Category Archives: Events

May Chapter Meeting

MEETING HAS BEEN CANCELLED!

Our May chapter meeting is on Wednesday, May 6th, 2015 at 5:45PM. Please RSVP if you plan on attending!

Web Content Filtering Overview & Best Practices

Abstract: Web filtering can deliver many positive benefits for your organization and its end users that exceed simple category blocking. Proper group management and access auditing can help to reduce overall risk to an organization. Web Filtering is a great security tool that provides an essential layer of protection from the various online threats we face today.

Speaker biography: Kyle Washburn, SSCP – resides in South West Michigan and is an Information Security Technical Specialist for Ascension Information Services. AIS is a subsidiary of Ascension, a Catholic healthcare organization with over 30 Health Ministries across the United States. Kyle has over 12 years of experience in the Information Technology field working with companies such as CSC, Dell, and AIS.

Schedule

5:45-6:15PM Networking/Membership signup / Dinner
6:15-7:15PM Presentation
7:15-7:45PM Q&A

Location Information

Metro Health Conference Center
2225 Main Street
Wyoming, MI, 49519

Map

April Chapter Meeting

Update: The slide deck for this presentation is available here.

Our April chapter meeting is on Wednesday April 1st, 2015 at 5:45PM. Please RSVP if you plan on attending!

Cloud Vendor Security Assessments

Abstract: Are company “Crown Jewels” in the cloud? What evidence do you have that company data in the cloud is secure? Lloyd Guyot will lead a collaborative discussion based on his experience implementing and leading a Cloud Vendor Security Assessment service for a global, Fortune 100 company. Topics to be discussed include the processes, procedures and tools used in assessing a Cloud Vendor security posture.

Speaker biography: Lloyd Guyot, CISSP, CISM resides in West Michigan and is a Lead Security Analyst for Johnson Controls, a global Fortune 100 company headquartered in Milwaukee, Wisconsin. Lloyd has over 15 years’ experience in the Information Security field and is an Adjunct at Davenport University and serves on the FBI InfraGard / U.S. Homeland Security – West Michigan Board of Directors.

Schedule

5:45-6:15PM Networking/Membership signup / Dinner
6:15-7:15PM Presentation
7:15-7:45PM Q&A

Location Information

Metro Health Conference Center
2225 Main Street
Wyoming, MI, 49519

Map

March Chapter Meeting

Our March chapter meeting is on Wednesday March 4th, 2015 at 5:45PM. Please RSVP if you plan on attending!

PKI Implementation: The Good, Bad, and Ugly

Abstract: Matt will lead an open discussion based on his experience implementing and attempting to rollout a new Public Key Infrastructure. Topics to be discussed are Vendor selection, Software selection, Planning, Certificate Usage, Piloting, and current status of this “live” project.

Speaker biography: Matthew Somers, CISSP resides in West Michigan and is the Information Security Officer for a global company headquartered in the US. Matt has over 13 years experience in the Information Security field.

Schedule

5:45-6:15PM Networking/Membership signup / Dinner
6:15-7:15PM Presentation
7:15-7:45PM Q&A

Location Information

Metro Health Conference Center
2225 Main Street
Wyoming, MI, 49519

Map

February Chapter Meeting

Our February chapter meeting is on Wednesday February 4th, 2015 at 5:45PM. Please RSVP if you plan on attending!

Selecting, Deploying and Maintaining an Application Whitelisting Solution

Abstract: An open discussion covering Application Whitelisting basics: what does it do? What problems does it solve? What should I look for in a vendor? How do a deploy it to get the most value and least disruption to the business? And finally, how do I maintain it for years to come?

Speaker biography: Ben Stuart, CISSP has experience in all of the aforementioned topics.

