Phoenix ISSA Newsletter Q3 2013
|
|
- Muriel Floyd
- 5 years ago
- Views:
Transcription
1 Phoenix ISSA Newsletter Q Q President s Message 2013 is half over and Phoenix ISSA has enjoyed some great meetings with more to come. Our Q3 meeting was our best attended meeting of the year. We had four great presentations, give-aways from the chapter and sponsors and we even raffled off two trips to the 2013 ISSA International Conference in Nashville, Tennessee. Thanks to all who organized and presented. These are the type of quality meetings Phoenix ISSA strives to deliver. We hope the variety, professionalism, and new perspectives shared at our meetings make your jobs a little easier. We have three upcoming events that you will want to mark on your calendars and attend: ISSA-Infragard joint meeting - The joint event will feature three speakers on the connection between Cyber-Security and National Security. (3 CPEs) September 19, 1:30-4:30pm at the AZ Dept of Emergency Management's Russell Auditorium (5636 E McDowell Road, Phoenix, Arizona 85008). Free to members Q4 Chapter meeting - theme is Act (4 CPEs) October 9, 11:30-5:00 at ITT Tech (5005 S Wendler Dr, Tempe, AZ 85282). Sponsors include FishNet, eplus Security, Websense and ITT Tech. Free to members Inside this issue President s Message Cont Q3 Meeting...2 Security Trivia...2 Q3 Meeting Continued Schola rships...3 Security Trivia Answers...4 Upcoming Events...4 Phoenix ISSA Conta cts Phoenix Security a nd Audit Conference..5 Goals a nd Objectives...6 Sponsors...6 Websites Phoenix ISSA Website
2 Q President s Message Continued 2013 Phx Security and Audit Conference (#PhxSAC) - joint conference with Phx ISACA and IAA (7 CPEs) October 22, 8:00-5:00 at Desert Willow Conference Center (4340 E Cotton Center blvd, Phoenix, Az ) $40 members, $100 non-members (until Aug 31) 7 Tracks: Soft Skills, IT Audit, Mobile Technologies, Hackers & Threats, Hot Topics, Securing the End User, Risk Management 2 Keynotes, CISO Rountable, LiveFire Range We hope you can join us. Thank you for participating and helping us grow the information security community. Regards, Aaron Computer Security President, Phoenix ISSA 1. Which of the popular operating systems is virtually most secure? 2. Which type of attack do hackers use to gain information from you without the use of specialized computer programs? 3. Which service was originally designed for network administrators to work remotely on different computers in their network but is now mostly used by malicious hackers? Q3 Meeting was about Security Detection Presentations: Evolution of Wire Fraud Mike Kirby II Director of Security Services at Fidelity Information Services (FIS) Abstract: Whether we know it or not, malicious software has changed our world. It has impacted us personally, within the organizations we work for, our financial institutions, and even our laws. I will discuss recent events that have shaped the changes in the banking industry and how they impact us as security professionals and consumers. 2
3 Q3 Meeting Continued Using Log Correlation to Detect Network Security Incidents Bert Hayes, Solutions Engineer at Splunk Abstract: There are a handful of infrastructure logs that are considered the absolute bare minimum to monitor for signs of network security incidents. I'll describe what these resources are and how log correlation can detect compromised systems. I'll identify additional logs that can then be used after an incident to conduct a more thorough investigation Phoenix ISSA Scholarships The scholarships have been decided upon by the board and will be awarded at the next quarterly meeting. Implementation of a Log Correlation Tool Vauda Jordan, Lead Security Engineer at the City of Phoenix Abstract: There is no doubt the benefit of a log correlation tool, and more and more organizations are making the move to purchase such a tool, but what does it take to implement? Just like the Curious Case of Benjamin Button, a log correlation tool starts out as a sluggish, slow start to gather all of the information and implement. And in the end, it still needs the care and feeding of a newborn baby. This is reality when implementing a log correlation tool in a fast paced and rapidly changing organization. The tool must be implemented and integrated into the organization s infrastructure and processes, and constant change to infrastructure and processes require constant changes to the tool. Over the past 3 years, the City of Phoenix implemented such a tool I ll present the good, the bad, and the ugly of the implementation. Compliance Mandates, Insider Threats, and the Need for Secure Audit Stephen Helm, Product Marketing Specialist at Safenet, Inc. Abstract: Breaches are rampant and more frequent than ever before. Threats come from both inside and outside the organization. Organizations need to assume that attackers can circumvent their perimeter defenses, and take steps to protect their data assets in the event of a breach. However, the job is not done. The threat of insider attacks poses another challenge to security. High integrity audit logs, which provide a clear view into who did what, when, are increasingly being required by compliance initiatives. In this session, learn how secure audit logging can be used to mitigate the threat of insider attacks, and support the larger goal of Securing the Breach. 3
