Phoenix ISSA Newsletter Q3 2013

Size: px
Start display at page:

Download "Phoenix ISSA Newsletter Q3 2013"

Transcription

1 Phoenix ISSA Newsletter Q Q President s Message 2013 is half over and Phoenix ISSA has enjoyed some great meetings with more to come. Our Q3 meeting was our best attended meeting of the year. We had four great presentations, give-aways from the chapter and sponsors and we even raffled off two trips to the 2013 ISSA International Conference in Nashville, Tennessee. Thanks to all who organized and presented. These are the type of quality meetings Phoenix ISSA strives to deliver. We hope the variety, professionalism, and new perspectives shared at our meetings make your jobs a little easier. We have three upcoming events that you will want to mark on your calendars and attend: ISSA-Infragard joint meeting - The joint event will feature three speakers on the connection between Cyber-Security and National Security. (3 CPEs) September 19, 1:30-4:30pm at the AZ Dept of Emergency Management's Russell Auditorium (5636 E McDowell Road, Phoenix, Arizona 85008). Free to members Q4 Chapter meeting - theme is Act (4 CPEs) October 9, 11:30-5:00 at ITT Tech (5005 S Wendler Dr, Tempe, AZ 85282). Sponsors include FishNet, eplus Security, Websense and ITT Tech. Free to members Inside this issue President s Message Cont Q3 Meeting...2 Security Trivia...2 Q3 Meeting Continued Schola rships...3 Security Trivia Answers...4 Upcoming Events...4 Phoenix ISSA Conta cts Phoenix Security a nd Audit Conference..5 Goals a nd Objectives...6 Sponsors...6 Websites Phoenix ISSA Website

2 Q President s Message Continued 2013 Phx Security and Audit Conference (#PhxSAC) - joint conference with Phx ISACA and IAA (7 CPEs) October 22, 8:00-5:00 at Desert Willow Conference Center (4340 E Cotton Center blvd, Phoenix, Az ) $40 members, $100 non-members (until Aug 31) 7 Tracks: Soft Skills, IT Audit, Mobile Technologies, Hackers & Threats, Hot Topics, Securing the End User, Risk Management 2 Keynotes, CISO Rountable, LiveFire Range We hope you can join us. Thank you for participating and helping us grow the information security community. Regards, Aaron Computer Security President, Phoenix ISSA 1. Which of the popular operating systems is virtually most secure? 2. Which type of attack do hackers use to gain information from you without the use of specialized computer programs? 3. Which service was originally designed for network administrators to work remotely on different computers in their network but is now mostly used by malicious hackers? Q3 Meeting was about Security Detection Presentations: Evolution of Wire Fraud Mike Kirby II Director of Security Services at Fidelity Information Services (FIS) Abstract: Whether we know it or not, malicious software has changed our world. It has impacted us personally, within the organizations we work for, our financial institutions, and even our laws. I will discuss recent events that have shaped the changes in the banking industry and how they impact us as security professionals and consumers. 2

3 Q3 Meeting Continued Using Log Correlation to Detect Network Security Incidents Bert Hayes, Solutions Engineer at Splunk Abstract: There are a handful of infrastructure logs that are considered the absolute bare minimum to monitor for signs of network security incidents. I'll describe what these resources are and how log correlation can detect compromised systems. I'll identify additional logs that can then be used after an incident to conduct a more thorough investigation Phoenix ISSA Scholarships The scholarships have been decided upon by the board and will be awarded at the next quarterly meeting. Implementation of a Log Correlation Tool Vauda Jordan, Lead Security Engineer at the City of Phoenix Abstract: There is no doubt the benefit of a log correlation tool, and more and more organizations are making the move to purchase such a tool, but what does it take to implement? Just like the Curious Case of Benjamin Button, a log correlation tool starts out as a sluggish, slow start to gather all of the information and implement. And in the end, it still needs the care and feeding of a newborn baby. This is reality when implementing a log correlation tool in a fast paced and rapidly changing organization. The tool must be implemented and integrated into the organization s infrastructure and processes, and constant change to infrastructure and processes require constant changes to the tool. Over the past 3 years, the City of Phoenix implemented such a tool I ll present the good, the bad, and the ugly of the implementation. Compliance Mandates, Insider Threats, and the Need for Secure Audit Stephen Helm, Product Marketing Specialist at Safenet, Inc. Abstract: Breaches are rampant and more frequent than ever before. Threats come from both inside and outside the organization. Organizations need to assume that attackers can circumvent their perimeter defenses, and take steps to protect their data assets in the event of a breach. However, the job is not done. The threat of insider attacks poses another challenge to security. High integrity audit logs, which provide a clear view into who did what, when, are increasingly being required by compliance initiatives. In this session, learn how secure audit logging can be used to mitigate the threat of insider attacks, and support the larger goal of Securing the Breach. 3

4 Trivia Answers 1. Linux. OS security is a very important aspect to think about when purchasing your computer. Today, many computers, that are not specially designed, are shipped with Windows 8 or Windows 7, although it is highly recommended that users switch to Linux systems. This is because these systems are not only more affordable (many of them are completely free), but there are only a limited number of viruses written for these systems, so the risk of you getting a virus while using a Linux system is definitely lower than if you were using a Windows computer. 2. Social Engineering. Yes, it is possible for skilled hackers to gain important information from you without using specially programmed software. This type of attack is called Social Engineering, and it is basically a situation in which the hacker tries to gain your trust and then uses that trust against you. 3. Telnet. Telnet is a specialized service which was originally used by network administrators, although these days, there are many other uses for it, such as connecting to a web-server and spoofing (providing fake) information about yourself. Upcoming Events ISSA Quarterly Meeting Theme: Act Tuesday October 8, :30 AM 5:00PM ITT Technical Institute, Tempe, AZ SDSUG Sonoran Desert Security User Group August 14, :45 AM 4:15 PM University of Advancing Technology (UAT), Tempe, AZ ISSA Web Conference: Mobile App Security Issues Tuesday, August 27, :00 AM 11:00 AM ISSA-Infragard Joint Meeting: Cyber-Security meets National Security Thursday, September 19, :30 PM 4:30 PM Russell Auditorium, Arizona Division of Emergency Management 5636 E McDowell Road, Phoenix, Arizona More details to come on the website. ISSA Web Conference: Big Data Tuesday, September 24, :00 AM 11:00 AM More details to come on website. Arizona Technology Summit Wednesday, September 25, :00 AM 5:00 PM Phoenix Convention Center (South Ballroom) Details & registration at Register using ISSA without the quotes Phoenix Security and Audit Conference Tuesday, October 22, :00 AM 4:30 PM Desert Will Conference Center, 4340 E Cotton center, Phoenix AZ Details and registration: 4