Schedule

5:45-6:15PM Networking/Membership signup / Dinner
6:15-7:15PM Presentation
7:15-7:45PM Q&A

Location Information

Metro Health Conference Center
2225 Main Street
Wyoming, MI, 49519

Map

November Chapter Meeting

Our November chapter meeting is on Wednesday November 5th, 2014 at 5:45PM. Please RSVP if you plan on attending!

Scan Your Networks Safely and Automatically

Abstract: Scan large networks using freely available tools to generate useful reports. Scott will demonstrate a 4-tiered approach he uses to quickly discover transient systems, identify system type, and finally run a comprehensive vulnerability scan on identified subsets (i.e. *nix, Windows Server, VM, desktop, laptop, printers). Results are fed into Splunk, a powerful search, report and dashboard tool.

Speaker biography: Scott Aschenbach has been building programs, computers, systems, teams, programs and organizations since 1973. He specializes in combining and building on existing systems in creative ways, and brings diverse experience from working in software development, academic, consulting, automotive and health environments. He has a Masters in Computer Science from the University of Wisconsin.

Schedule

5:45-6:15PM Networking/Membership signup / Dinner
6:15-7:15PM Presentation
7:15-7:45PM Q&A

Location Information

Metro Health Conference Center
2225 Main Street
Wyoming, MI, 49519

Map

October Chapter Meeting

Our October chapter meeting is on Wednesday October 1st, 2014 at 5:45PM . Please RSVP if you plan on attending!

We plan to hold the October meeting but as many of you are aware we have not had a monthly meeting for 3 months.  We are faced again with the reality of not having a guest speaker for October.

We plan to discuss the following agenda items:

  • Member participation in finding presenters
  • Ideas to keep the Chapter moving forward
  • Ideas for different format or frequency
  • Round table discussion. Some possible current security events to discuss:
    • Home Depot breach.
    • Advanced Persistent Threats some ideas on ways different organizations deal with them.

Schedule

5:45-6:15PM Networking/Membership signup / Dinner
6:15-7:15PM Presentation
7:15-7:45PM Q&A

Location Information

Metro Health Conference Center
2225 Main Street
Wyoming, MI, 49519

Map

June Chapter Meeting

Our June chapter meeting is on Wednesday June 11th, 2014 at 5:45PM . Please RSVP if you plan on attending!

**Note this month we’re meeting on the second Wednesday instead of the first**

Babel Revisited: Lessons from an IPv6 Transition

Abstract: The IRS orchestrated the documentation and implementation of IPv6 security requirements despite organizational and contractual obstacles. Cross-functional technical and business teams collaborated to tackle these challenges and socialize the IP4-IPv6 transition. Wisdom and actionable guidance for use by other teams arose out of the din of organized conflict.

Speaker biography: Steven F. Fox is the Sr. Cybersecurity Officer assigned to the IRS’ Foreign Accounts Tax Compliance Act (FATCA) International Dialogue. His work focuses on balancing FATCA security requirements against the privacy requirements of participating countries. Mr. Fox brings a cross-disciplinary perspective to the practice of information security; combining his experience as a security consultant, a Sr. IT Auditor and a systems engineer with principles from behavioral/organizational psychology to address security challenges. Steven is a syndicated blogger covering IT Governance, Risk Management, and IT-Business fusion topics. His speaking engagements include Blackhat’s Executive Summit, RSA Conference USA, Hacker Halted, Security B-Sides Chicago/Detroit/Las Vegas, and GrrCon. He also volunteers his time to the Ponemon Institute, Security BSides Detroit and the MichSec security organization.

Schedule

5:45-6:15PM Networking/Membership signup / Dinner
6:15-7:15PM Presentation
7:15-7:45PM Q&A

Location Information

Metro Health Conference Center
2225 Main Street
Wyoming, MI, 49519

Map

May Chapter Meeting

Our May chapter meeting is on Wednesday May 7th, 2014 at 5:45PM. Please RSVP if you plan on attending!