4 Trivia Answers 1. Linux. OS security is a very important aspect to think about when purchasing your computer. Today, many computers, that are not specially designed, are shipped with Windows 8 or Windows 7, although it is highly recommended that users switch to Linux systems. This is because these systems are not only more affordable (many of them are completely free), but there are only a limited number of viruses written for these systems, so the risk of you getting a virus while using a Linux system is definitely lower than if you were using a Windows computer. 2. Social Engineering. Yes, it is possible for skilled hackers to gain important information from you without using specially programmed software. This type of attack is called Social Engineering, and it is basically a situation in which the hacker tries to gain your trust and then uses that trust against you. 3. Telnet. Telnet is a specialized service which was originally used by network administrators, although these days, there are many other uses for it, such as connecting to a web-server and spoofing (providing fake) information about yourself. Upcoming Events ISSA Quarterly Meeting Theme: Act Tuesday October 8, :30 AM 5:00PM ITT Technical Institute, Tempe, AZ SDSUG Sonoran Desert Security User Group August 14, :45 AM 4:15 PM University of Advancing Technology (UAT), Tempe, AZ ISSA Web Conference: Mobile App Security Issues Tuesday, August 27, :00 AM 11:00 AM ISSA-Infragard Joint Meeting: Cyber-Security meets National Security Thursday, September 19, :30 PM 4:30 PM Russell Auditorium, Arizona Division of Emergency Management 5636 E McDowell Road, Phoenix, Arizona More details to come on the website. ISSA Web Conference: Big Data Tuesday, September 24, :00 AM 11:00 AM More details to come on website. Arizona Technology Summit Wednesday, September 25, :00 AM 5:00 PM Phoenix Convention Center (South Ballroom) Details & registration at Register using ISSA without the quotes Phoenix Security and Audit Conference Tuesday, October 22, :00 AM 4:30 PM Desert Will Conference Center, 4340 E Cotton center, Phoenix AZ Details and registration: 4
5 2013 Phoenix Security and Audit Conference This year's conference will be bigger, better, and more flavorful. ISSA, ISACA, and IIA are partnering as hosts (yes, we're covering the entire Security & Audit worlds), pulling from a total membership count of over 1,600. We're hosting seven or more professional tracks and expecting 350 attendees, over 100 from our 2012 conference. Preliminarily the tracks are: Soft Skills IT Audit Mobile Technologies Hackers & Threats Hot Topics Securing the End User Risk Management It's technical and it's high-level. It's packed with everything you need to know about the latest security risks impacting organizations and how to prepare and audit. You will take away practical implementation guidance and lessons learned from top-notch presenters and regulators. And the networking is unmatched. Phoenix ISSA Contacts President Aaron S. Carpenter Vice-President Rich Larkins Secretary Ilene Klein Treasurer Dee Ramon Sponsorship Director Kathy Doolittle Program Director Anne-Marie Olson (AMO) Communications Director Pat Wilson Membership Director Kurt Schmeckpeper 5 Web Director Jenner Holden
6 Phoenix ISSA Mission Statement The mission of the Phoenix ISSA Chapter is to provide a forum for the education of information security to its members through presentations and open discussions on topics important to the members and the information security industry. Phoenix ISSA Goals and Objectives The goals and objectives of the Phoenix ISSA Chapter are to: Offer products and services that deliver value to members (website, newsletter) Enhance its members professional growth Maintain the ability to provide expert and high-quality speakers at chapter meeting Support the enhancement of the credence and legitimacy of the information security profession Support ISSA s objective to establish itself as the leadership voice of the profession Increase Membership Encourage local information security professionals to attend chapter meetings and join ISSA Encourage existing members to spread the word about ISSA Develop correspondence to recruit new members and sustain existing members Conduct membership drives Continually identify ways to improve the Phoenix ISSA Chapter initiatives Support ISSA s endorsement of the CISSP Establish relationships with similar associations in Phoenix Conduct annual survey to identify the ongoing interests and needs of the members and the industry Make effective use of funds through budgeting Provide the foundation for an ongoing chapter for many years to come THANKS TO OUR SPONSORS FOR THE THIRD QUARTER OF 2013
CYBER FRAUD & DATA BREACHES 16 CPE s May 16-17, 2018
CYBER FRAUD & DATA BREACHES 16 CPE s May 16-17, 2018 Cyber fraud attacks happen; they can t all be stopped. The higher order question must be how can we, as fraud examiners and assurance professionals,
More informationVolume 2014, Number 4. Volunteers Needed!
