Author Archives: isc2westmich

October Chapter Meeting

Our October chapter meeting is on Wednesday, October 7th, 2015 at 5:45PM. Please RSVP if you plan on attending!

Past, Present and Beyond the Boundaries of Vendor Management and Security

Abstract: As business growth and cloud vendors becomes more important to survive, IT is required to match the business agility through flexible security models, methodologies and infrastructure.

This session will cover:

  • Experiences modernizing vendor management in a cloud era
  • The overall approach to finding flexible onboarding of new or existing solutions
  • Single sign-on, contract reviews, and IT and security architecture

Speaker biography: Eric Merkle, Business Architect at BDO USA, LLP, focuses on identifying process improvements and emerging technologies. His professional career began in operational support, and he gradually moved into project management, vendor management and architecture. Eric is a member of PMI and IASA Global and has certifications in PMP, Architect Core and ITIL.

Eric has been with BDO for over 14 years and continues to have a passion for designing new and improving business processes throughout BDO.

Schedule

5:45-6:15PM Networking/Membership signup / Dinner
6:15-7:15PM Presentation
7:15-7:45PM Q&A

NEW LOCATION Location Information

Metro Health IT Facility
985 Gezon Parkway (across from Target loading dock)
Wyoming, MI, 49519

Map

September Chapter Meeting

Our September chapter meeting is on Wednesday, September 2, 2015 at 5:45PM. Please RSVP if you plan on attending!

Member Roundtable & Planning Session

The ISC2 West Michigan Chapter board members will be hosting a roundtable discussing current security topics, as well as gauging interest in specific topics and soliciting member presentations for the remainder of 2015.  We hope this will be a very interactive meeting and will result in a having a schedule outlined for upcoming meetings.  If you have a topic you’d like to present on please come prepared to discuss!

NOTE: Meeting location has been changed.  See location information below.

Schedule

5:45-6:15PM Networking/Membership signup / Dinner
6:15-7:15PM Presentation
7:15-7:45PM Q&A

NEW LOCATION Location Information

Metro Health IT Facility
985 Gezon Parkway (across from Target loading dock)
Wyoming, MI, 49519

Map

Summer, 2015 hiatus

Hello – the Chapter is currently on summer hiatus.  Meetings are scheduled to resume on September 2nd, 2015.  If you or someone you know is interested in presenting to the group, please let us know and we will be in touch.

Thank you for your support and enjoy the summer!

May Chapter Meeting

MEETING HAS BEEN CANCELLED!

Our May chapter meeting is on Wednesday, May 6th, 2015 at 5:45PM. Please RSVP if you plan on attending!

Web Content Filtering Overview & Best Practices

Abstract: Web filtering can deliver many positive benefits for your organization and its end users that exceed simple category blocking. Proper group management and access auditing can help to reduce overall risk to an organization. Web Filtering is a great security tool that provides an essential layer of protection from the various online threats we face today.

Speaker biography: Kyle Washburn, SSCP – resides in South West Michigan and is an Information Security Technical Specialist for Ascension Information Services. AIS is a subsidiary of Ascension, a Catholic healthcare organization with over 30 Health Ministries across the United States. Kyle has over 12 years of experience in the Information Technology field working with companies such as CSC, Dell, and AIS.

Schedule

5:45-6:15PM Networking/Membership signup / Dinner
6:15-7:15PM Presentation
7:15-7:45PM Q&A

Location Information

Metro Health Conference Center
2225 Main Street
Wyoming, MI, 49519

Map

April Chapter Meeting

Update: The slide deck for this presentation is available here.

Our April chapter meeting is on Wednesday April 1st, 2015 at 5:45PM. Please RSVP if you plan on attending!

Cloud Vendor Security Assessments

Abstract: Are company “Crown Jewels” in the cloud? What evidence do you have that company data in the cloud is secure? Lloyd Guyot will lead a collaborative discussion based on his experience implementing and leading a Cloud Vendor Security Assessment service for a global, Fortune 100 company. Topics to be discussed include the processes, procedures and tools used in assessing a Cloud Vendor security posture.

Speaker biography: Lloyd Guyot, CISSP, CISM resides in West Michigan and is a Lead Security Analyst for Johnson Controls, a global Fortune 100 company headquartered in Milwaukee, Wisconsin. Lloyd has over 15 years’ experience in the Information Security field and is an Adjunct at Davenport University and serves on the FBI InfraGard / U.S. Homeland Security – West Michigan Board of Directors.

Schedule

5:45-6:15PM Networking/Membership signup / Dinner
6:15-7:15PM Presentation
7:15-7:45PM Q&A

Location Information

Metro Health Conference Center
2225 Main Street
Wyoming, MI, 49519

Map

March Chapter Meeting

Our March chapter meeting is on Wednesday March 4th, 2015 at 5:45PM. Please RSVP if you plan on attending!

PKI Implementation: The Good, Bad, and Ugly

Abstract: Matt will lead an open discussion based on his experience implementing and attempting to rollout a new Public Key Infrastructure. Topics to be discussed are Vendor selection, Software selection, Planning, Certificate Usage, Piloting, and current status of this “live” project.

Speaker biography: Matthew Somers, CISSP resides in West Michigan and is the Information Security Officer for a global company headquartered in the US. Matt has over 13 years experience in the Information Security field.

