Author Archives: isc2westmich

October Chapter Meeting

Our October chapter meeting is on Wednesday October 1st, 2014 at 5:45PM . Please RSVP if you plan on attending!

We plan to hold the October meeting but as many of you are aware we have not had a monthly meeting for 3 months.  We are faced again with the reality of not having a guest speaker for October.

We plan to discuss the following agenda items:

  • Member participation in finding presenters
  • Ideas to keep the Chapter moving forward
  • Ideas for different format or frequency
  • Round table discussion. Some possible current security events to discuss:
    • Home Depot breach.
    • Advanced Persistent Threats some ideas on ways different organizations deal with them.

Schedule

5:45-6:15PM Networking/Membership signup / Dinner
6:15-7:15PM Presentation
7:15-7:45PM Q&A

Location Information

Metro Health Conference Center
2225 Main Street
Wyoming, MI, 49519

Map

June Chapter Meeting

Our June chapter meeting is on Wednesday June 11th, 2014 at 5:45PM . Please RSVP if you plan on attending!

**Note this month we’re meeting on the second Wednesday instead of the first**

Babel Revisited: Lessons from an IPv6 Transition

Abstract: The IRS orchestrated the documentation and implementation of IPv6 security requirements despite organizational and contractual obstacles. Cross-functional technical and business teams collaborated to tackle these challenges and socialize the IP4-IPv6 transition. Wisdom and actionable guidance for use by other teams arose out of the din of organized conflict.

Speaker biography: Steven F. Fox is the Sr. Cybersecurity Officer assigned to the IRS’ Foreign Accounts Tax Compliance Act (FATCA) International Dialogue. His work focuses on balancing FATCA security requirements against the privacy requirements of participating countries. Mr. Fox brings a cross-disciplinary perspective to the practice of information security; combining his experience as a security consultant, a Sr. IT Auditor and a systems engineer with principles from behavioral/organizational psychology to address security challenges. Steven is a syndicated blogger covering IT Governance, Risk Management, and IT-Business fusion topics. His speaking engagements include Blackhat’s Executive Summit, RSA Conference USA, Hacker Halted, Security B-Sides Chicago/Detroit/Las Vegas, and GrrCon. He also volunteers his time to the Ponemon Institute, Security BSides Detroit and the MichSec security organization.

Schedule

5:45-6:15PM Networking/Membership signup / Dinner
6:15-7:15PM Presentation
7:15-7:45PM Q&A

Location Information

Metro Health Conference Center
2225 Main Street
Wyoming, MI, 49519

Map

May Chapter Meeting

Our May chapter meeting is on Wednesday May 7th, 2014 at 5:45PM. Please RSVP if you plan on attending!

Social Engineering and its Role in Breaches

Abstract: The discussion will be focused on social engineering. Social engineering played a part in nearly every major hack or breach in 2013 yet it still stays in the background when we consider security controls. This is something that needs to change as we move forward and everyone, every single employee, co-worker, etc, is a living breathing open port into our systems just waiting to be compromised.

Speaker biography: R. Jason Toy is a Security Engineer & Splunk Architect at CentraComm.

Schedule

5:45-6:15PM Networking/Membership signup / Dinner
6:15-7:15PM Presentation
7:15-7:45PM Q&A

Location Information

Metro Health Conference Center
2225 Main Street
Wyoming, MI, 49519

Map

April Chapter Meeting

Our April chapter meeting is on Wednesday April 2nd, 2014 at 5:45PM. Please RSVP if you plan on attending!

To Catch a Thief: Preventing the Next Fortune 500 Data Breach

Abstract: The evolution of the threat landscape continues to challenge security programs within organizations worldwide. With the increasing complexity of advanced persistent threats and BYOD culture, organizations must adapt to protect critical assets from both internal and external threats. Last year, a major medical manufacturing company was targeted by one of its own employees and prevented the breach. Topics discussed include the following: anatomy of the attempted breach; Designing and implementing a critical asset protection program; How to leverage Data Loss Prevention (DLP) technology to safeguard your organization’s critical assets.

Speaker biography: With over 20 years of experience heading up major initiatives for leading organizations around the globe, Robert Eggebrecht’s knowledge and understanding of business development, information security and global product and service launches is extensive. Prior to founding BEW Global, Robert Eggebrecht was an integral part of several high-technology businesses offering solutions including enterprise business applications, communications and information security. He held positions with TicketMaster businesses offering solutions including enterprise business applications, communications and information security. He held positions with TicketMaster, Qwest, Level 3 Communications, Gemplex and Virtela, working domestically throughout the US as well as internationally on assignments in Tokyo, London and Denmark. In these positions Rob was primarily focused on corporate finance, product management, business development and technology based service delivery. He holds a degree in International Business from the University of Denver and management certificates from Georgetown and Stanford University. Rob is an active member in the ISO 27000 community and successfully completed the ISO 27001 Lead Auditor Course and exam.

