ISSA Baltimore Chapter. Monthly Meeting October 28, 2015



Similar documents
ISSA Baltimore Chapter Monthly Meeting June 24, 2015

ISSA Baltimore Chapter Monthly Meeting August 26, 2015

ISSA Baltimore Chapter Monthly Meeting February 25, 2015

ISSA Baltimore Chapter Monthly Meeting April 22, 2015

ISSA Women in Security Special Interest Group (WIS SIG)

ISSA SOUTH TEXAS CHAPTER NEWSLETTER

April LinkedIn. Meeting Sponsor

VetSuccess. Top employers providing America s veterans with careers in cybersecurity

NASIG Board Conference Call August 27, 2015

State of Colorado s Enterprise Portfolio Project Management Office Accomplishments Since Inception August 2009 to December 2010

An Accelerated Pathway to Careers in Cybersecurity for Transitioning Veterans. NICE Annual Conference November 2015

SANS CyberTalent VetSuccess Immersion Academy. VetSuccess

Association of Government Accountants Phoenix Chapter Annual Report for AGA Program Year

Eastfield College Student Government Association Executive Board Application Academic Year

Chapter/Express Network Guide for Best Practices in League Management

The Society News Kansas City Chapter

Federal Reserve System Secure Payments Task Force

Policies and Procedures Communications Quality & Reliability (CQR) Technical Committee

BUSINESS PLAN

Cloud Computing and Data Center Consolidation

Call for Nominations for PMI Hong Kong Chapter Executive Committee Positions

ISSA SOUTH TEXAS CHAPTER

The Art of Architecture Transformation. Copyright 2012, Oracle and/or its affiliates. All rights reserved.

BOOZ ALLEN HAMILTON HOLDING CORP

ISSA SOUTH TEXAS CHAPTER NEWSLETTER

The fast track to top skills and top jobs in cyber. Guaranteed.

Report on. Formation of Asia Pacific Paediatric Nurses Association

PCI Compliance and the Cloud: What You Can and What You Can t Outsource Presented By:

Develop annual action plans, goals and accountability Identify demographic focus and in demand jobs

Responsibilities of groups: Queries to be made by to the SSO. In an emergency please ring the office, preferably between and

Co-Chairs, Cybersecurity, Privacy and Data Protection Committee

New York State Advisory Council on Military Education By-Laws

Women in Science and Engineering from Explorers to Practitioners to Leaders

College of Human Environmental Sciences Strategic Plan for

NBIS. The Network for Business Innovation & Sustainability 2016 Membership and Sponsorship Brochure

GIAC Program Overview 2015 Q4 Version

Society for Information Management. President s Message. Delivering Business Value Through Technology. Fellow SIM Members:

Newsletter. Volume #1 issue 1. New AGS Board Officers were elected for year


Rising to the Challenge

Business Babes By-Laws

Thursday, June 5 The Sheraton Premiere Tysons Corner Virginia

ISACA Singapore Chapter

University of Maryland University College 2013 Spring Job Fair & Career Expo

PMI-DVC Board of Directors Roles and Responsibilities

Office of the Mayor (AA0)

Ph.D. Nova Southeastern University, Ft Lauderdale, FL, Information Systems, completed 24 credit hours, expected ABD in Spring 2012

Federal Facilities Council Workshop: Cyber Resilience of Building Control Systems-----Nov 17-19, Washington, DC

BEEN PERFORMING LATELY?

How To Help Someone Who Is Addicted To Alcohol

Commission & Interest Group Division Chair Leadership Reporting Form Annual Report, Summer 2009

MFCC December 2013 Newsletter

The Impact of Global Program Management on Organizational Culture

ALABAMA SECTION - BIRMINGHAM BRANCH BYLAWS

ALA LIBRARY SUPPORT STAFF INTERESTS ROUND TABLE STEERING COMMITTEE MEETING

Microsoft Cloud Summit Atlantic Canada Roadshow TO THE CLOUD AND BEYOND

Port Security Seminar & Expo

Kevin Savoy, CPA, CISA, CISSP Director of Information Technology Audits Brian Daniels, CISA, GCFA Senior IT Auditor

SPSP Phase III Recruiting, Selecting, and Developing Secure Power Systems Professionals: Job Profiles