5 2013 Phoenix Security and Audit Conference This year's conference will be bigger, better, and more flavorful. ISSA, ISACA, and IIA are partnering as hosts (yes, we're covering the entire Security & Audit worlds), pulling from a total membership count of over 1,600. We're hosting seven or more professional tracks and expecting 350 attendees, over 100 from our 2012 conference. Preliminarily the tracks are: Soft Skills IT Audit Mobile Technologies Hackers & Threats Hot Topics Securing the End User Risk Management It's technical and it's high-level. It's packed with everything you need to know about the latest security risks impacting organizations and how to prepare and audit. You will take away practical implementation guidance and lessons learned from top-notch presenters and regulators. And the networking is unmatched. Phoenix ISSA Contacts President Aaron S. Carpenter Vice-President Rich Larkins Secretary Ilene Klein Treasurer Dee Ramon Sponsorship Director Kathy Doolittle Program Director Anne-Marie Olson (AMO) Communications Director Pat Wilson Membership Director Kurt Schmeckpeper 5 Web Director Jenner Holden

6 Phoenix ISSA Mission Statement The mission of the Phoenix ISSA Chapter is to provide a forum for the education of information security to its members through presentations and open discussions on topics important to the members and the information security industry. Phoenix ISSA Goals and Objectives The goals and objectives of the Phoenix ISSA Chapter are to: Offer products and services that deliver value to members (website, newsletter) Enhance its members professional growth Maintain the ability to provide expert and high-quality speakers at chapter meeting Support the enhancement of the credence and legitimacy of the information security profession Support ISSA s objective to establish itself as the leadership voice of the profession Increase Membership Encourage local information security professionals to attend chapter meetings and join ISSA Encourage existing members to spread the word about ISSA Develop correspondence to recruit new members and sustain existing members Conduct membership drives Continually identify ways to improve the Phoenix ISSA Chapter initiatives Support ISSA s endorsement of the CISSP Establish relationships with similar associations in Phoenix Conduct annual survey to identify the ongoing interests and needs of the members and the industry Make effective use of funds through budgeting Provide the foundation for an ongoing chapter for many years to come THANKS TO OUR SPONSORS FOR THE THIRD QUARTER OF 2013

CYBER FRAUD & DATA BREACHES 16 CPE s May 16-17, 2018

CYBER FRAUD & DATA BREACHES 16 CPE s May 16-17, 2018 CYBER FRAUD & DATA BREACHES 16 CPE s May 16-17, 2018 Cyber fraud attacks happen; they can t all be stopped. The higher order question must be how can we, as fraud examiners and assurance professionals,

More information

Volume 2014, Number 4. Volunteers Needed!

Volume 2014, Number 4. Volunteers Needed! Volume 2014, Number 4 Volunteers Needed! Volunteering for NJ ISACA is a great opportunity to expand your professional contacts and your IT knowledge base. NJ ISACA needs talented professionals like you

More information

BENEFITS of MEMBERSHIP FOR YOUR INSTITUTION

BENEFITS of MEMBERSHIP FOR YOUR INSTITUTION PROFILE The Fiduciary and Investment Risk Management Association, Inc. (FIRMA ) is the leading provider of fiduciary and investment risk management education and networking to the fiduciary and investment

More information

Memphis Chapter. President s Message. This annual event is designed to provide students with a

Memphis Chapter. President s Message. This annual event is designed to provide students with a Memphis Chapter F E B R U A R Y 2 0 1 5 Remember: Update your IIA profile for the most up-to-date news. RSVP for the Annual Student Day February 24, 2015 This annual event is designed to provide students

More information

Security Program Design:

Security Program Design: Security Program Design: A Critical Infrastructure Protection Model Experience, Dedication, and Leadership July 17-18, 2013 Toronto, Ontario CAN in Security EDUCATION Earn up to 16 CPEs Are you confident

More information

PONEMON INSTITUTE RESEARCH REPORT 2018 STUDY ON GLOBAL MEGATRENDS IN CYBERSECURITY

PONEMON INSTITUTE RESEARCH REPORT 2018 STUDY ON GLOBAL MEGATRENDS IN CYBERSECURITY PONEMON INSTITUTE RESEARCH REPORT 2018 STUDY ON GLOBAL MEGATRENDS IN CYBERSECURITY Benchmark research sponsored by Raytheon. Independently conducted by Ponemon Institute LLC. February 2018 2018 Study on

More information

Confronting the Threat. Wednesday, August 8, 2006, 2-3:15 PM Debbie Christofferson, CISSP, CISM Sapphire-Security Services LLC

Confronting the Threat. Wednesday, August 8, 2006, 2-3:15 PM Debbie Christofferson, CISSP, CISM Sapphire-Security Services LLC Confronting the Threat Inside the Castle Walls Wednesday, August 8, 2006, 2-3:15 PM Debbie Christofferson, CISSP, CISM Sapphire-Security Services LLC 1 Debbie Christofferson, CISSP, CISM Sapphire-Security