Volume 2014, Number 4 Volunteers Needed! Volunteering for NJ ISACA is a great opportunity to expand your professional contacts and your IT knowledge base. NJ ISACA needs talented professionals like you
More informationBENEFITS of MEMBERSHIP FOR YOUR INSTITUTION
PROFILE The Fiduciary and Investment Risk Management Association, Inc. (FIRMA ) is the leading provider of fiduciary and investment risk management education and networking to the fiduciary and investment
More informationMemphis Chapter. President s Message. This annual event is designed to provide students with a
Memphis Chapter F E B R U A R Y 2 0 1 5 Remember: Update your IIA profile for the most up-to-date news. RSVP for the Annual Student Day February 24, 2015 This annual event is designed to provide students
More informationSecurity Program Design:
Security Program Design: A Critical Infrastructure Protection Model Experience, Dedication, and Leadership July 17-18, 2013 Toronto, Ontario CAN in Security EDUCATION Earn up to 16 CPEs Are you confident
More informationPONEMON INSTITUTE RESEARCH REPORT 2018 STUDY ON GLOBAL MEGATRENDS IN CYBERSECURITY
PONEMON INSTITUTE RESEARCH REPORT 2018 STUDY ON GLOBAL MEGATRENDS IN CYBERSECURITY Benchmark research sponsored by Raytheon. Independently conducted by Ponemon Institute LLC. February 2018 2018 Study on
More informationConfronting the Threat. Wednesday, August 8, 2006, 2-3:15 PM Debbie Christofferson, CISSP, CISM Sapphire-Security Services LLC
Confronting the Threat Inside the Castle Walls Wednesday, August 8, 2006, 2-3:15 PM Debbie Christofferson, CISSP, CISM Sapphire-Security Services LLC 1 Debbie Christofferson, CISSP, CISM Sapphire-Security
More informationBECOME TOMORROW S LEADER, TODAY. SEE WHAT S NEXT, NOW
BECOME TOMORROW S LEADER, TODAY. SEE WHAT S NEXT, NOW BECOME AN ISACA MEMBER TODAY. Nearing its 50th year, ISACA is a global association helping individuals and enterprises achieve the positive potential
More information2018 CALENDAR OF ACTIVITIES
2018 CALENDAR OF ACTIVITIES WHO WE ARE AND WHAT WE OFFER Ý Public Trainings Technical Sessions Reviews GMM Other Chapter Activities Conferences Professionals Night ISACA was incorporated by individuals
More informationCYBERSECURITY HOW IT IS TRANSFORMING THE IT ASSURANCE FIELD
CYBERSECURITY HOW IT IS TRANSFORMING THE IT ASSURANCE FIELD December 2014 KEVIN GROOM ISACA Involvement (Middle Tennessee Chapter) Treasurer (2009 2011) Vice President (2011 2013) President (2013 present)
More informationGlobal Security Exchange (GSX) 2019
Global Security Exchange (GSX) 2019 InfraGard is a partnership between the FBI and the private sector. It is an association of persons who represent businesses, academic institutions, organizations, state
More informationLes joies et les peines de la transformation numérique
Les joies et les peines de la transformation numérique Georges Ataya CISA, CGEIT, CISA, CISSP, MSCS, PBA Professor, Solvay Brussels School of Economics and Management Academic Director, IT Management Education
More information2016 SPONSORSHIP OPPORTUNITIES
14 TH ANNUAL ARCHITECTING ENTERPRISE TRANSFORMATION SEPTEMBER 21, 2016 RENAISSANCE WASHINGTON DC DOWNTOWN HOTEL 2016 SPONSORSHIP OPPORTUNITIES One-On-One Access to Government s Enterprise Architects EDUCATION
More informationFacing Up to the Challenges
Information Security, Data Breaches and Protecting Cardholder Information: Facing Up to the Challenges SEPTEMBER 13-14, 2006 Account Number PIN Number Social Security Number Social Security Number Information
More informationNortheast Ohio Chapter Annual General Meeting
Northeast Ohio Chapter Annual General Meeting May 21, 2015 For professionals and organizations be the leading global provider of knowledge, certifications, community, advocacy and education on information
More informationCheckpoint Learning Premier Plus CPE Package
Checkpoint Learning Premier Plus CPE Package More learning options for a single low annual price. 2 Premier Plus CPE Package Checkpoint Learning Premier Plus CPE Package The Checkpoint Learning Premier
More informationE-guide CISSP Prep: 4 Steps to Achieve Your Certification
CISSP Prep: 4 Steps to Achieve Your Certification Practice for the exam and keep your skills sharp : Thank you for downloading our CISSP certification guide. Aside from this handy PDF, you can also access
More informationBREAKING BARRIERS TO COLLABORATE WITH THE C-SUITE
BREAKING BARRIERS TO COLLABORATE WITH THE C-SUITE 31st Annual SoCal ISSA Security Symposium Wendy T. Wu Vice President Agenda + CISO: Then and Now + Who are the Stakeholders and What Do They Care About?
