fare: 35 Euros) c. By Car (36 km, minutes depending however on traffic) Via Attiki Odos, route 6/Ε94, 31,6 km, 35 min Via Mesogeion Avenue, 20,8 km, 34 min Via Route 64, 26 km, 34 min ISACA Athens Chapter CSX Fundamentals Workshops 9
10 Registration Form I wish to register for the CSX Fundamentals Workshop, 3-4 October 2016 Please send this registration form to Hellenic American Union fax nr. (30) , or at training@hau.gr. Registration Fees Isaca Members Non Members Early bird fee until 19 September q 450 q Normal fee after 19 September q 450 q 200 q Unemployed ISACA members Special price sponsored by ISACA Athens Chapter q I wish to register the workshop for the 0,24 OAED-LAEK subsidy program In order to guarantee a place on the course and the exams, delegates are kindly requested to register until the 26th September PERSONAL DETAILS (Please print clearly) Family Name Company Home address* (individual/personal registrations only) City* First Name Tel* Fax Ε-mail Tax ID Nr./Tax Registration Office* INVOICE DETAILS COMPANY NAME Position/Title Postal Code* (*mandatory fields for individual registrations only) (for individual registrations only) (all fields are mandatory for company registrations) Area of Business Address City Postal Code Tel Tax ID Nr. Fax Tax Registration Office I/We understand and accept the registration and cancellation policies and procedures, and the protection of personal and credit card data policy. Signature/Company stamp PAYMENT DETAILS Payments are made to the Hellenic American Union immediately upon registration. Once the Hellenic American Union receives the registration form, we will send you confirmation and payment transfer information. PAYMENT METHOD q Please invoice my company Bank Transfer** q VISA q MASTERCARD q CANCELLATION POLICY Date ** For bank transfer information please contact the Hellenic American Union. We will send you bank transfer information once we receive your registration form. Please always quote the invoice number which you will receive once you have registered, or alternatively please quote your company s name or the delegates name in the transfer instructions. An invoice will be sent upon receipt of payment. A full refund will be given for cancellations requests received in writing up to 10 working days prior the course starts. Cancellations received within less than 10 working days before the course will not be refunded. A replacement is always welcome. Disclaimer: ISACA Athens Chapter and Hellenic American Union reserve the right to change or cancel any part of the published program due to unforeseen circumstances. In case the event is cancelled, registration fees will be returned in full to the delegates. The Hellenic American Union collects and uses personal information in order to communicate with the members of its public, to provide educational and cultural programs and services, and to improve the quality of services that it offers. The information we have requested in this form will be maintained in digital and/or physical form and used only for the purposes described above. You have the right to reasonable access to the personal information we have on you, to request a copy of this information, and to correct it if inaccurate. To find out more, contact the Hellenic American Union at privacy@hau.gr. In association with * * A recognized Center for Lifelong Learning (ΚεΔιΒιΜ2) that has been granted a license of operation by the National Organization for the Certification of Qualifications and Vocational Guidance (EOPPEP)
11 Information ISACA Athens Chapter For membership please contact: For certifications please contact: LinkedIn Group: ISACA Athens Chapter Twitter: isaca_gr Facebook: ISACA Athens Chapter For further information about the preparation course, please contact: Ηellenic American Union Tel: , Fax: , or ISACA Athens Chapter
CCSK Prep Course 2015
CCSK Prep Course 2015 25 May 2015 Early registration 27 April 2015 Final registration 11 May 2015 Offered by ISACA Athens Chapter has been awarded four times as Best Large Chapter in Europe/Africa (2009,
More informationCYBERSECURITY: ISSUES AND ISACA S RESPONSE
CYBERSECURITY: ISSUES AND ISACA S RESPONSE June 2014 KEY TRENDS AND DRIVERS OF SECURITY Consumerization Emerging Trends Continual Regulatory and Compliance Pressures Mobile devices Social media Cloud services
More informationKEY TRENDS AND DRIVERS OF SECURITY
CYBERSECURITY: ISSUES AND ISACA S RESPONSE Speaker: Renato Burazer, CISA,CISM,CRISC,CGEIT,CISSP KEY TRENDS AND DRIVERS OF SECURITY Consumerization Emerging Trends Continual Regulatory and Compliance Pressures
More informationOver 20 years experience in Information Security Management, Risk Management, Third Party Oversight and IT Audit.