More information

BECOME TOMORROW S LEADER, TODAY. SEE WHAT S NEXT, NOW

BECOME TOMORROW S LEADER, TODAY. SEE WHAT S NEXT, NOW BECOME TOMORROW S LEADER, TODAY. SEE WHAT S NEXT, NOW BECOME AN ISACA MEMBER TODAY. Nearing its 50th year, ISACA is a global association helping individuals and enterprises achieve the positive potential

More information

2018 CALENDAR OF ACTIVITIES

2018 CALENDAR OF ACTIVITIES 2018 CALENDAR OF ACTIVITIES WHO WE ARE AND WHAT WE OFFER Ý Public Trainings Technical Sessions Reviews GMM Other Chapter Activities Conferences Professionals Night ISACA was incorporated by individuals

More information

CYBERSECURITY HOW IT IS TRANSFORMING THE IT ASSURANCE FIELD

CYBERSECURITY HOW IT IS TRANSFORMING THE IT ASSURANCE FIELD CYBERSECURITY HOW IT IS TRANSFORMING THE IT ASSURANCE FIELD December 2014 KEVIN GROOM ISACA Involvement (Middle Tennessee Chapter) Treasurer (2009 2011) Vice President (2011 2013) President (2013 present)

More information

Global Security Exchange (GSX) 2019

Global Security Exchange (GSX) 2019 Global Security Exchange (GSX) 2019 InfraGard is a partnership between the FBI and the private sector. It is an association of persons who represent businesses, academic institutions, organizations, state

More information

Les joies et les peines de la transformation numérique

Les joies et les peines de la transformation numérique Les joies et les peines de la transformation numérique Georges Ataya CISA, CGEIT, CISA, CISSP, MSCS, PBA Professor, Solvay Brussels School of Economics and Management Academic Director, IT Management Education

More information

2016 SPONSORSHIP OPPORTUNITIES

2016 SPONSORSHIP OPPORTUNITIES 14 TH ANNUAL ARCHITECTING ENTERPRISE TRANSFORMATION SEPTEMBER 21, 2016 RENAISSANCE WASHINGTON DC DOWNTOWN HOTEL 2016 SPONSORSHIP OPPORTUNITIES One-On-One Access to Government s Enterprise Architects EDUCATION

More information

Facing Up to the Challenges

Facing Up to the Challenges Information Security, Data Breaches and Protecting Cardholder Information: Facing Up to the Challenges SEPTEMBER 13-14, 2006 Account Number PIN Number Social Security Number Social Security Number Information

More information

Northeast Ohio Chapter Annual General Meeting

Northeast Ohio Chapter Annual General Meeting Northeast Ohio Chapter Annual General Meeting May 21, 2015 For professionals and organizations be the leading global provider of knowledge, certifications, community, advocacy and education on information

More information

Checkpoint Learning Premier Plus CPE Package

Checkpoint Learning Premier Plus CPE Package Checkpoint Learning Premier Plus CPE Package More learning options for a single low annual price. 2 Premier Plus CPE Package Checkpoint Learning Premier Plus CPE Package The Checkpoint Learning Premier

More information

E-guide CISSP Prep: 4 Steps to Achieve Your Certification

E-guide CISSP Prep: 4 Steps to Achieve Your Certification CISSP Prep: 4 Steps to Achieve Your Certification Practice for the exam and keep your skills sharp : Thank you for downloading our CISSP certification guide. Aside from this handy PDF, you can also access

More information

BREAKING BARRIERS TO COLLABORATE WITH THE C-SUITE

BREAKING BARRIERS TO COLLABORATE WITH THE C-SUITE BREAKING BARRIERS TO COLLABORATE WITH THE C-SUITE 31st Annual SoCal ISSA Security Symposium Wendy T. Wu Vice President Agenda + CISO: Then and Now + Who are the Stakeholders and What Do They Care About?

More information

Keynotes. Mobile Version Subscribe Contact Us About Us Advertising Editorial SC UK SC Aus/NZ

Keynotes.   Mobile Version Subscribe Contact Us About Us Advertising Editorial SC UK SC Aus/NZ Page 1 of 5 Mobile Version Subscribe Contact Us About Us Advertising Editorial SC UK SC Aus/NZ Search Home News Features Opinions Congress News & Opinions Products Sectors News Bytes Canada News Newsletters

More information

ACAMS (Association of Certified AML Specialist)

ACAMS (Association of Certified AML Specialist) ACAMS (Association of Certified AML Specialist) Founded in 2001 Largest international membership organisation dedicated to enhancing the knowledge, skills and expertise of AML/CTF and financial crime detection

More information

Cybersecurity Risk Mitigation: Protect Your Member Data. Introduction

Cybersecurity Risk Mitigation: Protect Your Member Data. Introduction Cybersecurity Risk Mitigation: Protect Your Member Data Presented by Matt Mitchell, CISSP Knowledge Consulting Group Introduction Matt Mitchell- Director Risk Assurance 17 years information security experience

More information

State of Security Operations

State of Security Operations State of Security Operations Roberto Sandoval / September 2014 Security Intelligence & Operations Consulting Founded: 2007 The best in the world at building state of the art security operations capabilities/cyber

More information

SAP Controls & Best Practices

SAP Controls & Best Practices To make sure you receive future emails,please add InfoNet@njisaca.org to your address book or safe list. Monthly Newsletter Published by ISACA NJ Chapter Volume 2013, Number 3 SAP Controls & Best Practices