Social Engineering and its Role in Breaches

Abstract: The discussion will be focused on social engineering. Social engineering played a part in nearly every major hack or breach in 2013 yet it still stays in the background when we consider security controls. This is something that needs to change as we move forward and everyone, every single employee, co-worker, etc, is a living breathing open port into our systems just waiting to be compromised.

Speaker biography: R. Jason Toy is a Security Engineer & Splunk Architect at CentraComm.

Schedule

5:45-6:15PM Networking/Membership signup / Dinner
6:15-7:15PM Presentation
7:15-7:45PM Q&A

Location Information

Metro Health Conference Center
2225 Main Street
Wyoming, MI, 49519

Map

April Chapter Meeting

Our April chapter meeting is on Wednesday April 2nd, 2014 at 5:45PM. Please RSVP if you plan on attending!

To Catch a Thief: Preventing the Next Fortune 500 Data Breach

Abstract: The evolution of the threat landscape continues to challenge security programs within organizations worldwide. With the increasing complexity of advanced persistent threats and BYOD culture, organizations must adapt to protect critical assets from both internal and external threats. Last year, a major medical manufacturing company was targeted by one of its own employees and prevented the breach. Topics discussed include the following: anatomy of the attempted breach; Designing and implementing a critical asset protection program; How to leverage Data Loss Prevention (DLP) technology to safeguard your organization’s critical assets.

Speaker biography: With over 20 years of experience heading up major initiatives for leading organizations around the globe, Robert Eggebrecht’s knowledge and understanding of business development, information security and global product and service launches is extensive. Prior to founding BEW Global, Robert Eggebrecht was an integral part of several high-technology businesses offering solutions including enterprise business applications, communications and information security. He held positions with TicketMaster businesses offering solutions including enterprise business applications, communications and information security. He held positions with TicketMaster, Qwest, Level 3 Communications, Gemplex and Virtela, working domestically throughout the US as well as internationally on assignments in Tokyo, London and Denmark. In these positions Rob was primarily focused on corporate finance, product management, business development and technology based service delivery. He holds a degree in International Business from the University of Denver and management certificates from Georgetown and Stanford University. Rob is an active member in the ISO 27000 community and successfully completed the ISO 27001 Lead Auditor Course and exam.

Schedule

5:45-6:15PM Networking/Membership signup / Dinner
6:15-7:15PM Presentation
7:15-7:45PM Q&A

Location Information

Metro Health Conference Center
2225 Main Street
Wyoming, MI, 49519

Map

March 2014 Chapter Meeting

Our March chapter meeting is on Wednesday March 5th, 2014 at 5:45PM. Please RSVP if you plan on attending!

Next Generation of Protection for Network and Endpoint Security – Application Whitelisting & Advanced Threat Detection

Abstract: Over the past decade, the volume of malware produced and potentially infecting organizations, has multiplied by orders of magnitude. The scope of the threat, in conjunction with little to no innovation by traditional security vendors has left organizations like yours vulnerable. Join Brian to discuss the emergence of endpoint malware and the new class of security solutions that can detect threats early and across more points in the kill chain.

Speaker biography: Brian Orr is a Certified Security Professional with over 20+ years of experience in the IT community. The vast majority of his career has been spent as a technical representative for various vendors that offer either business-critical or mission-critical software-based enterprise solutions. Each of the various technologies addresses a certain aspect / layer of a Defense-in-Depth Security Strategy. His diverse & extensive background includes best-of-breed offerings in the areas of Middleware, SOA, J2EE, EAI, SNA, VoIP, FIM, Compliance, DLP, Encryption, & AWL. He is currently working as a Systems Engineer for Bit9 – specializing in Advanced Threat Protection for Endpoint & Server Security.

Schedule

5:45-6:15PM Networking/Membership signup / Dinner
6:15-7:15PM Presentation
7:15-7:45PM Q&A

Location Information

Metro Health Conference Center
2225 Main Street
Wyoming, MI, 49519

Map