CYBERSECURITY: ISSUES AND ISACA S RESPONSE June 2014 BILL S BIO Over 20 years experience in Information Security Management, Risk Management, Third Party Oversight and IT Audit. Vice President Controls
More informationINSIGHTS AND RESOURCES FOR THE CYBERSECURITY PROFESSIONAL
INSIGHTS AND RESOURCES FOR THE CYBERSECURITY PROFESSIONAL BY 2 In enterprise IT, there is a single point where everything that matters in information, technology and business converges: Cybersecurity Nexus
More informationLogical Operations CyberSec First Responder: Threat Detection and Response (CFR) Exam CFR-110
Logical Operations CyberSec First Responder: Threat Detection and Response (CFR) Exam CFR-110 Exam Information Candidate Eligibility: The CyberSec First Responder: Threat Detection and Response (CFR) exam
More informationInformation Security Services
Information Security Services Information Security In 2013, Symantec reported a 62% increase in data breaches over 2012. These data breaches had tremendous impacts on many companies, resulting in intellectual
More informationA Channel Company White Paper. Online Security. Beyond Malware and Antivirus. Brought to You By:
A Channel Company White Paper Online Security Beyond Malware and Antivirus Brought to You By: Abstract Security has always encompassed physical and logical components. But in the face of Bring Your Own
More informationIT AUDIT WHO WE ARE. Current Trends and Top Risks of 2015 10/9/2015. Eric Vyverberg. Randy Armknecht. David Kupinski
IT AUDIT Current Trends and Top Risks of 2015 2 02 Eric Vyverberg WHO WE ARE David Kupinski Randy Armknecht Associate Director Internal Audit Protiviti 317.510.4661 eric.vyverberg@protiviti.com Managing
More informationFedVTE Training Catalog SPRING 2015. advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov
FedVTE Training Catalog SPRING 2015 advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov If you need any assistance please contact the FedVTE Help Desk here or email the
More informationNSA/DHS Centers of Academic Excellence for Information Assurance/Cyber Defense
NSA/DHS Centers of Academic Excellence for Information Assurance/Cyber Defense Cyber Investigations Data Management Systems Security Data Security Analysis Digital Forensics Health Care Security Industrial
More informationFedVTE Training Catalog SUMMER 2015. advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov
FedVTE Training Catalog SUMMER 2015 advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov Access FedVTE online at: fedvte.usalearning.gov If you need any assistance please
More informationExternal Supplier Control Requirements
External Supplier Control s Cyber Security For Suppliers Categorised as Low Cyber Risk 1. Asset Protection and System Configuration Barclays Data and the assets or systems storing or processing it must
More informationAppendix. Key Areas of Concern. i. Inadequate coverage of cybersecurity risk assessment exercises
Appendix Key Areas of Concern i. Inadequate coverage of cybersecurity risk assessment exercises The scope coverage of cybersecurity risk assessment exercises, such as cybersecurity control gap analysis
More informationTHE CYBERSECURITY SKILL GAP: WHAT EMPLOYERS WANT YOU TO KNOW
www.isaca.org/cyber THE CYBERSECURITY SKILL GAP: WHAT EMPLOYERS WANT YOU TO KNOW ROBERT E STROUD CGEIT CRISC INTERNATIONAL PRESIDENT ISACA & VP STRATEGY & INNOVATION CA TECHNOLOGIES February 2015 ISACA
More informationCyberNEXS Global Services
CyberNEXS Global Services CYBERSECURITY A cyber training, exercising, competition and certification product for maximizing the cyber skills of your workforce The Cyber Network EXercise System CyberNEXS
More informationTestimony of Eunice Santos. House Oversight and Government Affairs Committee Subcommittee on Information Technology
Testimony of Eunice Santos Before the House Oversight and Government Affairs Committee Subcommittee on Information Technology Federal Efforts to Improve Cybersecurity June 20 th, 2016 Chicago, Illinois
More informationCyber threats are growing.