More information

SPONSORSHIP OPPORTUNITIES JULY 25-26, 2018 SANTIAGO, CHILE #ISC2CONGRESSLATAM LATAMCONGRESS.ISC2.ORG

SPONSORSHIP OPPORTUNITIES JULY 25-26, 2018 SANTIAGO, CHILE #ISC2CONGRESSLATAM LATAMCONGRESS.ISC2.ORG SPONSORSHIP OPPORTUNITIES JULY 25-26, 2018 SANTIAGO, CHILE #ISC2CONGRESSLATAM LATAMCONGRESS.ISC2.ORG THE WORLD S LEADING CYBERSECURITY AND IT SECURITY PROFESSIONAL ORGANIZATION How to face the immense

More information

HYDERABAD CHAPTER OF ISACA FIFTEENTH ANNUAL REPORT

HYDERABAD CHAPTER OF ISACA FIFTEENTH ANNUAL REPORT Dear Members, It is my privilege and honor to present the 15 th Annual Report of the Hyderabad for the year. 1. FINANCIAL RESULTS Rs.in lakhs Particulars 2013 14 Income 9.84 8.96 Surplus 2.31 2.56 Investments(Bank

More information

A-LIST 2016 Event Sponsorship Form

A-LIST 2016 Event Sponsorship Form A-LIST 2016 Event Sponsorship Form Event Atlanta Local InfraGard Security Training (A-LIST) event Date February 10, 2016 Location Purchase and sponsorship contribution levels Kennesaw Center, Kennesaw

More information

NEWS ISSUE # 26

NEWS ISSUE # 26 PRESIDENT S MESSAGE Dear Members, Time really flies and soon 2012 will be over and we will be welcoming the New Year 2013. ISACA Malaysia Chapter has kick started the year end celebration by having the

More information

How NSFOCUS Protected the G20 Summit. Guy Rosefelt on the Strategy, Staff and Tools Needed to Ensure Cybersecurity

How NSFOCUS Protected the G20 Summit. Guy Rosefelt on the Strategy, Staff and Tools Needed to Ensure Cybersecurity How NSFOCUS Protected the G20 Summit Guy Rosefelt on the Strategy, Staff and Tools Needed to Ensure Cybersecurity SPONSORED BY Rosefelt is responsible for developing NSFOCUS threat intelligence and web

More information

Table of Contents. Preface xvii PART ONE: FOUNDATIONS OF MODERN INTERNAL AUDITING

Table of Contents. Preface xvii PART ONE: FOUNDATIONS OF MODERN INTERNAL AUDITING Table of Contents Preface xvii PART ONE: FOUNDATIONS OF MODERN INTERNAL AUDITING Chapter 1: Significance of Internal Auditing in Enterprises Today: An Update 3 1.1 Internal Auditing History and Background

More information

IT Security Mandatory Solutions. Andris Soroka 2nd of July, RIGA

IT Security Mandatory Solutions. Andris Soroka 2nd of July, RIGA IT Security Mandatory Solutions Andris Soroka 2nd of July, 2014 @LPS, RIGA Data Security Solutions business card Specialization IT Security IT Security services (consulting, audit, pen-testing, market

More information

Strategic Plan for years Updated - 8/9/14 Review & re-approved

Strategic Plan for years Updated - 8/9/14 Review & re-approved The Mid-Florida Chapter of APICS will continue to utilize a Continuous Improvement concept, along with the C-BAR as tools to better manage the chapter. Vision: Mission: Mid-Florida Chapter of APICS will

More information

Why Should I become a Member?

Why Should I become a Member? KC PMI Mid-America Chapter Welcome to the Kansas City PMI Mid-America Chapter Information Session Why Should I become a Member? KC PMI Mid-America Chapter Event Agenda 2:00 pm - 2:15 pm Ice Breaker/Networking

More information

Clarity on Cyber Security. Media conference 29 May 2018

Clarity on Cyber Security. Media conference 29 May 2018 Clarity on Cyber Security Media conference 29 May 2018 Why this study? 2 Methodology Methodology of the study Online survey consisting of 33 questions 60 participants from C-Level (CISOs, CIOs, CTOs) 26

More information

TOMORROW. TOGETHER Governance, Risk, and Control Conference. August 19-21, Phoenix, Arizona. An IIA & ISACA Collaboration

TOMORROW. TOGETHER Governance, Risk, and Control Conference. August 19-21, Phoenix, Arizona. An IIA & ISACA Collaboration TOMORROW. TOGETHER. 2013 Governance, Risk, and Control Conference An IIA & ISACA Collaboration Join two highly respected associations at one world-class event August 19-21, 2013 Phoenix, Arizona Reserve

More information

Could the BIGGEST Threat to Your Business be INSIDE Your Company?

Could the BIGGEST Threat to Your Business be INSIDE Your Company? Could the BIGGEST Threat to Your Business be INSIDE Your Company? Presented By: Cheryl W. Snead, Banneker Industries, Inc. Rick Avery, Securitas Security Inc. Cheryl W. Snead President/CEO/Facility Security

More information

IBM Security Systems. IBM X-Force 2012 & CISO Survey. Cyber Security Threat Landscape IBM Corporation IBM Corporation

IBM Security Systems. IBM X-Force 2012 & CISO Survey. Cyber Security Threat Landscape IBM Corporation IBM Corporation IBM X-Force 2012 & CISO Survey Cyber Security Threat Landscape 1 2012 IBM Corporation IBM X-Force 2011 Trend and Risk Report Highlights The mission of the IBM X-Force research and development team is to:

More information

The Evolving Threat to Corporate Cyber & Data Security

The Evolving Threat to Corporate Cyber & Data Security The Evolving Threat to Corporate Cyber & Data Security Presented by: Sara English, CIPP/US Sara.English@KutakRock.com 1 http://blogs.wsj.com/law/2015/12/09/employee error leading cause of data breaches