Schedule

5:45-6:15PM Networking/Membership signup / Dinner
6:15-7:15PM Presentation
7:15-7:45PM Q&A

Location Information

Metro Health Conference Center
2225 Main Street
Wyoming, MI, 49519

Map

February Chapter Meeting

Our February chapter meeting is on Wednesday February 4th, 2015 at 5:45PM. Please RSVP if you plan on attending!

Selecting, Deploying and Maintaining an Application Whitelisting Solution

Abstract: An open discussion covering Application Whitelisting basics: what does it do? What problems does it solve? What should I look for in a vendor? How do a deploy it to get the most value and least disruption to the business? And finally, how do I maintain it for years to come?

Speaker biography: Ben Stuart, CISSP has experience in all of the aforementioned topics.

Schedule

5:45-6:15PM Networking/Membership signup / Dinner
6:15-7:15PM Presentation
7:15-7:45PM Q&A

Location Information

Metro Health Conference Center
2225 Main Street
Wyoming, MI, 49519

Map

December Chapter Meeting

Our December chapter meeting is on Wednesday December 3rd, 2014 at 5:45PM. Please RSVP if you plan on attending!

DLP Enforcement In A Hospital Environment

Abstract: Hear how RSA DLP has been used to scan Email and web traffic to reduce information loss including automatic tagging and encryption. The complete development of the DLP program will be discussed including phases of implementation and integration with risk management. This RSA DLP system is a complex environment of Windows and Unix components involving the deployment of agents to detect network traffic, integrate with the Email environment, and deployment on end points computers. Additional guest speakers from related organizations will also present their comments.

Speaker biography: Tim Lomas has a CISSP, current Windows certifications and past CISCO certifications. He has been involved in information security at Pharmacia (now Pfizer), a defense contractor, and multiple health organizations.

Schedule

5:45-6:15PM Networking/Membership signup / Dinner
6:15-7:15PM Presentation
7:15-7:45PM Q&A

Location Information

Metro Health Conference Center
2225 Main Street
Wyoming, MI, 49519

Map

November Chapter Meeting

Our November chapter meeting is on Wednesday November 5th, 2014 at 5:45PM. Please RSVP if you plan on attending!

Scan Your Networks Safely and Automatically

Abstract: Scan large networks using freely available tools to generate useful reports. Scott will demonstrate a 4-tiered approach he uses to quickly discover transient systems, identify system type, and finally run a comprehensive vulnerability scan on identified subsets (i.e. *nix, Windows Server, VM, desktop, laptop, printers). Results are fed into Splunk, a powerful search, report and dashboard tool.

Speaker biography: Scott Aschenbach has been building programs, computers, systems, teams, programs and organizations since 1973. He specializes in combining and building on existing systems in creative ways, and brings diverse experience from working in software development, academic, consulting, automotive and health environments. He has a Masters in Computer Science from the University of Wisconsin.

Schedule

5:45-6:15PM Networking/Membership signup / Dinner
6:15-7:15PM Presentation
7:15-7:45PM Q&A

Location Information

Metro Health Conference Center
2225 Main Street
Wyoming, MI, 49519

Map

Fall chapter update

Greetings (ISC)² West Michigan Chapter Members:

We are happy to announce a number of new and exciting changes being made for the future of the Chapter. Highlights below:

In order to provide homegrown, meaningful, and timely content, the chapter will now allow members or visitors to “sponsor” a meeting.

  • Sponsorship can mean giving a presentation, leading a round-table discussion, bringing in a speaker or vendor partner, etc.
  • Please submit your ideas here.

We are excited to announce that all of our meetings through May, 2015 are scheduled with engaging, relevant, MEMBER DRIVEN content!!

  • The schedule through May 2015 is listed below, but we will be covering topics such as: Splunk, DLP, application white-listing, PKI and more!
  • All of these presentations will be given by your fellow chapter members.

At the October 1st meeting Dave Hoxie was elected to fill the long-vacant Membership Chair role on our Board of Directors.

  • We look forward to growing our membership under Dave’s leadership. Please introduce yourself to Dave at the November 5th meeting.

In the near future we will be testing the capability to attend meetings virtually for those members who cannot attend in person due to work commitments or inclement weather.

  • If the tests are positive, details on how to attend virtually will be provided with the next meeting notice.

IMPORTANT NOTE
In order to make our emailing list more manageable, we will be moving to a new emailing system. In the near future you will receiving an email from meetings@isc2chapter-westmi.org asking you to confirm your subscription to the list. If you do not confirm your subscription, you will no longer receive email notifications/announcements from the chapter. We encourage you to please confirm your subscription to the list when you receive it. This will enable us to provide you with current information as quickly as possible.

We are excited about the future of the chapter and hope you are too. We look forward to seeing you at the next meeting on November 5th.

Thank you!
— (ISC)2 W. MI Chapter Board of Directors

Upcoming schedule:

Date Topic Presenter
November 5, 2014 Splunk Larry Yob
December 3, 2014 Data Loss Prevention Tim Lomas
January 7, 2014 Winter break, no meeting
February 4, 2015 Application whitelisting Ben Stuart
March 4, 2015 PKI Implementation Matt Somers
April 1, 2015 Data Loss Prevention Art King
May 6, 2015 Fortinet vs. Bluecoat (Content filtering discussion) Kyle Washburn