ISSA SOUTH TEXAS CHAPTER



Similar documents
Skål International Skål International Event Registration System (SIERS)

BLAKE INGLISH, CPA, ABV, CFE, CFF, CGMA Managing Director, Intellectual Property

The Housing Agency Marketplace

Understanding the Business Risk

Ernesto F. Rojas CISSP, DFCP, IAM, IEM, DABRI, PSC, MBA

Recognition. Awards & Top Trademark Law Firm World Trademark Review 1000, U.S. Trademark Case of the Year: In re Bose

Terms and Conditions

Douglas M. DePeppe Cyberlaw Attorney

How To Get A License To Practice Law In Florida

Big 4 Information Security Forum

Corporate Compliance Programs - Industry Best Practices. November 18, 2010 (Thursday) 8:00 a.m. to 12:00p.m.

Wednesday, March 11, :00am to 4:30pm. Seats are filling fast, sign up today!

Intellectual Property Attorneys LLP

Anatomy of a Hotel Breach

MAIN BIO EXPERIENCE SPEECHES PUBLICATIONS NEWS

MASTER AGREEMENTS How to use them to advance academic and corporate interests

WIPO Summer Schools on Intellectual Property

BRIAN F. SPECTOR, LLC

e-discovery Conference

Last Updated: June 2013

Who s Looking At Your Mobile Device? Data Security, Personal Privacy, and Information Governance in the Wireless World

CURRICULUM VITAE. David T. Gallant (USAF Retired) President, Gallant Computer Investigative Services, LLC

Law Firm Cyber Risk Conference: Addressing the Issues from the Top Down

Contents. Facts. Contact. Company Biography...4. Qualifications & Accolades...5. Executive Leadership Team...6. Products & Services...

OAKLAND UNIVERSITY PARALEGAL PROGRAM SYLLABUS BUSINESS ORGANIZATIONS CEPL 25300

BARRY L. GROSSMAN OF COUNSEL 777 E WISCONSIN AVENUE MILWAUKEE, WI (414) BGROSSMAN@FOLEY.COM

Program: Master s of Intellectual Property Law (Comprehensive) Syllabus

Venue : Conference Hall, Second Floor YMCA Building Jai Singh Marg, Connaught Place, New Delhi

SOUTH FLORIDA PARALEGAL ASSOCIATION (SFPA) ~ ft. Benefiting Miami Dade College's Paralegal Studies Program

Data Privacy and Security: A Primer for Law Firms

The Basic offering delivers Microsoft Navision information in predefined or customized information

Effective Protocols for Reducing Electronic Discovery Costs

209: Using Competitive Intelligence to Drive your IP Portfolio

Kevin Savoy, CPA, CISA, CISSP Director of Information Technology Audits Brian Daniels, CISA, GCFA Senior IT Auditor

Center for Identity. The University of Texas at Austin Partnership Program Proprietary, The University of Texas at Austin, All Rights Reserved.

AGENDA Morning Session

BENJAMIN L. HALL, III THE HALL LAW FIRM 530 Lovett Blvd. Houston, Texas 77006

POLICIES AND PROCEDURES MANUAL

CHRISTOPHER B. MEADORS, JD, CPA, CFF May 30, 2014 ASSISTANT PROFESSOR

BARRY ROSS. 539 N. Glenoaks Blvd., Suite 305 Office: Burbank, California Fax:

Jennifer L. Kovalcik

ASK PC Certified Information Systems Security Expert - CISSE

4 th Annual NAHSE Emerging Leaders Healthcare Summit Wyndham Airport Hotel & Executive Meeting Center Miami, Florida August 15-16, 2008

David Ewing Wald Curriculum Vitae

John H. McDowell, Jr.

Advanced Performance Measures

DAVID O. TAYLOR SMU Dedman School of Law 3315 Daniel Ave. Dallas, Texas

Prof. Jadranka Dabovic - Anastasovska, PhD Ass. Neda Zdraveva, MSci. Faculty of Law Iustinianus Primus Skopje

ACCOUNTANCY BOARD OF OHIO MINUTES OF NOVEMBER 4, 2011 MEETING

October ~ November 2015 JOINT BAR EVENT HILLSBOROUGH ASSOCIATION FOR WOMEN LAWYERS GEORGE EDGECOMB BAR ASSOCIATION TAMPA HISPANIC BAR ASSOCIATION

Mobile Enabling Security Products for a Leading Security Firm. Case study

WIPO LIST OF NEUTRALS BIOGRAPHICAL DATA. Telephone: Fax:

e-discovery Forensics Incident Response

Examining Medical Experts at Deposition and Trial

Skål International Events Registration System (SIERS) Members users guide

Michelle Peirce PRACTICE AREA: LITIGATION

PMI Mass Bay Chapter Call for Speakers

PROGRAM ANNOUNCEMENT

STEPHEN M. ORLOFSKY. Practice Concentration / v.2 A PENNSYLVANIA LLP

IRAP Policy and Procedures up to date as of 16 September 2014.

