GrrCon 2016 recap

The board of (ISC)² West Michigan Chapter were very happy to again receive the support of the GrrCon community. All attendees received a (ISC)² flyer in their conference bags and the fine folks at GrrCon were nice enough to donate booth space to the Chapter on the exhibition floor.  We were glad to be able to meet so many of you.

img_1291

We’re looking forward to welcoming all of the new members and hope to see you at a meeting soon. Once again we’re all lucky to have such an awesome infosec con right in our backyard. Looking forward to GrrCon 2016 already!

October, 2016 Chapter Meeting

Our October chapter meeting is on Wednesday, October 5th, 2016 at 5:45PM. Please RSVP if you plan on attending!

FBI Agent Presentation Surrounding Ransomware

Abstract: Special Agent Don Whitt will be providing a technical presentation on the increased issues the FBI has seen surrounding Ransomware.

Speaker Biography: Special Agent Don Whitt is the Grand Rapids-based Cyber Agent for the Federal Bureau of Investigation. SA Whitt has worked for the FBI for over six years researching and addressing cyber threats. He has published reports on advanced persistent threats, cyber-terrorism, malware analysis and social media vulnerabilities. He also has extensive experience pertaining to threats and vulnerabilities to the confidentiality, integrity and availability of telecommunication providers.

Schedule

5:45-6:15PM Networking/Membership signup / Dinner
6:15-7:15PM Presentation
7:15-7:45PM Q&A

NEW LOCATION Location Information

Metro Health IT Facility
985 Gezon Parkway (across from Target loading dock)
Wyoming, MI, 49519

Map

September, 2016 Chapter Meeting

Our September chapter meeting is on Wednesday, September 7th, 2016 at 5:45PM. Please RSVP if you plan on attending!

Incident Response Safari: An expedition to build your own First Responder Toolkit

Abstract: The presentation will cover the lessons learned when preparing and planning for incident response. We will go over incident handling lifecycle management including different tools and techniques to detect, record, contain, and analyze cyber security incidents. The presenter will share a First Responder toolkit with cheatsheets, process flows, and open source tools to help those getting started with triaging, sniper forensics, and traditional forensics to preserve, document, collect, and even analyze digital artifacts and evidence. The presenter encourages audience participation and information sharing of related lessons learned, tools, and techniques for the benefit of all participants.

Update: content from Vel’s presentation can be found here.

Speaker Biography: Vel Pavlov is West Michigan information security professional with over 10 years of experience in the field. He is currently IT Security Coordinator managing a team of four (three full-time and one part-time) employees and all IT Security related initiatives for Ferris State University. Outside of the management responsibilities, Vel’s focus is on risk and vulnerability assessment, incident handling lifecycle management, and building information security program based on ISO27001/27002 framework. Vel holds a number of certifications including CISSP, C|EH, C|HFI, C)PTE, ITILv3 Foundations, Security+, A+, Rapid7 Certified Nexpose Administrator, and Metasploit Pro Certified Specialist. He is also chapter co-author in reference books on the subjects of mobile malware (Mobile Technology Consumption: Opportunities and Challenges authored by Dr. Barbara Ciaramitaro) and digital antiforensics (Digital Forensics Explained by Dr. Greg Gogolin). Vel serves as an adjunct faculty and cyber security course designer for Excelsior College, Ferris State, and most recently Walsh College. His motivation is to help the learners to diversify the theoretical curriculum with applicable hands-on experience in cyber security offense and defense.

Schedule

5:45-6:15PM Networking/Membership signup / Dinner
6:15-7:15PM Presentation
7:15-7:45PM Q&A

NEW LOCATION Location Information

Metro Health IT Facility
985 Gezon Parkway (across from Target loading dock)
Wyoming, MI, 49519

Map

May, 2016 Chapter Meeting

Our May chapter meeting is on Wednesday, May 4th, 2016 at 5:45PM. Please RSVP if you plan on attending!

An IT auditor’s Perspective On Auditing IT Security Departments and Professionals

Abstract: I am being audited, what should I know before the auditors arrive? Who gets interviewed? Are there different types of audits and does this one matter? The auditors are using unfamiliar terms! Should I prepare? What are “findings” and “observations” and am I getting fired? How long do I have to correct the items?

Speaker Biography: John Weller, CISSP, CSSLP, CISA, CGEIT. With 30 years IT experience, I have safe guarded corporate data assets in various roles, including nine years as an IT auditor/manager and currently as Chief Information Security Officer for Metro Health Hospital. My approach is to continually assess our strengths, weaknesses, and compliance requirements and work within the culture of the organization to achieve manageable change. This is the best job ever as every day I get to utilize my auditing and geek skills. My favorite part of my job is reviewing our cyber security strengths and weaknesses and working on shoring up the gaps. Securing a hospital with thousands of medical devices and workforce members and hundreds of vendors can oftentimes be exciting, and we make it manageable through the use of refined strategies and project plans, and a heavy reliance on the skilled systems administrators.

A few thoughts: When confronted with new equipment on the network, the first answer is not “no”, but more about how can we secure it. When reviewing a new vendor access request, the conversation focuses on how our organization can control when the vendor is accessing our systems. When we send data externally, we verify it is encrypted or de-identified, and that the vendor is capable of managing the data within their systems. Deliver one strategy power point per month to communicate and align efforts. Practice incident response frequently even on low risk events to keep the process alive.

Industries covered: Financial services “Gramm-Leach-Bliley Act (GLB Act or GLBA) regulated”, healthcare “HIPAA regulated”, and food distribution (mostly unregulated for IT).

Graduate of Ferris State University with Bachelors in Computer Information Systems (CIS)

Memberships:
ISC2 West Michigan Chapter
ISACA West Michigan Chapter
WMCSC West Michigan Cyber Security Consortium
MiHCC Michigan Healthcare Cyber Security Counsel

Schedule

5:45-6:15PM Networking/Membership signup / Dinner
6:15-7:15PM Presentation
7:15-7:45PM Q&A

NEW LOCATION Location Information

Metro Health IT Facility
985 Gezon Parkway (across from Target loading dock)
Wyoming, MI, 49519

Map