More informationKeynotes. Mobile Version Subscribe Contact Us About Us Advertising Editorial SC UK SC Aus/NZ
Page 1 of 5 Mobile Version Subscribe Contact Us About Us Advertising Editorial SC UK SC Aus/NZ Search Home News Features Opinions Congress News & Opinions Products Sectors News Bytes Canada News Newsletters
More informationACAMS (Association of Certified AML Specialist)
ACAMS (Association of Certified AML Specialist) Founded in 2001 Largest international membership organisation dedicated to enhancing the knowledge, skills and expertise of AML/CTF and financial crime detection
More informationCybersecurity Risk Mitigation: Protect Your Member Data. Introduction
Cybersecurity Risk Mitigation: Protect Your Member Data Presented by Matt Mitchell, CISSP Knowledge Consulting Group Introduction Matt Mitchell- Director Risk Assurance 17 years information security experience
More informationState of Security Operations
State of Security Operations Roberto Sandoval / September 2014 Security Intelligence & Operations Consulting Founded: 2007 The best in the world at building state of the art security operations capabilities/cyber
More informationSAP Controls & Best Practices
To make sure you receive future emails,please add InfoNet@njisaca.org to your address book or safe list. Monthly Newsletter Published by ISACA NJ Chapter Volume 2013, Number 3 SAP Controls & Best Practices
More informationSPONSORSHIP OPPORTUNITIES JULY 25-26, 2018 SANTIAGO, CHILE #ISC2CONGRESSLATAM LATAMCONGRESS.ISC2.ORG
SPONSORSHIP OPPORTUNITIES JULY 25-26, 2018 SANTIAGO, CHILE #ISC2CONGRESSLATAM LATAMCONGRESS.ISC2.ORG THE WORLD S LEADING CYBERSECURITY AND IT SECURITY PROFESSIONAL ORGANIZATION How to face the immense
More informationHYDERABAD CHAPTER OF ISACA FIFTEENTH ANNUAL REPORT
Dear Members, It is my privilege and honor to present the 15 th Annual Report of the Hyderabad for the year. 1. FINANCIAL RESULTS Rs.in lakhs Particulars 2013 14 Income 9.84 8.96 Surplus 2.31 2.56 Investments(Bank
More informationA-LIST 2016 Event Sponsorship Form
A-LIST 2016 Event Sponsorship Form Event Atlanta Local InfraGard Security Training (A-LIST) event Date February 10, 2016 Location Purchase and sponsorship contribution levels Kennesaw Center, Kennesaw
More informationNEWS ISSUE # 26
PRESIDENT S MESSAGE Dear Members, Time really flies and soon 2012 will be over and we will be welcoming the New Year 2013. ISACA Malaysia Chapter has kick started the year end celebration by having the
More informationHow NSFOCUS Protected the G20 Summit. Guy Rosefelt on the Strategy, Staff and Tools Needed to Ensure Cybersecurity
How NSFOCUS Protected the G20 Summit Guy Rosefelt on the Strategy, Staff and Tools Needed to Ensure Cybersecurity SPONSORED BY Rosefelt is responsible for developing NSFOCUS threat intelligence and web
More informationTable of Contents. Preface xvii PART ONE: FOUNDATIONS OF MODERN INTERNAL AUDITING
Table of Contents Preface xvii PART ONE: FOUNDATIONS OF MODERN INTERNAL AUDITING Chapter 1: Significance of Internal Auditing in Enterprises Today: An Update 3 1.1 Internal Auditing History and Background
More informationIT Security Mandatory Solutions. Andris Soroka 2nd of July, RIGA
IT Security Mandatory Solutions Andris Soroka 2nd of July, 2014 @LPS, RIGA Data Security Solutions business card Specialization IT Security IT Security services (consulting, audit, pen-testing, market
More informationStrategic Plan for years Updated - 8/9/14 Review & re-approved
The Mid-Florida Chapter of APICS will continue to utilize a Continuous Improvement concept, along with the C-BAR as tools to better manage the chapter. Vision: Mission: Mid-Florida Chapter of APICS will
More informationWhy Should I become a Member?
KC PMI Mid-America Chapter Welcome to the Kansas City PMI Mid-America Chapter Information Session Why Should I become a Member? KC PMI Mid-America Chapter Event Agenda 2:00 pm - 2:15 pm Ice Breaker/Networking
More informationClarity on Cyber Security. Media conference 29 May 2018
Clarity on Cyber Security Media conference 29 May 2018 Why this study? 2 Methodology Methodology of the study Online survey consisting of 33 questions 60 participants from C-Level (CISOs, CIOs, CTOs) 26
More informationTOMORROW. TOGETHER Governance, Risk, and Control Conference. August 19-21, Phoenix, Arizona. An IIA & ISACA Collaboration
TOMORROW. TOGETHER. 2013 Governance, Risk, and Control Conference An IIA & ISACA Collaboration Join two highly respected associations at one world-class event August 19-21, 2013 Phoenix, Arizona Reserve
More informationCould the BIGGEST Threat to Your Business be INSIDE Your Company?