Schedule

5:45-6:15PM Networking/Membership signup / Dinner
6:15-7:15PM Presentation
7:15-7:45PM Q&A

Location Information

Metro Health Conference Center
2225 Main Street
Wyoming, MI, 49519

Map

March 2014 Chapter Meeting

Our March chapter meeting is on Wednesday March 5th, 2014 at 5:45PM. Please RSVP if you plan on attending!

Next Generation of Protection for Network and Endpoint Security – Application Whitelisting & Advanced Threat Detection

Abstract: Over the past decade, the volume of malware produced and potentially infecting organizations, has multiplied by orders of magnitude. The scope of the threat, in conjunction with little to no innovation by traditional security vendors has left organizations like yours vulnerable. Join Brian to discuss the emergence of endpoint malware and the new class of security solutions that can detect threats early and across more points in the kill chain.

Speaker biography: Brian Orr is a Certified Security Professional with over 20+ years of experience in the IT community. The vast majority of his career has been spent as a technical representative for various vendors that offer either business-critical or mission-critical software-based enterprise solutions. Each of the various technologies addresses a certain aspect / layer of a Defense-in-Depth Security Strategy. His diverse & extensive background includes best-of-breed offerings in the areas of Middleware, SOA, J2EE, EAI, SNA, VoIP, FIM, Compliance, DLP, Encryption, & AWL. He is currently working as a Systems Engineer for Bit9 – specializing in Advanced Threat Protection for Endpoint & Server Security.

Schedule

5:45-6:15PM Networking/Membership signup / Dinner
6:15-7:15PM Presentation
7:15-7:45PM Q&A

Location Information

Metro Health Conference Center
2225 Main Street
Wyoming, MI, 49519

Map

February 2014 Chapter Meeting

Our November chapter meeting is on Wednesday February 5th, 2014 at 5:45PM. Please RSVP if you plan on attending!

Social Engineering And Its Role In Breaches

Abstract: The discussion will be focused on social engineering. Social engineering played a part in nearly every major hack or breach in 2013 yet it still stays in the background when we consider security controls. This is something that needs to change as we move forward and everyone, every single employee, co-worker, etc, is a living breathing open port into our systems just waiting to be compromised.

Speaker biography: R. Jason Toy is a Security Engineer & Splunk Architect at CentraComm.

Schedule

5:45-6:15PM Networking/Membership signup / Dinner
6:15-7:15PM Presentation
7:15-7:45PM Q&A

Location Information

Metro Health Conference Center
2225 Main Street
Wyoming, MI, 49519

Map

November 2013 Chapter Meeting

Our November chapter meeting is on Wednesday November 6th, 2013 at 5:45PM. Please RSVP if you plan on attending!

Engineering Value in an Information Security Practice

Abstract: This platitude is bandied about by security professionals; advice that recognizes the need for customer engagement without describing how to do this. Practitioners are left to rely on their own acumen and interpersonal skills to discern these priorities – a challenge that yields mixed results. This session offers a structured approach to understand business needs ,discern their connection to the security program, market that vision in a palatable manner to management, and finally sell the resulting controls to customers.

Attendees will learn about a healthcare organization’s security team that employed branding principles to inform its risk management and control architecture priorities. This allowed the team to create a program that reflected the brand values espoused by its company. The team then employed marketing techniques to promote the program’s value in supporting patient care to management. Lastly, the team socialized its customer-facing controls utilizing sales techniques that respected patients’ needs and concerns.

Speaker biography: Steven F. Fox offers security guidance to ensure compliance with Federal standards and requirements as a Sr. Security Architecture and Engineering Advisor for the U.S. Treasury. He contributes to multiple working groups including the IPv6 transition team, Developer Security Testing workgroup, and the Security and Privacy workgroup. Mr. Fox brings a cross-disciplinary perspective to the practice of information security; combining his experience as a security consultant, a Sr. IT Auditor and a systems engineer with principles from behavioral/organizational psychology to address security challenges. Steven is a syndicated blogger covering IT Governance, Risk Management, and IT-Business fusion topics. His speaking engagements include Blackhat’s Executive Summit, ISSA, ISC2, and ISACA events, SecureWorld Dallas/Detroit, Hacker Halted, Security B-Sides Chicago/Detroit/Las Vegas, and GrrCon. He also volunteers his time to the Ponemon Institute, Security BSides Detroit and the MichSec security organization.

Schedule

5:45-6:15PM Networking/Membership signup / Dinner
6:15-7:15PM Presentation
7:15-7:45PM Q&A

Location Information

Metro Health Conference Center
2225 Main Street
Wyoming, MI, 49519

Map

October 2013 Chapter Meeting

Our October chapter meeting is on Wednesday October 2nd, 2013 at 5:45PM. Please RSVP if you plan on attending!