Constitution. Berklee Audio Engineering Society Student Chapter

Digital Marketplace - G-Cloud

TAX SECTION OF THE STATE BAR OF TEXAS

VIRGINIA BLUE RIDGE SECTION of the AMERICAN CHEMICAL SOCIETY. Bylaw I. Name, Object

Protecting Energy s Infrastructure and Beyond: Cybersecurity for the Smart Grid

Two 2-Day Programs Available

Everything You Need To Know About SAP Business One

PHI ALPHA SOCIAL WORK HONOR SOCIETY XI TAU CHAPTER UNIVERSITY OF SOUTH CAROLINA COLLEGE OF SOCIAL WORK CONSTITUTION & BYLAWS

Understanding the Federal IT Security Professional (FITSP) Certification

PROGRAM ADVISORY COMMITTEE HANDBOOK

WOMEN'S SOCIETY OF CYBERJUTSU SPONSORSHIP OVERVIEW Women s Society of Cyberjutsu

STATEMENT OF. Dr. David McClure Associate Administrator Office of Citizen Services and Innovative Technologies General Services Administration

Join us for. Our 14th Annual Anniversary Conference

2014 ANNUAL REPORT. Your Chamber at work for you!

CLOUD COMPUTING WE VE GOT CLOUD COVERED.

Maui College. Advisory Committee Handbook. Maui College

Training Session 2 - FortiSandbox Training Room 2 Speakers Saurab Sharma, Rakesh Kumar

STRIVE Collegiate Academy Charter School Literacy Leadership personalized Learning

2015 Councils & Committees

Cisco Virtual Desktop Infrastructure Strategy Service

The Greater Boynton Beach Chamber of Commerce ANNUAL REPORT

A leader s guide for getting started JMP. Users Groups. A leader s guide for getting started

I, have read and understand the MSI BRG guidelines and agree to abide by them as a member. Sign Date. Do Not Write Below: Membership Committee Only

Annual General Meeting of Association of Change Management Professionals Toronto Chapter. June 19, 2014

St. James-Assiniboia School Division WELCOME. to the Board Meeting. Information for Delegations.

A Unique Approach to SQL Server Consolidation and High Availability with Sanbolic AppCluster

How To Build A Cybersecurity Company

The College of Southern Maryland. WOMEN & STEM programs Dr. Brad Gottfried, President

The Arizona Academy of Nutrition and Dietetics Sponsorship Prospectus 2015

CHESAPEAKE CHAPTER NATIONAL SCHOOL PUBLIC RELATIONS ASSOCIATION

Project Management Business Analysis Enterprise Architecture

Embracing Diversity & Inclusion

Loyola Marymount University STUDENT ORGANIZATION CONSTITUTION OUTLINE

Starting A Pro-Life Club

Continuing Certification Requirements

NEXT MEETING. Location: Denver Athletic Club 1325 Glenarm Street, Denver, CO (Parking is $5 in DAC lot on the corner of 14th & Welton Streets)

ARTICLE VI SUB-COMMITTEES

AIA DC EAC EXECUTIVE COMMITTEE POSITION DESCRIPTIONS

DUBBER TO PRESENT AT ASX SPOTLIGHT ASIA

Table of Contents. FY BLS Strategic Plan Our Strategies and Goals Strategy Framework Strategy 1 (Products)...

13 th Annual General Meeting

Transcription:

ISSA Baltimore Chapter Monthly Meeting October 28, 2015

Agenda / Announcements Welcome to Parsons, 7110 Samuel Morse Drive, Suite 200 Columbia, Maryland 21046 Non-U.S. Citizen Requirements Any guests or new members in attendance? (ISC) 2 CPE Submissions Individual Responsibility CISSP Chapter Badges / Shirts and Jackets with ISSA-Baltimore Logo CISSP Study Group Chapter STEM Activity Future Meeting schedule

Board of Directors Bill Smith, CISSP, GSNA, CEH, GPEN, GCFA, GCFE - President Sidney Spunt, CISSP - VP Operations Kevin Drury, CISSP Secretary Carol Klessig, CISSP - VP Professional Development Rod Zwainz, CISSP, PMP - VP Education Phil Rogofsky, CISSP, Network+, CPA Treasurer Steve Chan, CISSP, PMP VP Membership Vacant - VP Outreach

Dennis Dworkowski Memorial Service: St. Alphonsus Rodriguez Catholic Church, Woodstock, Maryland 21163, November 14, 2015, 1:00 PM