Could the BIGGEST Threat to Your Business be INSIDE Your Company? Presented By: Cheryl W. Snead, Banneker Industries, Inc. Rick Avery, Securitas Security Inc. Cheryl W. Snead President/CEO/Facility Security
More informationIBM Security Systems. IBM X-Force 2012 & CISO Survey. Cyber Security Threat Landscape IBM Corporation IBM Corporation
IBM X-Force 2012 & CISO Survey Cyber Security Threat Landscape 1 2012 IBM Corporation IBM X-Force 2011 Trend and Risk Report Highlights The mission of the IBM X-Force research and development team is to:
More informationThe Evolving Threat to Corporate Cyber & Data Security
The Evolving Threat to Corporate Cyber & Data Security Presented by: Sara English, CIPP/US Sara.English@KutakRock.com 1 http://blogs.wsj.com/law/2015/12/09/employee error leading cause of data breaches
More informationEnhancing the Cybersecurity of Federal Information and Assets through CSIP
TECH BRIEF How BeyondTrust Helps Government Agencies Address Privileged Access Management to Improve Security Contents Introduction... 2 Achieving CSIP Objectives... 2 Steps to improve protection... 3
More informationIIA Academy YOUR PARTNER IN PROFESSIONAL DEVELOPMENT
www.iia.org.sg IIA Academy YOUR PARTNER IN PROFESSIONAL DEVELOPMENT IIA Academy Professional Development To support you in your career progression as an internal auditor, we have adopted the IIA Global
More informationSANS Vendor Offerings Detail
SANS Vendor Offerings Detail After working with SANS for a few years now, the audience at SANS events and webinars continues to represent some of the most forward thinking IT security practitioners looking
More informationWebinars INSPIRING A SAFE AND SECURE CYBER WORLD Media Kit - North America
Webinars INSPIRING A SAFE AND SECURE CYBER WORLD 2018 Media Kit - North America 1 THE (ISC) 2 SECURE WEBINARS (ISC) 2 Secure Webinars are a proven method of reaching high-level IT security executives in
More informationMonthly Meeting September 28, 2016
Monthly Meeting September 28, 2016 Agenda / Announcements Welcome to Parsons, 7110 Samuel Morse Drive, Suite 200 Columbia, Maryland 21046 Non-U.S. Citizen Requirements Any guests or new members in attendance?
More informationManaging Cyber Risk. Robert Entin Executive Vice President Chief Information Officer Vornado Realty Trust
Managing Cyber Risk Robert Entin Executive Vice President Chief Information Officer Vornado Realty Trust Adam Thomas Principal Cyber Risk Services Deloitte & Touche LLP Give Us Your Feedback for this Session!
More informationLetter from the President
Letter from the President Dear Valued Advantage Customer, Every day we have many exciting activities going on at ECi Advantage that contribute to the betterment of our products and services and benefit
More informationExperience Security, Risk, and Governance
Experience Security, Risk, and Governance Agenda and recommended event path 26 28 March Vienna, Austria Contents 3 Welcome 4 Overview 5 Evening Programs 6 Sessions at-a-glance 11 Digital Transformation
More informationWEBINARS INSPIRING A SAFE AND SECURE CYBER WORLD Media Kit - North America
INSPIRING A SAFE AND SECURE CYBER WORLD 2019 Media Kit - North America THE (ISC) 2 (ISC) 2 Webinars are a proven method of reaching high-level IT security executives in an intimate setting. Members advance
More informationEVENT BROCHURE SECURITY WORLD APRIL 2017 MELIA HANOI HOTEL HOSTED BY ORGANIZED BY SUPPORTED BY.
EVENT BROCHURE www.security.org.vn SECURITY WORLD 2017 4 APRIL 2017 MELIA HANOI HOTEL HOSTED BY ORGANIZED BY SUPPORTED BY Ministry of Public Security Authority of Cyber Security - MPS Authority of Information
More informationUNCLASSIFIED. National and Cyber Security Branch. Presentation for Gridseccon. Quebec City, October 18-21
National and Cyber Security Branch Presentation for Gridseccon Quebec City, October 18-21 1 Public Safety Canada Departmental Structure 2 National and Cyber Security Branch National and Cyber Security
More informationEMPOWER PEOPLE IMPROVE LIVES INSPIRE SUCCESS
Information Technology Shared Service Team North Dakota Cyber Security Across North Dakota Threats and Opportunities 15 September 2018 EMPOWER PEOPLE IMPROVE LIVES INSPIRE SUCCESS AGENDA SIRN / FirstNet
More informationSecurity Program Design:
Security Program Design: A Critical Infrastructure Protection Model July 16 17, 2014 Earn up to 16 CPEs EXPERIE NCE, DED IC ON AT I D, AN LEA DE RS HIP IN SE R CU ITY E C DU AT IO N Are you confident in
More information10 Cybersecurity Questions for Bank CEOs and the Board of Directors
4 th Annual UBA Bank Executive Winter Conference February, 2015 10 Cybersecurity Questions for Bank CEOs and the Board of Directors Dr. Kevin Streff Founder, Secure Banking Solutions 1 Board of Directors
More informationSymantec Security Monitoring Services
24x7 real-time security monitoring and protection Protect corporate assets from malicious global threat activity before it impacts your network. Partnering with Symantec skilled and experienced analysts
More informationForeScout Extended Module for Splunk
Enterprise Strategy Group Getting to the bigger truth. ESG Lab Review ForeScout Extended Module for Splunk Date: May 2017 Author: Tony Palmer, Senior Lab Analyst Abstract This report provides a first look
More informationWill you be PCI DSS Compliant by September 2010?
