Author Archives: isc2westmich

February Chapter Meeting

Our February chapter meeting is on Wednesday February 4th, 2015 at 5:45PM. Please RSVP if you plan on attending!

Selecting, Deploying and Maintaining an Application Whitelisting Solution

Abstract: An open discussion covering Application Whitelisting basics: what does it do? What problems does it solve? What should I look for in a vendor? How do a deploy it to get the most value and least disruption to the business? And finally, how do I maintain it for years to come?

Speaker biography: Ben Stuart, CISSP has experience in all of the aforementioned topics.

Schedule

5:45-6:15PM Networking/Membership signup / Dinner
6:15-7:15PM Presentation
7:15-7:45PM Q&A

Location Information

Metro Health Conference Center
2225 Main Street
Wyoming, MI, 49519

Map

December Chapter Meeting

Our December chapter meeting is on Wednesday December 3rd, 2014 at 5:45PM. Please RSVP if you plan on attending!

DLP Enforcement In A Hospital Environment

Abstract: Hear how RSA DLP has been used to scan Email and web traffic to reduce information loss including automatic tagging and encryption. The complete development of the DLP program will be discussed including phases of implementation and integration with risk management. This RSA DLP system is a complex environment of Windows and Unix components involving the deployment of agents to detect network traffic, integrate with the Email environment, and deployment on end points computers. Additional guest speakers from related organizations will also present their comments.

Speaker biography: Tim Lomas has a CISSP, current Windows certifications and past CISCO certifications. He has been involved in information security at Pharmacia (now Pfizer), a defense contractor, and multiple health organizations.

Schedule

5:45-6:15PM Networking/Membership signup / Dinner
6:15-7:15PM Presentation
7:15-7:45PM Q&A

Location Information

Metro Health Conference Center
2225 Main Street
Wyoming, MI, 49519

Map

November Chapter Meeting

Our November chapter meeting is on Wednesday November 5th, 2014 at 5:45PM. Please RSVP if you plan on attending!

Scan Your Networks Safely and Automatically

Abstract: Scan large networks using freely available tools to generate useful reports. Scott will demonstrate a 4-tiered approach he uses to quickly discover transient systems, identify system type, and finally run a comprehensive vulnerability scan on identified subsets (i.e. *nix, Windows Server, VM, desktop, laptop, printers). Results are fed into Splunk, a powerful search, report and dashboard tool.

Speaker biography: Scott Aschenbach has been building programs, computers, systems, teams, programs and organizations since 1973. He specializes in combining and building on existing systems in creative ways, and brings diverse experience from working in software development, academic, consulting, automotive and health environments. He has a Masters in Computer Science from the University of Wisconsin.

Schedule

5:45-6:15PM Networking/Membership signup / Dinner
6:15-7:15PM Presentation
7:15-7:45PM Q&A

Location Information

Metro Health Conference Center
2225 Main Street
Wyoming, MI, 49519

Map

Fall chapter update

Greetings (ISC)² West Michigan Chapter Members:

We are happy to announce a number of new and exciting changes being made for the future of the Chapter. Highlights below:

In order to provide homegrown, meaningful, and timely content, the chapter will now allow members or visitors to “sponsor” a meeting.

  • Sponsorship can mean giving a presentation, leading a round-table discussion, bringing in a speaker or vendor partner, etc.
  • Please submit your ideas here.

We are excited to announce that all of our meetings through May, 2015 are scheduled with engaging, relevant, MEMBER DRIVEN content!!

  • The schedule through May 2015 is listed below, but we will be covering topics such as: Splunk, DLP, application white-listing, PKI and more!
  • All of these presentations will be given by your fellow chapter members.

At the October 1st meeting Dave Hoxie was elected to fill the long-vacant Membership Chair role on our Board of Directors.

  • We look forward to growing our membership under Dave’s leadership. Please introduce yourself to Dave at the November 5th meeting.

In the near future we will be testing the capability to attend meetings virtually for those members who cannot attend in person due to work commitments or inclement weather.

  • If the tests are positive, details on how to attend virtually will be provided with the next meeting notice.