More information

Enhancing the Cybersecurity of Federal Information and Assets through CSIP

Enhancing the Cybersecurity of Federal Information and Assets through CSIP TECH BRIEF How BeyondTrust Helps Government Agencies Address Privileged Access Management to Improve Security Contents Introduction... 2 Achieving CSIP Objectives... 2 Steps to improve protection... 3

More information

IIA Academy YOUR PARTNER IN PROFESSIONAL DEVELOPMENT

IIA Academy YOUR PARTNER IN PROFESSIONAL DEVELOPMENT www.iia.org.sg IIA Academy YOUR PARTNER IN PROFESSIONAL DEVELOPMENT IIA Academy Professional Development To support you in your career progression as an internal auditor, we have adopted the IIA Global

More information

SANS Vendor Offerings Detail

SANS Vendor Offerings Detail SANS Vendor Offerings Detail After working with SANS for a few years now, the audience at SANS events and webinars continues to represent some of the most forward thinking IT security practitioners looking

More information

Webinars INSPIRING A SAFE AND SECURE CYBER WORLD Media Kit - North America

Webinars INSPIRING A SAFE AND SECURE CYBER WORLD Media Kit - North America Webinars INSPIRING A SAFE AND SECURE CYBER WORLD 2018 Media Kit - North America 1 THE (ISC) 2 SECURE WEBINARS (ISC) 2 Secure Webinars are a proven method of reaching high-level IT security executives in

More information

Monthly Meeting September 28, 2016

Monthly Meeting September 28, 2016 Monthly Meeting September 28, 2016 Agenda / Announcements Welcome to Parsons, 7110 Samuel Morse Drive, Suite 200 Columbia, Maryland 21046 Non-U.S. Citizen Requirements Any guests or new members in attendance?

More information

Managing Cyber Risk. Robert Entin Executive Vice President Chief Information Officer Vornado Realty Trust

Managing Cyber Risk. Robert Entin Executive Vice President Chief Information Officer Vornado Realty Trust Managing Cyber Risk Robert Entin Executive Vice President Chief Information Officer Vornado Realty Trust Adam Thomas Principal Cyber Risk Services Deloitte & Touche LLP Give Us Your Feedback for this Session!

More information

Letter from the President

Letter from the President Letter from the President Dear Valued Advantage Customer, Every day we have many exciting activities going on at ECi Advantage that contribute to the betterment of our products and services and benefit

More information

Experience Security, Risk, and Governance

Experience Security, Risk, and Governance Experience Security, Risk, and Governance Agenda and recommended event path 26 28 March Vienna, Austria Contents 3 Welcome 4 Overview 5 Evening Programs 6 Sessions at-a-glance 11 Digital Transformation

More information

WEBINARS INSPIRING A SAFE AND SECURE CYBER WORLD Media Kit - North America

WEBINARS INSPIRING A SAFE AND SECURE CYBER WORLD Media Kit - North America INSPIRING A SAFE AND SECURE CYBER WORLD 2019 Media Kit - North America THE (ISC) 2 (ISC) 2 Webinars are a proven method of reaching high-level IT security executives in an intimate setting. Members advance

More information

EVENT BROCHURE SECURITY WORLD APRIL 2017 MELIA HANOI HOTEL HOSTED BY ORGANIZED BY SUPPORTED BY.

EVENT BROCHURE SECURITY WORLD APRIL 2017 MELIA HANOI HOTEL HOSTED BY ORGANIZED BY SUPPORTED BY. EVENT BROCHURE www.security.org.vn SECURITY WORLD 2017 4 APRIL 2017 MELIA HANOI HOTEL HOSTED BY ORGANIZED BY SUPPORTED BY Ministry of Public Security Authority of Cyber Security - MPS Authority of Information

More information

UNCLASSIFIED. National and Cyber Security Branch. Presentation for Gridseccon. Quebec City, October 18-21

UNCLASSIFIED. National and Cyber Security Branch. Presentation for Gridseccon. Quebec City, October 18-21 National and Cyber Security Branch Presentation for Gridseccon Quebec City, October 18-21 1 Public Safety Canada Departmental Structure 2 National and Cyber Security Branch National and Cyber Security

More information

EMPOWER PEOPLE IMPROVE LIVES INSPIRE SUCCESS

EMPOWER PEOPLE IMPROVE LIVES INSPIRE SUCCESS Information Technology Shared Service Team North Dakota Cyber Security Across North Dakota Threats and Opportunities 15 September 2018 EMPOWER PEOPLE IMPROVE LIVES INSPIRE SUCCESS AGENDA SIRN / FirstNet

More information

Security Program Design:

Security Program Design: Security Program Design: A Critical Infrastructure Protection Model July 16 17, 2014 Earn up to 16 CPEs EXPERIE NCE, DED IC ON AT I D, AN LEA DE RS HIP IN SE R CU ITY E C DU AT IO N Are you confident in

More information

10 Cybersecurity Questions for Bank CEOs and the Board of Directors

10 Cybersecurity Questions for Bank CEOs and the Board of Directors 4 th Annual UBA Bank Executive Winter Conference February, 2015 10 Cybersecurity Questions for Bank CEOs and the Board of Directors Dr. Kevin Streff Founder, Secure Banking Solutions 1 Board of Directors

More information

Symantec Security Monitoring Services

Symantec Security Monitoring Services 24x7 real-time security monitoring and protection Protect corporate assets from malicious global threat activity before it impacts your network. Partnering with Symantec skilled and experienced analysts

More information

ForeScout Extended Module for Splunk

ForeScout Extended Module for Splunk Enterprise Strategy Group Getting to the bigger truth. ESG Lab Review ForeScout Extended Module for Splunk Date: May 2017 Author: Tony Palmer, Senior Lab Analyst Abstract This report provides a first look

More information

Will you be PCI DSS Compliant by September 2010?