Cyber threats are growing. So are your career opportunities. Put the future of your cybersecurity career in the hands of a respected online education leader. Everything you need to succeed. Excelsior College
More informationCYBERSECURITY NEXUS ROBERT E STROUD INTERNATIONAL PRESIDENT, ISACA RAMSÉS GALLEGO INTERNATIONAL VICE PRESIDENT, ISACA
CYBERSECURITY NEXUS ROBERT E STROUD INTERNATIONAL PRESIDENT, ISACA RAMSÉS GALLEGO INTERNATIONAL VICE PRESIDENT, ISACA Robert Stroud International President, ISACA VP Strategy & Innovation, CA Technologies
More informationDefense-in-Depth Strategies for Secure, Open Remote Access to Control System Networks
Defense-in-Depth Strategies for Secure, Open Remote Access to Control System Networks A look at multi-vendor access strategies Joel Langill TÜV FSEng ID-1772/09, CEH, CPT, CCNA Security Consultant / Staff
More informationBUILDING A SECURITY OPERATION CENTER (SOC) ACI-BIT Vancouver, BC. Los Angeles World Airports
BUILDING A SECURITY OPERATION CENTER (SOC) ACI-BIT Vancouver, BC. Los Angeles World Airports Building a Security Operation Center Agenda: Auditing Your Network Environment Selecting Effective Security
More informationHackers are here. Where are you?
1 2 What is EC-Council Certified Security Analyst Licensed Penetration Tester Program You are an ethical hacker. Your last name is Pwned. You dream about enumeration and you can scan networks in your sleep.
More informationSecurity+ P a g e 1 of 5. 5-Day Instructor Led Course
P a g e 1 of 5 Security+ 5-Day Instructor Led Course Overview This course is the primary course you will need to take if your job responsibilities include securing network services, devices, and traffic
More informationISACA Tools Help Develop Cybersecurity Expertise
Volume 21, 8 October 2014 ISACA Tools Help Develop Cybersecurity Expertise Nominate Qualified Candidates for the ISACA Board of Directors Tips for Solving Data Classification Challenges Earn CPE at Professional
More informationCisco Cyber Security. Professional Courses. About. Course Outline
Cisco Cyber Security Professional Courses About This course introduces the importance of cybersecurity and current trends, eight modules with presentations and panel discussions that feature industry experts.