IMPORTANT NOTE
In order to make our emailing list more manageable, we will be moving to a new emailing system. In the near future you will receiving an email from meetings@isc2chapter-westmi.org asking you to confirm your subscription to the list. If you do not confirm your subscription, you will no longer receive email notifications/announcements from the chapter. We encourage you to please confirm your subscription to the list when you receive it. This will enable us to provide you with current information as quickly as possible.

We are excited about the future of the chapter and hope you are too. We look forward to seeing you at the next meeting on November 5th.

Thank you!
— (ISC)2 W. MI Chapter Board of Directors

Upcoming schedule:

Date Topic Presenter
November 5, 2014 Splunk Larry Yob
December 3, 2014 Data Loss Prevention Tim Lomas
January 7, 2014 Winter break, no meeting
February 4, 2015 Application whitelisting Ben Stuart
March 4, 2015 PKI Implementation Matt Somers
April 1, 2015 Data Loss Prevention Art King
May 6, 2015 Fortinet vs. Bluecoat (Content filtering discussion) Kyle Washburn

 

October Chapter Meeting

Our October chapter meeting is on Wednesday October 1st, 2014 at 5:45PM . Please RSVP if you plan on attending!

We plan to hold the October meeting but as many of you are aware we have not had a monthly meeting for 3 months.  We are faced again with the reality of not having a guest speaker for October.

We plan to discuss the following agenda items:

  • Member participation in finding presenters
  • Ideas to keep the Chapter moving forward
  • Ideas for different format or frequency
  • Round table discussion. Some possible current security events to discuss:
    • Home Depot breach.
    • Advanced Persistent Threats some ideas on ways different organizations deal with them.

Schedule

5:45-6:15PM Networking/Membership signup / Dinner
6:15-7:15PM Presentation
7:15-7:45PM Q&A

Location Information

Metro Health Conference Center
2225 Main Street
Wyoming, MI, 49519

Map

June Chapter Meeting

Our June chapter meeting is on Wednesday June 11th, 2014 at 5:45PM . Please RSVP if you plan on attending!

**Note this month we’re meeting on the second Wednesday instead of the first**

Babel Revisited: Lessons from an IPv6 Transition

Abstract: The IRS orchestrated the documentation and implementation of IPv6 security requirements despite organizational and contractual obstacles. Cross-functional technical and business teams collaborated to tackle these challenges and socialize the IP4-IPv6 transition. Wisdom and actionable guidance for use by other teams arose out of the din of organized conflict.

Speaker biography: Steven F. Fox is the Sr. Cybersecurity Officer assigned to the IRS’ Foreign Accounts Tax Compliance Act (FATCA) International Dialogue. His work focuses on balancing FATCA security requirements against the privacy requirements of participating countries. Mr. Fox brings a cross-disciplinary perspective to the practice of information security; combining his experience as a security consultant, a Sr. IT Auditor and a systems engineer with principles from behavioral/organizational psychology to address security challenges. Steven is a syndicated blogger covering IT Governance, Risk Management, and IT-Business fusion topics. His speaking engagements include Blackhat’s Executive Summit, RSA Conference USA, Hacker Halted, Security B-Sides Chicago/Detroit/Las Vegas, and GrrCon. He also volunteers his time to the Ponemon Institute, Security BSides Detroit and the MichSec security organization.

Schedule

5:45-6:15PM Networking/Membership signup / Dinner
6:15-7:15PM Presentation
7:15-7:45PM Q&A

Location Information

Metro Health Conference Center
2225 Main Street
Wyoming, MI, 49519

Map

May Chapter Meeting

Our May chapter meeting is on Wednesday May 7th, 2014 at 5:45PM. Please RSVP if you plan on attending!

Social Engineering and its Role in Breaches

Abstract: The discussion will be focused on social engineering. Social engineering played a part in nearly every major hack or breach in 2013 yet it still stays in the background when we consider security controls. This is something that needs to change as we move forward and everyone, every single employee, co-worker, etc, is a living breathing open port into our systems just waiting to be compromised.

Speaker biography: R. Jason Toy is a Security Engineer & Splunk Architect at CentraComm.