CONSULTANT: ROY L. PHILLIPS, CIC, CISR, CPIA, AAI V.P. KING-PHILLIPS INSURANCE AGENCY

Continuing Legal Education for Wisconsin. 48th Annual. CLEW Tax Workshop

OKLAHOMA STATE UNIVERSITY BIG DATA CONFERENCE. April 7, 2015

Hedge Fund Participation in Distressed Deals Both In and Outside of Bankruptcy

Committee & Leadership Manual

Welcome to the 1 st Annual Executive Seminar & Workshop in Predictive Analytics + Big Data

OFFICES CENTRAL TEXAS OFFICE. 308 E. Villa Maria Rd. Bryan, Texas Tel: Fax: Toll Free:

Overcoming Client Development Challenges for Women Lawyers

NPD Conference Call Notes May 20, 2013

DEVELOPING A MARKETING PLAN

Ethan J. Wall ASSOCIATE. Location: Miami Direct:

PROFESSIONAL ACTIVITIES

Friday, June 11, :30 a.m. 11:30 a.m.

Intellectual Property. Litigation and. Enforcement PATENT, TRADEMARK COPYRIGHT. 360 IPR Management and IPR Audit

Statutes of The R Foundation for Statistical Computing

Examination Review Course

Joint Session with CLEReg Law Practice Management

Transcription:

Page 1 of 5 ISSA SOUTH TEXAS CHAPTER ISSA News Letter For November 2012 Voted "Outstanding Chapter of 2007" by ISSA International As always, please feel free to contact me with any suggestions or requests to improve these emails or our chapter. Michael F. Angelo, CISSP, Chapter Director of Communications communications@southtexas.issa.org Luncheon Program (jump to registration section) Luncheon Topic: Lex Encryptus Since 2003, forty six states have enacted breach/notification laws that are intended to notify individuals of potential data compromise in the event of a security breach. In all of those states, the notification process can be delayed during an appendant law enforcement investigation. Unfortunately, many companies that have suffered security breaches tend to use the law enforcement period as a way to avoid notifying individuals entirely. As a result, five states have modified their laws to counteract that tendency. Texas has also modified its breach/notification law that will affect how Texas companies handle intrusions and security breaches that affect certain types of customer information. In addition, hackers have modified their modus operandi and attack the law firms that service corporations rather than the corporations themselves. Ronald Chichester, a local attorney who has handled breach cases for local companies, will present an update on state breach/notification laws, outline the ethical and legal obligations of law firms to protect client data, discuss the attack profiles used for corporate espionage via law firms, and outline what attorneys are being advised to do to handle the situation. Our Guest Speaker: Ronald Chichester, Esq., Law Office of Ronald Chichester, P.C. (Tomball, TX) Bio: Experienced in all areas of law involving computers and networks. Particular expertise in intellectual property (patents, copyrights, trademarks and trade secrets), electronic discovery (for litigation), computer forensics, analysis and comparison of source code for copyright infringement, electronic commerce, computer crimes, technology licensing (especially software), data privacy, corporate espionage, network and software security, database protection and Internet domain disputes. Adjunct Professor of Law at the Univ. of Houston.

Page 2 of 5 Education: Juris Doctorate University of Houston Law Center, 1991 M.S. in Aerospace Engineering University of Michigan, 1984 B.S. in Aerospace Engineering University of Michigan, 1982 Admissions and Certifications: State of Texas United States Court of Appeals for the Federal Circuit United States District Courts for the Southern District of Texas and the District of Nebraska United States Patent & Trademark Office Certified Computer Forensic Examiner Bar Activities: Vice Chair of the Business Law Section Past Chair of the Computer & Technology Section Member of the Intellectual Property Section Special Skills: Computer forensic examiner and expert witness for electronic discovery and copyright infringement cases involving computer source code. 33 years of software programming experience. Able to read and to write computer software applications (for desktops and servers) in a variety of languages. Taught classes on database schema creation, database administration, and structured query language ( SQL ) for relational and object databases. Trivia: Former propulsion engineer on the F-15 (for McDonnell Douglas), the F-16, and X-30 (for General Dynamics). Graduate research on tank gun ammunition for the M-1. One of the early adopters of computational fluid dynamics and genetic algorithms for aircraft design. Date: November 8 th, 2012 Time Schedule: 11:15 a.m. Registration / Networking 11:30 a.m. Luncheon / Networking 11:45 a.m. Chapter Business Meeting 11:55 a.m. Sponsor Presentation 12:00 noon Presentation 1:00 p.m. Adjourn Location: HESS - Houston Engineering and Scientific Society Club 5430 Westheimer at Yorktown. (Free Garage Parking) Advance Registration Appreciated