More informationSPSP Phase III Recruiting, Selecting, and Developing Secure Power Systems Professionals: Job Profiles
PNNL-24138 SPSP Phase III Recruiting, Selecting, and Developing Secure Power Systems Professionals: Job Profiles March 2015 LR O Neil TJ Conway DH Tobey FL Greitzer AC Dalton PK Pusey Prepared for the
More informationPrinciples of Information Assurance Syllabus
Course Number: Pre-requisite: Career Cluster/Pathway: Career Major: Locations: Length: 8130 (OHLAP Approved) Fundamentals of Technology or equivalent industry certifications and/or work experience. Information
More information2015 Michigan NASCIO Award Nomination. Cyber Security Initiatives: Michigan Cyber Disruption Response Strategy
2015 Michigan NASCIO Award Nomination Cyber Security Initiatives: Michigan Cyber Disruption Response Strategy Sponsor: David Behen, DTMB Director and Chief Information Officer Program Manager: Rod Davenport,
More informationLogging In: Auditing Cybersecurity in an Unsecure World
About This Course Logging In: Auditing Cybersecurity in an Unsecure World Course Description $5.4 million that s the average cost of a data breach to a U.S.-based company. It s no surprise, then, that
More informationThe Cyber OODA Loop: How Your Attacker Should Help You Design Your Defense. Tony Sager The Center for Internet Security
The Cyber OODA Loop: How Your Attacker Should Help You Design Your Defense Tony Sager The Center for Internet Security Classic Risk Equation Risk = { Vulnerability, Threat, Consequence } countermeasures
More informationNorth American Electric Reliability Corporation (NERC) Cyber Security Standard
North American Electric Reliability Corporation (NERC) Cyber Security Standard Symantec Managed Security Services Support for CIP Compliance Overviewview The North American Electric Reliability Corporation
More information1st CONFERENCE IN ETHNOMUSICOLOGY AND ANTHROPOLOGY OF MUSIC Methods, approaches and perspectives for the study of music within culture
1st CONFERENCE IN ETHNOMUSICOLOGY AND ANTHROPOLOGY OF MUSIC Methods, approaches and perspectives for the study of music within culture Universitat Autònoma de Barcelona (UAB) 2nd-3rd, July 2015 Barcelona,
More informationSecurity in the smart grid
Security in the smart grid Security in the smart grid It s hard to avoid news reports about the smart grid, and one of the media s favorite topics is security, cyber security in particular. It s understandable
More informationHydra s streets are narrow, stone paved and vehicle free not even any bicycles. Donkeys and water taxis are the principal modes of transport.
Hydra XII: European Summer School 2016 Hydra Hydra is a small, cosmopolitan Greek island situated between Poros and Spetses. It s 37 nautical miles from the port of Piraeus (Athens) and is near the coast
More information4. Meetings Financial Support
4. Meetings Financial Support The MC must determine from amongst eligible participants those who are entitled to be reimbursed. The Action Chair (or Vice Chair if the Action Chair is affiliated to the
More informationDCO Modeling and Visualization Workshop: Toward a 4D Planetary Carbon Model 11-13 May 2015 Washington, DC, USA. Logistical Information
DCO Modeling and Visualization Workshop: Toward a 4D Planetary Carbon Model 11-13 May 2015 Washington, DC, USA Logistical Information BRIEF SCHEDULE 10 May: Icebreaker reception at the Mayflower Renaissance
More informationCybercrime & Cybersecurity: the Ongoing Battle International Hellenic University
Cybercrime & Cybersecurity: the Ongoing Battle International Hellenic University Andreas Athanasoulias, CISM, CISSP Information Security Officer & Security Consultant Brief introduction My career path
More informationISSA SOUTH TEXAS CHAPTER NEWSLETTER
Page 1 of 5 ISSA SOUTH TEXAS CHAPTER NEWSLETTER For May 2013 Voted "Outstanding Chapter of 2007" by ISSA International As always, please feel free to contact me with any suggestions or requests to improve
More informationCybersecurity The role of Internal Audit
Cybersecurity The role of Internal Audit Cyber risk High on the agenda Audit committees and board members are seeing cybersecurity as a top risk, underscored by recent headlines and increased government
More informationCyber Watch. Written by Peter Buxbaum
Cyber Watch Written by Peter Buxbaum Security is a challenge for every agency, said Stanley Tyliszczak, vice president for technology integration at General Dynamics Information Technology. There needs
More informationWhat if you could spend three exciting days surrounded by peers, focused on exploring the topics most important to you and your organization?