Will you be PCI DSS Compliant by September 2010? Michael D Sa, Visa Canada Presentation to OWASP Toronto Chapter Toronto, ON 19 August 2009 Security Environment As PCI DSS compliance rates rise, new compromise
More informationSALARY $ $72.54 Hourly $3, $5, Biweekly $8, $12, Monthly $103, $150, Annually
SALARY $49.72 - $72.54 Hourly $3,977.88 - $5,803.27 Biweekly $8,618.75 - $12,573.75 Monthly $103,425.00 - $150,885.00 Annually ISSUE DATE: 03/21/18 THE POSITION DIRECTOR OF CYBER SECURITY OPEN TO THE PUBLIC
More informationFERC Audits and Compliance Conference March 3, 2015 Spectra Energy Corporation Fred Fowler Auditorium 5400 Westheimer Court Houston, Texas
FERC Audits and Compliance Conference March 3, 2015 Spectra Energy Corporation Fred Fowler Auditorium 5400 Westheimer Court Houston, Texas Time Tuesday, March 2, 2015 8:00 AM Breakfast Included in Registration
More informationDecember 10, Statement of the Securities Industry and Financial Markets Association. Senate Committee on Banking, Housing, and Urban Development
December 10, 2014 Statement of the Securities Industry and Financial Markets Association Senate Committee on Banking, Housing, and Urban Development Hearing Entitled Cybersecurity: Enhancing Coordination
More informationGEORGIA CYBERSECURITY WORKFORCE ACADEMY. NASCIO 2018 State IT Recognition Awards
GEORGIA CYBERSECURITY WORKFORCE ACADEMY NASCIO 2018 State IT Recognition Awards Title: Georgia Cybersecurity Workforce Academy Category: Cybersecurity State: Georgia Contact: Stanton Gatewood Stan.Gatewood@gta.ga.gov
More informationThe Gartner Security Information and Event Management Magic Quadrant 2010: Dealing with Targeted Attacks
The Gartner Security Information and Event Management Magic Quadrant 2010: Dealing with Targeted Attacks Mark Nicolett Notes accompany this presentation. Please select Notes Page view. These materials
More informationWelcome to the CyberSecure My Business Webinar Series We will begin promptly at 2pm EDT All speakers will be muted until that time
TM Plan. Protect. Respond. Welcome to the CyberSecure My Business Webinar Series We will begin promptly at 2pm EDT All speakers will be muted until that time Registration is open for the April webinar:
More informationPedal to the Metal: Mitigating New Threats Faster with Rapid Intel and Automation
Pedal to the Metal: Mitigating New Threats Faster with Rapid Intel and Automation Date: November 14, 2016 Underwritten by: Introduction Agencies deal with a greater volume and velocity of cyber threats
More informationMobile Security and Public Networks
Mobile Security and Public Networks Victor Johnston, Future Leaders Executive Council June 7, 2016 RECORDING HERE: http://bit.ly/29t0bq7 Teleconference Settings This call is being recorded To see the slides,
More informationraining Meeting your training needs and CPE requirements opportunities July-September Group-Live Course Group Internet- Based Course
Meeting your training needs and CPE requirements T raining opportunities July-September 2015 Group-Live Course Group Internet- Based Course To learn more or register for any of these events, visit www.gfoa.org
More informationbuilding for my Future 2013 Certification
I am building for my Future 2013 Certification Let ISACA help you open new doors of opportunity With more complex IT challenges arising, enterprises demand qualified professionals with proven knowledge
More informationISACA MANILA CHAPTER CALENDAR OF ACTIVITIES
MANILA CHAPTER 2017 CALENDAR OF ACTIVITIES 2017 MANILA CALENDAR OF ACTIVITIES GMM Professionals Night Public Trainings Reviews Conferences Technical Session & MANILA PROFILE HISTORY AND MISSION Who we
More informationSecurity Asia The biggest breaches and cyber-attacks of 2017, and what threats to expect in 2018
Looking Back 2017 2018 Looking Ahead IT industry leaders, experts and analysts share their insights and opinions as they look back at key developments in 2017, as well as technology and market trends they
More informationToday s cyber threat landscape is evolving at a rate that is extremely aggressive,
Preparing for a Bad Day The importance of public-private partnerships in keeping our institutions safe and secure Thomas J. Harrington Today s cyber threat landscape is evolving at a rate that is extremely
More informationIntroducing the IBM i integrated Web services server for RPG