Dr. Strangecloud or: How I Learned to Stop Worrying and Love the BYoD, presented by Caston Thomas & Paul Cochran

Abstract: Ten to fifteen years ago, the life of a corporate security manager was easy. Firewall… Check… Virus protection… Check… WEP… Check…Then, the attacks became a little more sophisticated. IDS… Check… IPS… Check… WPA2… Check… 2-factor… Check… Check… Check… It became more complex, yet the basic premise of our security infrastructure was the same… Keep the bad guys out… Keep the data in… Over the last few years, profoundly different challenges have arisen and increase exponentially the demands placed on corporate information security… Cloud… Mobile… Compliance… Privacy… Advanced Persistent Threats… DLP… SIEM…

How Do We Fill In the Blanks From the Dissolving Perimeter?
We’re now called to secure data that’s no longer inside our domain. We’re asked to secure users and devices that could be anywhere in the world at any given time. We’re expected to be able to produce a report on the state of every device & every user on the network – possibly even what it looked like six months ago. “Oh yes, we’ll give you an increase in budget. More staff? We’ll get back with you.”

Some would call this a paradigm shift. Some would call it a disaster waiting to happen. Most of us don’t quite yet know what to call it.

In this presentation, we’ll cover:

  1. how the combination of BYoD/cloud/mobile and the changing threat landscape present new challenges to InfoSec
  2. updating our security framework & infrastructure components without obsoleting what we already have
  3. how NAC & mobile management tools can play a pivotal role in bringing the pieces together (includes a demonstration of ForeScout)

Presentation Material

Speaker biography
Caston Thomas brings perspective, knowledge and a practicality to how to combine technology and process change for improving security & management of mobile & the cloud. Caston has pioneered communications & workflow technologies in a number of healthcare organizations. With almost 30 years in corporate information technology, he is sought by business leaders as an expert helping to fill the gap between mobile security frameworks and the operational processes & technologies that make them work. Caston is president of InterWorks, LLC.

A businessman with a heart and commitment to his family and community, Caston has contributed his talents and time to a variety of humanitarian organizations including the Salvation Army, Capuchin Soup Kitchen, and building clinics & orphanages in Ghana.

Schedule

  • 5:45-6:15PM Networking/Membership signup / Dinner
  • 6:15-7:15PM Presentation
  • 7:15-7:45PM Q&A

Location Information

Metro Health Conference Center
2225 Main Street
Wyoming, MI, 49519
Map

September 2013 Chapter Meeting

Our September chapter meeting is on Wednesday September 4th, 2013 at 5:45PM. Please RSVP if you plan on attending!

Nobody Ever Got Fired For Implementing a Risk Management Program – But they Should Be, presented by Richard Stiennon.

Abstract: Risk Management has become the staple of IT security organizations. Adopted from financial and life insurance models Risk Management makes some unsupportable assumptions of predictability, and knowledge. The three tenets of Risk Management, discovery, ranking, and patching are all impossible to achieve. Therefore Risk Management thinking should be abandoned in favor of threat management.

Schedule

  • 5:45-6:15PM Networking/Membership signup / Dinner
  • 6:15-7:15PM Presentation
  • 7:15-7:45PM Q&A

Location Information

Metro Health Conference Center
2225 Main Street
Wyoming, MI, 49519
Map

August 2013 Chapter Meeting

Our August chapter meeting is on Wednesday August 7th, 2013 at 5:45PM. Larry Yob will be speaking about Data Loss Prevention (DLP). Please RSVP if you plan on attending!

Abstract: Presentation will give an overview of Data Loss Prevention (DLP) technology and definitions of data in motion, data at rest and data in use.  Strategies and lessons learned from DLP customers around the country.  Also talk about risk of an enterprise big brother DLP.

Presenter information: Larry Yob is an Information Security Officer for Ascension Health Information Services (AHIS).  Ascension Health Information Services (AHIS), part of Ascension Health Alliance, is the largest Catholic health system, the largest private nonprofit system and the third largest system (based on revenues) in the United States, operating in 23 states and the District of Columbia.  Currently with his role as Information Security Officer he is responsible for Data Loss Prevention (DLP) and regionally oversees security for 12 Health Ministry’s.

Previously he worked as a system administrator, Lotus Notes developer, Citrix administrator, and a HIPAA Security Officer for a local community mental health authority.

Presentation material

Schedule

  • 5:45-6:15PM Networking/Membership signup / Dinner
  • 6:15-7:15PM Presentation
  • 7:15-7:45PM Q&A

Location Information

Metro Health Conference Center
2225 Main Street
Wyoming, MI, 49519
Map