What if you could spend three exciting days surrounded by peers, focused on exploring the topics most important to you and your organization? What if you could not only maintain, but update and upgrade
More informationTable of Contents. Introduction. Audience. At Course Completion
Table of Contents Introduction Audience At Course Completion Prerequisites Certified Professional Exams Student Materials Course Outline Introduction This four-day, instructor-led course provides students
More informationEuropean Regional Environmental Information Network Conference. Istanbul, Turkey 13-17 April 2015
UNITED NATIONS ENVIRONMENT PROGRAMME UNITED NATIONS ECONOMIC COMMISSION FOR EUROPE European Regional Environmental Information Network Conference Istanbul, Turkey 13-17 April 2015 INFORMATION NOTE Meeting
More informationIVF AROUND THE WORLD DR GEORGIOU CLINIC
TRAVEL INFORMATION Travelling from Athens airport to IVF Around the World or to your hotel: You have several options: 1. Taxi 35-55 (night time rates are higher) 2. IVF Around the World driver 60 3. Airport
More informationNetwork Segmentation
Network Segmentation The clues to switch a PCI DSS compliance s nightmare into an easy path Although best security practices should be implemented in all systems of an organization, whether critical or
More informationProgram Overview. CDP is a registered certification designed and administered by Identity Management Institute (IMI).
Overview Certified in Data Protection (CDP) is a comprehensive global training and certification program which leverages international security standards and privacy laws to teach candidates on how to
More information2014 Entry Form (Complete one for each entry.) Fill out the entry name exactly as you want it listed in the program.
2014 Entry Form (Complete one for each entry.) Fill out the entry name exactly as you want it listed in the program. Entry Name HFA Submission Contact Phone Email Qualified Entries must be received by
More informationOil & Gas Cybersecurity
COurse Oil & Gas Cybersecurity Best Practices & Future Trends Sheraton Pentagon City Hotel Supporting Organization is authorized by IACET to offer 0.6 CEUs for the course. 1 Overview The energy industry
More informationHOW TO ADDRESS THE CURRENT IT SECURITY SKILLS SHORTAGE
HOW TO ADDRESS THE CURRENT IT SECURITY SKILLS SHORTAGE ISACA S CYBER SECURITY NEXUS Ivan Sanchez-Lopez Senior Manager Information Security, IT Risk & Continuity, DHL Global Forwarding ISACA Luxembourg
More informationFFIEC Cybersecurity Assessment Tool
Overview In light of the increasing volume and sophistication of cyber threats, the Federal Financial Institutions Examination Council 1 (FFIEC) developed the Cybersecurity Tool (), on behalf of its members,
More informationAccess FedVTE online at: fedvte.usalearning.gov
FALL 2015 Access FedVTE online at: fedvte.usalearning.gov If you need any assistance please contact the FedVTE Help Desk her e or email the Help Desk at support@usalearning.net. To speak with a Help Desk
More informationCourse Design Document. Information Security Management. Version 2.0
Course Design Document Information Security Management Version 2.0 January 2015 Table of Content 1 Versions History... 3 2 Overview of Security and Trust Course... 4 Synopsis... 4 2.1 Prerequisites...
More informationTrack 2: Introductory Track PREREQUISITE: BASIC COMPUTER EXPERIENCE
Anne Arundel Community College Tracks Anne Arundel Community College s computer technologies courses have been organized into 10 suggested tracks. The tracks are arranged to ensure that students have the
More informationCESG CIR SCHEME AND CREST CSIR SCHEME FREQUENTLY ASKED QUESTIONS
CESG CIR SCHEME AND CREST CSIR SCHEME FREQUENTLY ASKED QUESTIONS QUESTION General What is the Cyber Security Incident Response (CSIR) Scheme? What is the Cyber Incident Response (CIR) scheme? Why have
More informationX 420.5 Network, Operating System, and Database Security. Fall 2014, Registration Number 249343W. UCLA EXTENSION: Computer Science.