Date: Wednesday, June 24, 2009. Time: Location: 5:30 (Deli snack) 6:00 (Meeting) IBM-Southfield 18000 West Nine Mile Road Southfield, MI 48075 -or- Your Computer with Internet Access ---- WEBINAR Check
More informationMoving Your Business Forward
Moving Your Business Forward D.C. METRO AREA JUNE 3 The Ritz-Carlton Tysons Corner NEW YORK CITY SEPTEMBER 18 Millennium Broadway Hotel BOSTON OCTOBER 9 Boston Marriott Cambridge OFFICIAL MEDIA PARTNER
More informationEmerging Technologies The risks they pose to your organisations
Emerging Technologies The risks they pose to your organisations 10 June 2016 Digital trends are fundamentally changing the way that customers behave and companies operate Mobile Connecting people and things
More informationPULLING OUR SOCS UP VODAFONE GROUP AT RSAC Emma Smith. Andy Talbot. Group Technology Security Director Vodafone Group Plc
#RSAC SESSION ID: AIR-R04 PULLING OUR SOCS UP VODAFONE GROUP AT RSAC 2018 Emma Smith Group Technology Security Director Vodafone Group Plc Andy Talbot Global Head of Cyber Defence Vodafone Group Plc Pulling
More informationFUNDAMENTALS OF CYBER SECURITY FOR UTILITIES
COURSE FUNDAMENTALS OF CYBER SECURITY FOR UTILITIES November 13-14, 2018 EUCI Conference Center Denver, CO Furthered my learning regarding cyber security initiatives. Director, CPS Energy RELATED EVENT:
More informationraining Meeting your training needs and CPE requirements opportunities October-December 2017 #GFOA Group-Live Course
Meeting your training needs and CPE requirements T raining opportunities October-December 2017 #GFOA Group-Live Course Group Internet- Based Course To learn more or register for any of these events, visit
More information2013 ISACA New Delhi Chapter All Rights Reserved
Mr. Rajendra Kathal President Invitation for Continuing Professional Education Session On May 25, 2013 (Saturday) from 04:30 pm to 06:30 pm Venue: Seminar Hall No. 1, USI Building Rao Tula Ram Marg, New
More informationOpportunities to Integrate Technology Into the Classroom. Presented by:
Opportunities to Integrate Technology Into the Classroom Presented by: Mark Salamasick, CIA, CISA, CRMA, CSP Executive Director of Audit University of Texas System Discussion Topics Internal Audit Textbook
More informationIDC FutureScape: Worldwide Security Products and Services 2017 Predictions
IDC FutureScape: Worldwide Security Products and Services 2017 Predictions Sean Pike, Program Vice President, Robert Ayoub, Research Director IDC Web Conference December, 7, 2016 Logistics Submit any questions
More informationTraining Opportunities
July September 2014 Training Opportunities Meeting Your Training Needs and CPE Requirements Group-Live Course Group Internet-Based Course To learn more or register for any of these events, visit www.gfoa.org.
More informationStorage Networking Industry Association Michael Oros Executive Director. Learn more:
Storage Networking Industry Association Michael Oros Executive Director Learn more: www.snia.org @SNIA SNIA Vision and Mission Vision Statement Be the globally recognized and trusted authority for storage
More informationNew York Cybersecurity. New York Cybersecurity. Requirements for Financial Services Companies (23NYCRR 500) Solution Brief
Publication Date: March 10, 2017 Requirements for Financial Services Companies (23NYCRR 500) Solution Brief EventTracker 8815 Centre Park Drive, Columbia MD 21045 About EventTracker EventTracker s advanced
More informationPARTNERSHIP OPPORTUNITIES THOUGHT LEADERSHIP BRANDING ENGAGEMENT
PARTNERSHIP OPPORTUNITIES THOUGHT LEADERSHIP BRANDING ENGAGEMENT SIGNATURE EVENTS Performance and Capacity Hackathon Winter, Seattle At this hackathon event, participants will be challenged to utilize
More information2nd National MBE Manufacturers Summit 2017
Global Manufacturing Community 2nd National MBE Manufacturers Summit 2017 August 15-16, 2017 Corporate Sponsorship Global Manufacturing Community Providing Opportunities for MBE Manufacturers Nationally
More informationNational Cyber Security and Cyber Terrorism Summit
Ottawa Ontario November 12-13 2014 National Cyber Security and Cyber Terrorism Summit SUPPORTERS Developing a Roadmap to Address the Pervasive Growth of Cyber Crime SUPPORTER RATE CARD Background The growing
More informationTodd Sander Vice President, Research e.republic Inc.