Will you be PCI DSS Compliant by September 2010? Will you be PCI DSS Compliant by September 2010? Michael D Sa, Visa Canada Presentation to OWASP Toronto Chapter Toronto, ON 19 August 2009 Security Environment As PCI DSS compliance rates rise, new compromise

More information

SALARY $ $72.54 Hourly $3, $5, Biweekly $8, $12, Monthly $103, $150, Annually

SALARY $ $72.54 Hourly $3, $5, Biweekly $8, $12, Monthly $103, $150, Annually SALARY $49.72 - $72.54 Hourly $3,977.88 - $5,803.27 Biweekly $8,618.75 - $12,573.75 Monthly $103,425.00 - $150,885.00 Annually ISSUE DATE: 03/21/18 THE POSITION DIRECTOR OF CYBER SECURITY OPEN TO THE PUBLIC

More information

FERC Audits and Compliance Conference March 3, 2015 Spectra Energy Corporation Fred Fowler Auditorium 5400 Westheimer Court Houston, Texas

FERC Audits and Compliance Conference March 3, 2015 Spectra Energy Corporation Fred Fowler Auditorium 5400 Westheimer Court Houston, Texas FERC Audits and Compliance Conference March 3, 2015 Spectra Energy Corporation Fred Fowler Auditorium 5400 Westheimer Court Houston, Texas Time Tuesday, March 2, 2015 8:00 AM Breakfast Included in Registration

More information

December 10, Statement of the Securities Industry and Financial Markets Association. Senate Committee on Banking, Housing, and Urban Development

December 10, Statement of the Securities Industry and Financial Markets Association. Senate Committee on Banking, Housing, and Urban Development December 10, 2014 Statement of the Securities Industry and Financial Markets Association Senate Committee on Banking, Housing, and Urban Development Hearing Entitled Cybersecurity: Enhancing Coordination

More information

GEORGIA CYBERSECURITY WORKFORCE ACADEMY. NASCIO 2018 State IT Recognition Awards

GEORGIA CYBERSECURITY WORKFORCE ACADEMY. NASCIO 2018 State IT Recognition Awards GEORGIA CYBERSECURITY WORKFORCE ACADEMY NASCIO 2018 State IT Recognition Awards Title: Georgia Cybersecurity Workforce Academy Category: Cybersecurity State: Georgia Contact: Stanton Gatewood Stan.Gatewood@gta.ga.gov

More information

The Gartner Security Information and Event Management Magic Quadrant 2010: Dealing with Targeted Attacks

The Gartner Security Information and Event Management Magic Quadrant 2010: Dealing with Targeted Attacks The Gartner Security Information and Event Management Magic Quadrant 2010: Dealing with Targeted Attacks Mark Nicolett Notes accompany this presentation. Please select Notes Page view. These materials

More information

Welcome to the CyberSecure My Business Webinar Series We will begin promptly at 2pm EDT All speakers will be muted until that time

Welcome to the CyberSecure My Business Webinar Series We will begin promptly at 2pm EDT All speakers will be muted until that time TM Plan. Protect. Respond. Welcome to the CyberSecure My Business Webinar Series We will begin promptly at 2pm EDT All speakers will be muted until that time Registration is open for the April webinar:

More information

Pedal to the Metal: Mitigating New Threats Faster with Rapid Intel and Automation

Pedal to the Metal: Mitigating New Threats Faster with Rapid Intel and Automation Pedal to the Metal: Mitigating New Threats Faster with Rapid Intel and Automation Date: November 14, 2016 Underwritten by: Introduction Agencies deal with a greater volume and velocity of cyber threats

More information

Mobile Security and Public Networks

Mobile Security and Public Networks Mobile Security and Public Networks Victor Johnston, Future Leaders Executive Council June 7, 2016 RECORDING HERE: http://bit.ly/29t0bq7 Teleconference Settings This call is being recorded To see the slides,

More information

raining Meeting your training needs and CPE requirements opportunities July-September Group-Live Course Group Internet- Based Course

raining Meeting your training needs and CPE requirements opportunities July-September Group-Live Course Group Internet- Based Course Meeting your training needs and CPE requirements T raining opportunities July-September 2015 Group-Live Course Group Internet- Based Course To learn more or register for any of these events, visit www.gfoa.org

More information

building for my Future 2013 Certification

building for my Future 2013 Certification I am building for my Future 2013 Certification Let ISACA help you open new doors of opportunity With more complex IT challenges arising, enterprises demand qualified professionals with proven knowledge

More information

ISACA MANILA CHAPTER CALENDAR OF ACTIVITIES

ISACA MANILA CHAPTER CALENDAR OF ACTIVITIES MANILA CHAPTER 2017 CALENDAR OF ACTIVITIES 2017 MANILA CALENDAR OF ACTIVITIES GMM Professionals Night Public Trainings Reviews Conferences Technical Session & MANILA PROFILE HISTORY AND MISSION Who we

More information

Security Asia The biggest breaches and cyber-attacks of 2017, and what threats to expect in 2018

Security Asia The biggest breaches and cyber-attacks of 2017, and what threats to expect in 2018 Looking Back 2017 2018 Looking Ahead IT industry leaders, experts and analysts share their insights and opinions as they look back at key developments in 2017, as well as technology and market trends they

More information

Today s cyber threat landscape is evolving at a rate that is extremely aggressive,

Today s cyber threat landscape is evolving at a rate that is extremely aggressive, Preparing for a Bad Day The importance of public-private partnerships in keeping our institutions safe and secure Thomas J. Harrington Today s cyber threat landscape is evolving at a rate that is extremely

More information

Introducing the IBM i integrated Web services server for RPG

Introducing the IBM i integrated Web services server for RPG Date: Wednesday, June 24, 2009. Time: Location: 5:30 (Deli snack) 6:00 (Meeting) IBM-Southfield 18000 West Nine Mile Road Southfield, MI 48075 -or- Your Computer with Internet Access ---- WEBINAR Check