X 420.5 Network, Operating System, and Database Security Fall 2014, Registration Number 249343W UCLA EXTENSION: Computer Science Course Syllabus 12 Sessions: Mondays, 6-9 pm, September 29 - December 15,
More informationCYBER SECURITY TRAINING SAFE AND SECURE
CYBER SECURITY TRAINING KEEPING YOU SAFE AND SECURE Experts in Cyber Security training. Hardly a day goes by without a cyber attack being reported. With this ever-increasing threat there is a growing need
More informationThe Protection Mission a constant endeavor
a constant endeavor The IT Protection Mission a constant endeavor As businesses become more and more dependent on IT, IT must face a higher bar for preparedness Cyber preparedness is the process of ensuring
More informationIRAP Policy and Procedures up to date as of 16 September 2014.
Australian Signals Directorate Cyber and Information Security Division Information Security Registered Assessors Program Policy and Procedures 09/2014 IRAP Policy and Procedures 09/2014 1 IRAP Policy and
More informationCyber Defense Operations Graduate Certificate
The SANS Technology Institute makes shorter groups of courses available to students who are unable to commit to a full master s degree program. These certificate programs will augment your skills, provide
More informationEC-Council Certified Security Analyst (ECSA)
EC-Council Certified Security Analyst (ECSA) v8 Eğitim Tipi ve Süresi: 5 Days VILT 5 Day VILT EC-Council Certified Security Analyst (ECSA) v8 Learn penetration testing methodologies while preparing for
More information167 th Air Wing Fast Track Cyber Program Blue Ridge Community and Technical College
167 th Air Wing Fast Track Cyber Program Blue Ridge Community and Technical College Information Security Certificate: Designed to introduce students to programming, security basics, network monitoring,
More informationProtecting against cyber threats and security breaches
Protecting against cyber threats and security breaches IBM APT Survival Kit Alberto Benavente Martínez abenaventem@es.ibm.com IBM Security Services Jun 11, 2015 (Madrid, Spain) 12015 IBM Corporation So
More informationDepartment of Management Services. Request for Information
Department of Management Services Request for Information Cyber-Security Assessment, Remediation, and Identity Protection, Monitoring, and Restoration Services September 3, 2015 Submitted By: Carlos Henley
More informationIntroduction to Cyber Security / Information Security
Introduction to Cyber Security / Information Security Syllabus for Introduction to Cyber Security / Information Security program * for students of University of Pune is given below. The program will be
More informationCheck Point and Security Best Practices. December 2013 Presented by David Rawle
Check Point and Security Best Practices December 2013 Presented by David Rawle Housekeeping o Mobiles on Silent o No File Alarms planned o Fire exits are in front and behind and down the stairs o Downstairs
More informationCourse Descriptions November 2014
Master of Science In Information Security Management Course Descriptions November 2014 Master of Science in Information Security Management The Master of Science in Information Security Management (MSISM)
More informationCESG Certification of Cyber Security Training Courses
CESG Certification of Cyber Security Training Courses Supporting Assessment Criteria for the CESG Certified Training (CCT) Scheme Portions of this work are copyright The Institute of Information Security
More informationCisco Advanced Malware Protection for Endpoints
Data Sheet Cisco Advanced Malware Protection for Endpoints Product Overview With today s sophisticated malware, you have to protect endpoints before, during, and after attacks. Cisco Advanced Malware Protection
More informationThreat Intelligence Pty Ltd info@threatintelligence.com 1300 809 437. Specialist Security Training Catalogue
Threat Intelligence Pty Ltd info@threatintelligence.com 1300 809 437 Specialist Security Training Catalogue Did you know that the faster you detect a security breach, the lesser the impact to the organisation?
More informationMEMORANDUM. Date: October 28, 2013. Federally Regulated Financial Institutions. Subject: Cyber Security Self-Assessment Guidance
MEMORANDUM Date: October 28, 2013 To: Federally Regulated Financial Institutions Subject: Guidance The increasing frequency and sophistication of recent cyber-attacks has resulted in an elevated risk profile
More informationCyber Security. BDS PhantomWorks. Boeing Energy. Copyright 2011 Boeing. All rights reserved.