Schedule

5:45-6:15PM Networking/Membership signup / Dinner
6:15-7:15PM Presentation
7:15-7:45PM Q&A

Location Information

Metro Health Conference Center
2225 Main Street
Wyoming, MI, 49519

Map

April Chapter Meeting

Our April chapter meeting is on Wednesday April 2nd, 2014 at 5:45PM. Please RSVP if you plan on attending!

To Catch a Thief: Preventing the Next Fortune 500 Data Breach

Abstract: The evolution of the threat landscape continues to challenge security programs within organizations worldwide. With the increasing complexity of advanced persistent threats and BYOD culture, organizations must adapt to protect critical assets from both internal and external threats. Last year, a major medical manufacturing company was targeted by one of its own employees and prevented the breach. Topics discussed include the following: anatomy of the attempted breach; Designing and implementing a critical asset protection program; How to leverage Data Loss Prevention (DLP) technology to safeguard your organization’s critical assets.

Speaker biography: With over 20 years of experience heading up major initiatives for leading organizations around the globe, Robert Eggebrecht’s knowledge and understanding of business development, information security and global product and service launches is extensive. Prior to founding BEW Global, Robert Eggebrecht was an integral part of several high-technology businesses offering solutions including enterprise business applications, communications and information security. He held positions with TicketMaster businesses offering solutions including enterprise business applications, communications and information security. He held positions with TicketMaster, Qwest, Level 3 Communications, Gemplex and Virtela, working domestically throughout the US as well as internationally on assignments in Tokyo, London and Denmark. In these positions Rob was primarily focused on corporate finance, product management, business development and technology based service delivery. He holds a degree in International Business from the University of Denver and management certificates from Georgetown and Stanford University. Rob is an active member in the ISO 27000 community and successfully completed the ISO 27001 Lead Auditor Course and exam.

Schedule

5:45-6:15PM Networking/Membership signup / Dinner
6:15-7:15PM Presentation
7:15-7:45PM Q&A

Location Information

Metro Health Conference Center
2225 Main Street
Wyoming, MI, 49519

Map

March 2014 Chapter Meeting

Our March chapter meeting is on Wednesday March 5th, 2014 at 5:45PM. Please RSVP if you plan on attending!

Next Generation of Protection for Network and Endpoint Security – Application Whitelisting & Advanced Threat Detection

Abstract: Over the past decade, the volume of malware produced and potentially infecting organizations, has multiplied by orders of magnitude. The scope of the threat, in conjunction with little to no innovation by traditional security vendors has left organizations like yours vulnerable. Join Brian to discuss the emergence of endpoint malware and the new class of security solutions that can detect threats early and across more points in the kill chain.

Speaker biography: Brian Orr is a Certified Security Professional with over 20+ years of experience in the IT community. The vast majority of his career has been spent as a technical representative for various vendors that offer either business-critical or mission-critical software-based enterprise solutions. Each of the various technologies addresses a certain aspect / layer of a Defense-in-Depth Security Strategy. His diverse & extensive background includes best-of-breed offerings in the areas of Middleware, SOA, J2EE, EAI, SNA, VoIP, FIM, Compliance, DLP, Encryption, & AWL. He is currently working as a Systems Engineer for Bit9 – specializing in Advanced Threat Protection for Endpoint & Server Security.

Schedule

5:45-6:15PM Networking/Membership signup / Dinner
6:15-7:15PM Presentation
7:15-7:45PM Q&A

Location Information

Metro Health Conference Center
2225 Main Street
Wyoming, MI, 49519

Map

February 2014 Chapter Meeting

Our November chapter meeting is on Wednesday February 5th, 2014 at 5:45PM. Please RSVP if you plan on attending!

Social Engineering And Its Role In Breaches

Abstract: The discussion will be focused on social engineering. Social engineering played a part in nearly every major hack or breach in 2013 yet it still stays in the background when we consider security controls. This is something that needs to change as we move forward and everyone, every single employee, co-worker, etc, is a living breathing open port into our systems just waiting to be compromised.

Speaker biography: R. Jason Toy is a Security Engineer & Splunk Architect at CentraComm.

Schedule

5:45-6:15PM Networking/Membership signup / Dinner
6:15-7:15PM Presentation
7:15-7:45PM Q&A

Location Information

Metro Health Conference Center
2225 Main Street
Wyoming, MI, 49519

Map