More information

Moving Your Business Forward

Moving Your Business Forward Moving Your Business Forward D.C. METRO AREA JUNE 3 The Ritz-Carlton Tysons Corner NEW YORK CITY SEPTEMBER 18 Millennium Broadway Hotel BOSTON OCTOBER 9 Boston Marriott Cambridge OFFICIAL MEDIA PARTNER

More information

Emerging Technologies The risks they pose to your organisations

Emerging Technologies The risks they pose to your organisations Emerging Technologies The risks they pose to your organisations 10 June 2016 Digital trends are fundamentally changing the way that customers behave and companies operate Mobile Connecting people and things

More information

PULLING OUR SOCS UP VODAFONE GROUP AT RSAC Emma Smith. Andy Talbot. Group Technology Security Director Vodafone Group Plc

PULLING OUR SOCS UP VODAFONE GROUP AT RSAC Emma Smith. Andy Talbot. Group Technology Security Director Vodafone Group Plc #RSAC SESSION ID: AIR-R04 PULLING OUR SOCS UP VODAFONE GROUP AT RSAC 2018 Emma Smith Group Technology Security Director Vodafone Group Plc Andy Talbot Global Head of Cyber Defence Vodafone Group Plc Pulling

More information

FUNDAMENTALS OF CYBER SECURITY FOR UTILITIES

FUNDAMENTALS OF CYBER SECURITY FOR UTILITIES COURSE FUNDAMENTALS OF CYBER SECURITY FOR UTILITIES November 13-14, 2018 EUCI Conference Center Denver, CO Furthered my learning regarding cyber security initiatives. Director, CPS Energy RELATED EVENT:

More information

raining Meeting your training needs and CPE requirements opportunities October-December 2017 #GFOA Group-Live Course

raining Meeting your training needs and CPE requirements opportunities October-December 2017 #GFOA  Group-Live Course Meeting your training needs and CPE requirements T raining opportunities October-December 2017 #GFOA Group-Live Course Group Internet- Based Course To learn more or register for any of these events, visit

More information

2013 ISACA New Delhi Chapter All Rights Reserved

2013 ISACA New Delhi Chapter All Rights Reserved Mr. Rajendra Kathal President Invitation for Continuing Professional Education Session On May 25, 2013 (Saturday) from 04:30 pm to 06:30 pm Venue: Seminar Hall No. 1, USI Building Rao Tula Ram Marg, New

More information

Opportunities to Integrate Technology Into the Classroom. Presented by:

Opportunities to Integrate Technology Into the Classroom. Presented by: Opportunities to Integrate Technology Into the Classroom Presented by: Mark Salamasick, CIA, CISA, CRMA, CSP Executive Director of Audit University of Texas System Discussion Topics Internal Audit Textbook

More information

IDC FutureScape: Worldwide Security Products and Services 2017 Predictions

IDC FutureScape: Worldwide Security Products and Services 2017 Predictions IDC FutureScape: Worldwide Security Products and Services 2017 Predictions Sean Pike, Program Vice President, Robert Ayoub, Research Director IDC Web Conference December, 7, 2016 Logistics Submit any questions

More information

Training Opportunities

Training Opportunities July September 2014 Training Opportunities Meeting Your Training Needs and CPE Requirements Group-Live Course Group Internet-Based Course To learn more or register for any of these events, visit www.gfoa.org.

More information

Storage Networking Industry Association Michael Oros Executive Director. Learn more:

Storage Networking Industry Association Michael Oros Executive Director. Learn more: Storage Networking Industry Association Michael Oros Executive Director Learn more: www.snia.org @SNIA SNIA Vision and Mission Vision Statement Be the globally recognized and trusted authority for storage

More information

New York Cybersecurity. New York Cybersecurity. Requirements for Financial Services Companies (23NYCRR 500) Solution Brief

New York Cybersecurity. New York Cybersecurity. Requirements for Financial Services Companies (23NYCRR 500) Solution Brief Publication Date: March 10, 2017 Requirements for Financial Services Companies (23NYCRR 500) Solution Brief EventTracker 8815 Centre Park Drive, Columbia MD 21045 About EventTracker EventTracker s advanced

More information

PARTNERSHIP OPPORTUNITIES THOUGHT LEADERSHIP BRANDING ENGAGEMENT

PARTNERSHIP OPPORTUNITIES THOUGHT LEADERSHIP BRANDING ENGAGEMENT PARTNERSHIP OPPORTUNITIES THOUGHT LEADERSHIP BRANDING ENGAGEMENT SIGNATURE EVENTS Performance and Capacity Hackathon Winter, Seattle At this hackathon event, participants will be challenged to utilize

More information

2nd National MBE Manufacturers Summit 2017

2nd National MBE Manufacturers Summit 2017 Global Manufacturing Community 2nd National MBE Manufacturers Summit 2017 August 15-16, 2017 Corporate Sponsorship Global Manufacturing Community Providing Opportunities for MBE Manufacturers Nationally

More information

National Cyber Security and Cyber Terrorism Summit

National Cyber Security and Cyber Terrorism Summit Ottawa Ontario November 12-13 2014 National Cyber Security and Cyber Terrorism Summit SUPPORTERS Developing a Roadmap to Address the Pervasive Growth of Cyber Crime SUPPORTER RATE CARD Background The growing

More information

Todd Sander Vice President, Research e.republic Inc.