Cyber Security Automation of energy systems provides attack surfaces that previously did not exist Cyber attacks have matured from teenage hackers to organized crime to nation states Centralized control
More informatione2e Secure Cloud Connect Service - Service Definition Document
e2e Secure Cloud Connect Service - Service Definition Document Overview A cloud connectivity service that connects users, devices, offices and clouds together over the Internet. Organisations can choose
More informationBellevue University Cybersecurity Programs & Courses
Undergraduate Course List Core Courses: CYBR 250 Introduction to Cyber Threats, Technologies and Security CIS 311 Network Security CIS 312 Securing Access Control CIS 411 Assessments and Audits CYBR 320
More informationNetwork Security Administrator
Network Security Administrator Course ID ECC600 Course Description This course looks at the network security in defensive view. The ENSA program is designed to provide fundamental skills needed to analyze
More informationCloud Security Primer MALICIOUS NETWORK COMMUNICATIONS: WHAT ARE YOU OVERLOOKING?
A Cloud Security Primer : WHAT ARE YOU OVERLOOKING? LEGAL DISCLAIMER The information provided herein is for general information and educational purposes only. It is not intended and should not be construed
More information167 th Air Wing Fast Track Cyber Security Blue Ridge Community and Technical College
167 th Air Wing Fast Track Cyber Security Blue Ridge Community and Technical College Information Security Certificate: Designed to introduce students to programming, security basics, network monitoring,
More informationAssessing the Legacy of the ICTY
23-24 February 2010 World Forum conference centre, The Hague A Conference of the International Criminal Tribunal for the former Yugoslavia Co-organised and co-sponsored by the Government of the Netherlands
More informationCIP- 005 R2: Understanding the Security Requirements for Secure Remote Access to the Bulk Energy System
CIP- 005 R2: Understanding the Security Requirements for Secure Remote Access to the Bulk Energy System Purpose CIP-005-5 R2 is focused on ensuring that the security of the Bulk Energy System is not compromised
More informationCyber Security Trends 2016. Market trends from leading security analysts and consultants at TÜV Rheinland, OpenSky, and OpenSky UK
Cyber Security Trends 2016 Market trends from leading security analysts and consultants at TÜV Rheinland, OpenSky, and OpenSky UK December, 2015 Cyber security Trends 2016 What do new technologies and
More informationLocal Information. Below you will find travel tips and estimated costs for travel both to and from the airport and around town.
Local Information Travel/Transportation Below you will find travel tips and estimated costs for travel both to and from the airport and around town. Transportation To/From Airports Below, a list of transportation
More informationPenetration Testing //Vulnerability Assessment //Remedy
A Division Penetration Testing //Vulnerability Assessment //Remedy In Penetration Testing, part of a security assessment practice attempts to simulate the techniques adopted by an attacker in compromising
More informationProfessional Services Overview
Professional Services Overview INFORMATION SECURITY ASSESSMENT AND ADVISORY NETWORK APPLICATION MOBILE CLOUD IOT Praetorian Company Overview HISTORY Founded in 2010 Headquartered in Austin, TX Self-funded
More informationACCOMMODATION FORM. Distance to the Symposium Venue
Please complete the form in capital letters and keep a copy for your records. A separate registration form must be completed for each participant. Participant Information Registration ID (the ID you have
More informationIntel Security Certified Product Specialist Security Information Event Management (SIEM)
Intel Security Certified Product Specialist Security Information Event Management (SIEM) Why Get Intel Security Certified? As technology and security threats continue to evolve, organizations are looking
More informationi Network, Inc Technology Solutions, Products & Services Providing the right information, to the right customer, at the right time.