Page 3 of 5 Our Meeting Sponsor: Radware (NASDAQ: RDWR), is a global leader of application delivery and application security solutions for virtual and cloud data centers. Its award-winning solutions portfolio delivers full resilience for business-critical applications, maximum IT efficiency, and complete business agility. Radware s solutions empower more than 10,000 enterprise and carrier customers worldwide to adapt to market challenges quickly, maintain business continuity and achieve maximum productivity while keeping costs down. For more information visit: www.radware.com Contact:> Jay Chen Regional Sales Manager Radware Ph: (877) 236-9807 Cell: (569) 236-4320 Email: jayc@radware.com Corporate: Radware, Inc. - North America Headquarters Lobby 1 (Visitors) 575 Corporate Drive Mahwah, NJ 07430 Tel: +1 (201) 512-9771 U.S. Toll Free: 1 (888) 234-5763 Registration: Monthly meetings are held on the second Thursday of each month at the following location: Houston Engineering & Scientific Society (HESS) Club 5430 Westheimer at Yorktown. (Free Parking). Time: 11:15 a.m. - 1:00 p.m. Next Meeting: November 8 th. Meetings are open to all members and visitors who are interested in Information Security. NOTE: We now ask for members to include their ISSA membership number when registering. A current ISSA membership is required to qualify for member meal prices and workshop fees. If you do not have your membership number available when registering on-line through Eventbrite, please bring your membership number with you to the meeting for check in and payment. We encourage members and guests to make reservations via Eventbrite prior to 5:00 p.m. on the Tuesday before the meeting to help the chapter plan for enough meals and seating. Advanced reservations may also qualify for a discount on the meeting charge. NOTE: For security reasons, ensure that you close your browser after booking your lunch reservation through Eventbrite.

Page 4 of 5 Advance Registration Appreciated LuncheonMeeting Fees Late - On line or Walk in Registration Advance Registration (after 5:00 pm Tuesday) Luncheon Meeting (11:15 am - 1:00 pm) Chapter Members $20.00 $25.00 Non Members $30.00 $35.00 CPE Credit:1 hour for the luncheon presentation Pre-Requisites: None, or as specified in the event. Dress Code: Business or Business Casual Attire Questions?: Visit the chapter web site for contact information ( http://southtexasissa.org) Upcoming Training Opportunities As usual, our prolific education director is busy preparing educational opportunities for our chapter members at remarkably attractive prices. 1. CISSP Overview Class: Saturday November 10 th, 8:30 am to 4:30 pm. Location: Rice University / Duncan Hall, 6100 Main Street, Houston, Texas (Room 164). Cost $125 members / $ 150 non-members. Please check our Eventbrite registration site at http://southtexasissa.eventbrite.com Once again, please contact Joanne Ashland (education@southtexas.issa.org) to express your interest or for any questions. Upcoming Regional Training Opportunities: Austin: Ethical Hacking and Penetration Testing Course, December 3 rd to the 7 th. For more information contact Clare Nelson nclare@austin.rr.com Houston: (non ISSA) ISSA International: Sponsorships Available for Future Monthly Meetings If your company is active in the information security business, you should consider taking advantage of the opportunity to raise awareness of your company to our members. Each month we solicit a sponsor for the luncheon presentation as well as any special workshops. The charge is quite small and it provides you the following benefits: (1) your logo on our chapter web site (2) five minutes at the beginning or end of the presentation to present your company, and (3) the opportunity to conduct a drawing, if you would like to, in order to collect business cards Please contact Josh Locker (marketing@southtexas.issa.org ) or any member of the ISSA chapter board to express your interest.

Page 5 of 5 For CPA CPE candidates: Our TSBPA CPE provider number is 008915. Objectives: See description above Content: See description above Prerequisites: None Experience Level: Moderate CPEs: Varies by event (1 to 40 hours) This e-mail is provided as a service to the members and friends of the ISSA South Texas Chapter. If you have received this e-mail directly and do not wish to be mailed future chapter publications please send an e-mail to communications@southtexas.issa.org from the receiving e-mail account with "Unsubscribe from ISSA South Texas Mailings" in the subject line.this email was sent to!*email*! Copyright 2012 ISSA South Texas Chapter