Baltimore Chapter Sponsors

New Members Since September Meeting Michelle Ritter Traci Anne Harrell Earnest Sherrod Joseph Krupa Michael Hennessy Oladipo Oladapo Monique Jeffrey Adebowale Adenupebi Jason Schlemmer * Alvaro Sanchez 241 Total Members

Leah Lewis Chapter Services, Manager of Special Interest Groups and CISO Forum Events

Joe Grimes Executive Director, ISSA

Chapter Elections: Nov. Meeting Nomination Committee: Renee Esposito Chair + 2 members: TBD 2015 Elected Positions: VP Operations Treasurer Secretary VP Prof. Development

1 st Maryland STEM Festival Nov. 6-15. Science, Technology, Engineering & Math related resources, professionals and activities are sprouting up all over. The Festival serves as a central hub for those events and resources to be highlighted all over the state! Chapter is an inaugural sponsor at the Supporter level www.marylandstemfestival.org

Learn why you should become a Cybersecurity Professional, Learn about the latest advances in the field from top organizations A Free Event Open to High School and College Students and Cybersecurity Professionals November 9 th 6:30-8:30 Phoenix TS 10420 Little Patuxent Parkway, Suite 500 Columbia, Maryland 21044 One of the over 300 events of he Maryland STEM Festival www.marylandstemfestival.org Cake and Light Refreshments will be served www.issa-balt.org

SANS Activities SANS VetSuccess Academy: The VetSuccess Academy is an intensive training program in which transitioning veterans receive three SANS courses and GIAC certifications at no cost. SANS CyberTalent Fair (SCTF): A virtual career fair in which leading companies looking to hire in cybersecurity can connect and chat with top candidates in an online event. Our next virtual career fair will be held on Nov. 19 and registration is currently open. SANS CyberTalent Assessments: Online performance tools that organizations use to map out training or evaluate potential hires and contractors.

ISSA International Woman in Security Special Interest Group

Mission Connecting the World, One Cybersecurity Practitioner at a Time. Creating Leaders Together ISSA WIS SIG embraces a spirit of collaboration within its organization and throughout the industry. We partner with organizations to provide leadership programs and services, and challenge these companies to create cybersecurity-oriented professional advancement opportunities for women. Vision The WIS SIG is committed to developing women leaders globally, building a stronger cybersecurity community fabric, and enabling success across the globe.

ISSA 2015 Meetings and Events Date Speaker Organization Topic Oct. 28, 2015 Brett Miller Nov. 6 15, 2015 Nov. 9, 2015 Nov. 18, 2015 Dec. 15, 2015 Nick Keller Amazon, World Wide Public Sector Professional Services 1 st Maryland STEM Festival ISSA Baltimore STEM Festival Invencea Jailbreak Brewing Company Simplifying Security Compliance with Cloud Reference Implementations Advanced Endpoint Protection

Oct. 28, 2015 Speaker Brett Miller Amazon, Senior Consultant, World Wide Public Sector Professional Services Brett Miller is an Amazon Web Services (AWS) Senior Consultant with the Security and Compliance Practice. Brett has been working closely with commercial, civilian and IC organizations to migrate their applications into the cloud and modernize their security practices using cloud technologies. Before AWS, Brett spent 14 years as a mission developer, network and security engineer and a cloud security SME. Brett spent 3 years with a government enterprise security organization and led the authoring and deployment of the IC shared 800-53 responsibility matrix that has been used to accredit several clouds within the intelligence community. Brett was also the primary security architect and accreditation advisor for several cloud platforms currently deployed within the government.

Simplifying Security Compliance with Cloud Reference Implementations Cloud technology is transforming commercial and government systems by providing costeffective, near limitless scalability, and providing developers rapid and direct access to technology that is helping to transform startups into multi-billion dollar enterprises. Unlike the commercial sector that has been migrating to cloud technologies over the past 8 years, the government is just starting their cloud journey. Most federal, state, and IC organizations are accelerating their cloud migrations so they can obtain the cost savings and scalability that their commercial counterparts have been realizing for the past 6-7 years. This cloud revolution is creating some concern within government compliance and security organizations that have invested significant amounts of time and resources on security processes that may be challenged by the pace of innovation that the cloud empowers. For the first time in IT history, developers can build and deploy cloud based infrastructures within minutes yet cannot go into production for months due to the time and manpower it takes to manually ATO systems. This is a big problem that security professionals need to address so that mission applications can deploy and keep up with our adversaries.