Technology Solutions, Products & Services Providing the right information, to the right customer, at the right time. 2 Barry Brueseke (619) 401 7334 www.inetwork west.com 4/3/2014 IEEE Cyber Security Workshop
More informationGE Oil & Gas. Cyber Security for NERC CIP Versions 5 & 6 Compliance
GE Oil & Gas Cyber Security for NERC CIP Versions 5 & 6 Compliance Cyber Security for NERC CIP Versions 5 & 6 Compliance 2 Contents Cyber Security for NERC CIP Compliance... 5 Sabotage Reporting... 6 Security
More informationIntel Security Certified Product Specialist Data Loss Prevention Endpoint (DLPe)
Intel Security Certified Product Specialist Data Loss Prevention Endpoint (DLPe) Why Get Intel Security Certified? As technology and security threats continue to evolve, organizations are looking for employees
More informationEnterprise Security Tactical Plan
Enterprise Security Tactical Plan Fiscal Years 2011 2012 (July 1, 2010 to June 30, 2012) Prepared By: State Chief Information Security Officer The Information Security Council State of Minnesota Enterprise
More informationInfor CloudSuite. Defense-in-depth. Table of Contents. Technical Paper Plain talk about Infor CloudSuite security
Technical Paper Plain talk about security When it comes to Cloud deployment, security is top of mind for all concerned. The Infor CloudSuite team uses best-practice protocols and a thorough, continuous
More informationReliable, Repeatable, Measurable, Affordable
Reliable, Repeatable, Measurable, Affordable Defense-in-Depth Across Your Cyber Security Life-Cycle Faced with today s intensifying threat environment, where do you turn for cyber security answers you
More informationHackers are here. Where are you?
1 2 What is EC-Council Certified Security Analyst Licensed Penetration Tester Program You are an ethical hacker. Your last name is Pwned. You dream about enumeration and you can scan networks in your sleep.
More information10233B: Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010
Course: 10233B: Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010 Description: About this Course This five-day, instructor-led course provides you with the knowledge and skills
More informationEMERGING THREATS & STRATEGIES FOR DEFENSE. Stephen Coty Chief Security Evangelist @StephenCoty
EMERGING THREATS & STRATEGIES FOR DEFENSE Stephen Coty Chief Security Evangelist @StephenCoty Industry Analysis 2014 Data Breaches - Ponemon Ponemon 2014 Data Breach Report *Statistics from 2013 Verizon
More informationAdvanced Threat Protection with Dell SecureWorks Security Services
Advanced Threat Protection with Dell SecureWorks Security Services Table of Contents Summary... 2 What are Advanced Threats?... 3 How do advanced threat actors operate?... 3 Addressing the Threat... 5
More informationProtecting critical infrastructure from Cyber-attack
Protecting critical infrastructure from Cyber-attack ACI-NA BIT Workshop, Session 6 (Cybersecurity) Long Beach, California October 4, 2015 Ben Trethowan Aviation Systems & Security Architect The scale
More informationEEI Business Continuity. Threat Scenario Project (TSP) April 4, 2012. EEI Threat Scenario Project
EEI Business Continuity Conference Threat Scenario (TSP) April 4, 2012 EEI Threat Scenario 1 Background EEI, working with a group of CIOs and Subject Matter Experts, conducted a survey with member companies
More informationPhone: +44 20 8123 2220 Fax: +44 207 900 3970 office@marketpublishers.com https://marketpublishers.com
Cyber Security Market by Solution (IAM, Encryption, DLP, Risk and Compliance Management, IDS/IPS, UTM, Firewall, Antivirus/Antimalware, SIEM, Disaster Recovery, DDOS Mitigation, Web Filtering, and Security
More informationStephen Coty Director, Threat Research
Emerging threats facing Cloud Computing Stephen Coty Director, Threat Research Cloud Environments 101 Cloud Adoption is Gaining Momentum Cloud market revenue will increase at a 36% annual rate Analyst
More informationNetwork Security in Building Networks
Network Security in Building Networks Prof. Dr. (TU NN) Norbert Pohlmann Institute for Internet Security - if(is) Westphalian University of Applied Sciences Gelsenkirchen, Germany www.if-is.net Content
More information