Todd Sander Vice President, Research e.republic Inc. Todd Sander Vice President, Research e.republic Inc. Tsander@erepublic.com Report Background Respondent Type Breakdown Received responses from 74 state elected and appointed officials and 29 staff members

More information

EARN UP TO 18 CPE CREDITS

EARN UP TO 18 CPE CREDITS Join Us in Nashville, TN, USA 370 Stay at the Heart of the Conference Action! The Omni Nashville 250 5th Avenue South Nashville, TN 37203, USA Hotel Reservations: 615-782-5300 2018 Governance, Risk, and

More information

Cybersecurity Auditing in an Unsecure World

Cybersecurity Auditing in an Unsecure World About This Course Cybersecurity Auditing in an Unsecure World Course Description $5.4 million that s the average cost of a data breach to a U.S.-based company. It s no surprise, then, that cybersecurity

More information

2015 VORMETRIC INSIDER THREAT REPORT

2015 VORMETRIC INSIDER THREAT REPORT Research Conducted by Research Analyzed by 2015 VORMETRIC INSIDER THREAT REPORT Trends and Future Directions in Data Security GLOBAL EDITION #2015InsiderThreat EXECUTIVE PERSPECTIVE 1 INSIDER THREATS:

More information

Bringing Cybersecurity to the Boardroom Bret Arsenault

Bringing Cybersecurity to the Boardroom Bret Arsenault SESSION ID: CXO-T11 Bringing Cybersecurity to the Boardroom Bret Arsenault Corporate Vice President & CISO Microsoft Security has Transcended from to a an 3 How Microsoft Approaches Security Reinventproductivity

More information

Security analytics: From data to action Visual and analytical approaches to detecting modern adversaries

Security analytics: From data to action Visual and analytical approaches to detecting modern adversaries Security analytics: From data to action Visual and analytical approaches to detecting modern adversaries Chris Calvert, CISSP, CISM Director of Solutions Innovation Copyright 2013 Hewlett-Packard Development

More information

ITU Telecom World 2017 Smart ABC

ITU Telecom World 2017 Smart ABC ITU Telecom World 2017 Smart ABC Artificial Intelligence Banking Cities Organized by ITU-T 1 Smart ITU Smart is the future: in all industry sectors, in all societies, in the way we live, work and do business.

More information

19-20 September 2018 The Trans Resort Kuta, Bali - Indonesia

19-20 September 2018 The Trans Resort Kuta, Bali - Indonesia 19-20 September 2018 The Trans Resort Kuta, Bali - Indonesia Strengthening Multi-Stakeholder Coordination and Improving ICT Sector-Wide Resilience in Preparation for Cyber Disruptions CIIP-ID Summit 2018

More information

We would like to announce to you a number of upcoming changes to the Certified Internal Auditor Exam:

We would like to announce to you a number of upcoming changes to the Certified Internal Auditor Exam: Dear Institute Leaders, We would like to announce to you a number of upcoming changes to the Certified Internal Auditor Exam: 1. As the result of findings from a Job Analysis Study (JAS) for the Certified

More information

Cyber Security Congress 2017

Cyber Security Congress 2017 Cyber Security Congress 2017 A rich agenda covering both technical and management matters with targeted presentations and hands on workshops. Day 1 Conference Morning Session 8.30 9.00 Registration & Coffee

More information

Sales Presentation Case 2018 Dell EMC

Sales Presentation Case 2018 Dell EMC Sales Presentation Case 2018 Dell EMC Introduction: As a member of the Dell Technologies unique family of businesses, Dell EMC serves a key role in providing the essential infrastructure for organizations

More information

ISACA MOSCOW CHAPTER Chapter meeting 22 September 2016

ISACA MOSCOW CHAPTER Chapter meeting 22 September 2016 ISACA MOSCOW CHAPTER Chapter meeting 22 September 2016 Introduction Special guest speaker ISACA Audit committee member, Rosemary Amato Open dialog Wrap-up and close Special guest speaker CISA, CMA, CPA,

More information

Supply Chain Integrity and Security Assurance for ICT. Mats Nilsson

Supply Chain Integrity and Security Assurance for ICT. Mats Nilsson Supply Chain Integrity and Security Assurance for ICT Mats Nilsson The starting point 2 B Internet users 85% Population coverage 5+ B Mobile subscriptions 10 years of Daily upload E-Books surpassing Print

More information

Tim Kubu, CIA, CISA WMISACA President

Tim Kubu, CIA, CISA WMISACA President Board Members Tim Kubu - President president@wmisaca.org Cassandra Chasnis Vice President vice.president@wmisaca.org Dan Norberg Secretary secretary@wmisaca.org Brent Moeggenborg Treasurer treasurer@wmisaca.org

More information

INFORMATION. October Radisson Blu Hotel Abidjan PRESS RELEASE.

INFORMATION. October Radisson Blu Hotel Abidjan PRESS RELEASE. INFORMATION GENERALE October 10-11-12 Radisson Blu Hotel Abidjan PRESS RELEASE www.africacybersecurityconferencecom Copyright Africa Cyber Security Conference (ACSC) is JIGHI trademark registered 2016-2017

More information

What Does the Future Look Like for Business Continuity Professionals?

What Does the Future Look Like for Business Continuity Professionals? What Does the Future Look Like for Business Continuity Professionals? October 26, 2016 Brian Zawada, FBCI President, US Chapter of the Business Continuity Institute Agenda and Objectives Change Standards

More information

Department of Homeland Security Updates

Department of Homeland Security Updates American Association of State Highway and Transportation Officials Special Committee on Transportation Security and Emergency Management 2016 Critical Infrastructure Committee Joint Annual Meeting Department

More information

Cybersecurity Guidance for Small Firms Thursday, November 8 9:00 a.m. 10:00 a.m.

Cybersecurity Guidance for Small Firms Thursday, November 8 9:00 a.m. 10:00 a.m. Cybersecurity Guidance for Small Firms Thursday, November 8 9:00 a.m. 10:00 a.m. It is crucial that small financial firms take proper cybersecurity measures to protect their customers and their firm. During

More information