Todd Sander Vice President, Research e.republic Inc. Tsander@erepublic.com Report Background Respondent Type Breakdown Received responses from 74 state elected and appointed officials and 29 staff members
More informationEARN UP TO 18 CPE CREDITS
Join Us in Nashville, TN, USA 370 Stay at the Heart of the Conference Action! The Omni Nashville 250 5th Avenue South Nashville, TN 37203, USA Hotel Reservations: 615-782-5300 2018 Governance, Risk, and
More informationCybersecurity Auditing in an Unsecure World
About This Course Cybersecurity Auditing in an Unsecure World Course Description $5.4 million that s the average cost of a data breach to a U.S.-based company. It s no surprise, then, that cybersecurity
More information2015 VORMETRIC INSIDER THREAT REPORT
Research Conducted by Research Analyzed by 2015 VORMETRIC INSIDER THREAT REPORT Trends and Future Directions in Data Security GLOBAL EDITION #2015InsiderThreat EXECUTIVE PERSPECTIVE 1 INSIDER THREATS:
More informationBringing Cybersecurity to the Boardroom Bret Arsenault
SESSION ID: CXO-T11 Bringing Cybersecurity to the Boardroom Bret Arsenault Corporate Vice President & CISO Microsoft Security has Transcended from to a an 3 How Microsoft Approaches Security Reinventproductivity
More informationSecurity analytics: From data to action Visual and analytical approaches to detecting modern adversaries
Security analytics: From data to action Visual and analytical approaches to detecting modern adversaries Chris Calvert, CISSP, CISM Director of Solutions Innovation Copyright 2013 Hewlett-Packard Development
More informationITU Telecom World 2017 Smart ABC
ITU Telecom World 2017 Smart ABC Artificial Intelligence Banking Cities Organized by ITU-T 1 Smart ITU Smart is the future: in all industry sectors, in all societies, in the way we live, work and do business.
More information19-20 September 2018 The Trans Resort Kuta, Bali - Indonesia
19-20 September 2018 The Trans Resort Kuta, Bali - Indonesia Strengthening Multi-Stakeholder Coordination and Improving ICT Sector-Wide Resilience in Preparation for Cyber Disruptions CIIP-ID Summit 2018
More informationWe would like to announce to you a number of upcoming changes to the Certified Internal Auditor Exam:
Dear Institute Leaders, We would like to announce to you a number of upcoming changes to the Certified Internal Auditor Exam: 1. As the result of findings from a Job Analysis Study (JAS) for the Certified
More informationCyber Security Congress 2017
Cyber Security Congress 2017 A rich agenda covering both technical and management matters with targeted presentations and hands on workshops. Day 1 Conference Morning Session 8.30 9.00 Registration & Coffee
More informationSales Presentation Case 2018 Dell EMC
Sales Presentation Case 2018 Dell EMC Introduction: As a member of the Dell Technologies unique family of businesses, Dell EMC serves a key role in providing the essential infrastructure for organizations
More informationISACA MOSCOW CHAPTER Chapter meeting 22 September 2016
ISACA MOSCOW CHAPTER Chapter meeting 22 September 2016 Introduction Special guest speaker ISACA Audit committee member, Rosemary Amato Open dialog Wrap-up and close Special guest speaker CISA, CMA, CPA,
More informationSupply Chain Integrity and Security Assurance for ICT. Mats Nilsson
Supply Chain Integrity and Security Assurance for ICT Mats Nilsson The starting point 2 B Internet users 85% Population coverage 5+ B Mobile subscriptions 10 years of Daily upload E-Books surpassing Print
More informationTim Kubu, CIA, CISA WMISACA President
Board Members Tim Kubu - President president@wmisaca.org Cassandra Chasnis Vice President vice.president@wmisaca.org Dan Norberg Secretary secretary@wmisaca.org Brent Moeggenborg Treasurer treasurer@wmisaca.org
More informationINFORMATION. October Radisson Blu Hotel Abidjan PRESS RELEASE.
INFORMATION GENERALE October 10-11-12 Radisson Blu Hotel Abidjan PRESS RELEASE www.africacybersecurityconferencecom Copyright Africa Cyber Security Conference (ACSC) is JIGHI trademark registered 2016-2017
More informationWhat Does the Future Look Like for Business Continuity Professionals?
What Does the Future Look Like for Business Continuity Professionals? October 26, 2016 Brian Zawada, FBCI President, US Chapter of the Business Continuity Institute Agenda and Objectives Change Standards
More informationDepartment of Homeland Security Updates
American Association of State Highway and Transportation Officials Special Committee on Transportation Security and Emergency Management 2016 Critical Infrastructure Committee Joint Annual Meeting Department
More informationCybersecurity Guidance for Small Firms Thursday, November 8 9:00 a.m. 10:00 a.m.
Cybersecurity Guidance for Small Firms Thursday, November 8 9:00 a.m. 10:00 a.m. It is crucial that small financial firms take proper cybersecurity measures to protect their customers and their firm. During
More information