October Chapter Meeting

Our October chapter meeting is on Wednesday October 1st, 2014 at 5:45PM . Please RSVP if you plan on attending!

We plan to hold the October meeting but as many of you are aware we have not had a monthly meeting for 3 months.  We are faced again with the reality of not having a guest speaker for October.

We plan to discuss the following agenda items:

  • Member participation in finding presenters
  • Ideas to keep the Chapter moving forward
  • Ideas for different format or frequency
  • Round table discussion. Some possible current security events to discuss:
    • Home Depot breach.
    • Advanced Persistent Threats some ideas on ways different organizations deal with them.

Schedule

5:45-6:15PM Networking/Membership signup / Dinner
6:15-7:15PM Presentation
7:15-7:45PM Q&A

Location Information

Metro Health Conference Center
2225 Main Street
Wyoming, MI, 49519

Map

June Chapter Meeting

Our June chapter meeting is on Wednesday June 11th, 2014 at 5:45PM . Please RSVP if you plan on attending!

**Note this month we’re meeting on the second Wednesday instead of the first**

Babel Revisited: Lessons from an IPv6 Transition

Abstract: The IRS orchestrated the documentation and implementation of IPv6 security requirements despite organizational and contractual obstacles. Cross-functional technical and business teams collaborated to tackle these challenges and socialize the IP4-IPv6 transition. Wisdom and actionable guidance for use by other teams arose out of the din of organized conflict.

Speaker biography: Steven F. Fox is the Sr. Cybersecurity Officer assigned to the IRS’ Foreign Accounts Tax Compliance Act (FATCA) International Dialogue. His work focuses on balancing FATCA security requirements against the privacy requirements of participating countries. Mr. Fox brings a cross-disciplinary perspective to the practice of information security; combining his experience as a security consultant, a Sr. IT Auditor and a systems engineer with principles from behavioral/organizational psychology to address security challenges. Steven is a syndicated blogger covering IT Governance, Risk Management, and IT-Business fusion topics. His speaking engagements include Blackhat’s Executive Summit, RSA Conference USA, Hacker Halted, Security B-Sides Chicago/Detroit/Las Vegas, and GrrCon. He also volunteers his time to the Ponemon Institute, Security BSides Detroit and the MichSec security organization.

Schedule

5:45-6:15PM Networking/Membership signup / Dinner
6:15-7:15PM Presentation
7:15-7:45PM Q&A

Location Information

Metro Health Conference Center
2225 Main Street
Wyoming, MI, 49519

Map

May Chapter Meeting

Our May chapter meeting is on Wednesday May 7th, 2014 at 5:45PM. Please RSVP if you plan on attending!

Social Engineering and its Role in Breaches

Abstract: The discussion will be focused on social engineering. Social engineering played a part in nearly every major hack or breach in 2013 yet it still stays in the background when we consider security controls. This is something that needs to change as we move forward and everyone, every single employee, co-worker, etc, is a living breathing open port into our systems just waiting to be compromised.

Speaker biography: R. Jason Toy is a Security Engineer & Splunk Architect at CentraComm.

Schedule

5:45-6:15PM Networking/Membership signup / Dinner
6:15-7:15PM Presentation
7:15-7:45PM Q&A

Location Information

Metro Health Conference Center
2225 Main Street
Wyoming, MI, 49519

Map

April Chapter Meeting

Our April chapter meeting is on Wednesday April 2nd, 2014 at 5:45PM. Please RSVP if you plan on attending!

To Catch a Thief: Preventing the Next Fortune 500 Data Breach

Abstract: The evolution of the threat landscape continues to challenge security programs within organizations worldwide. With the increasing complexity of advanced persistent threats and BYOD culture, organizations must adapt to protect critical assets from both internal and external threats. Last year, a major medical manufacturing company was targeted by one of its own employees and prevented the breach. Topics discussed include the following: anatomy of the attempted breach; Designing and implementing a critical asset protection program; How to leverage Data Loss Prevention (DLP) technology to safeguard your organization’s critical assets.

Speaker biography: With over 20 years of experience heading up major initiatives for leading organizations around the globe, Robert Eggebrecht’s knowledge and understanding of business development, information security and global product and service launches is extensive. Prior to founding BEW Global, Robert Eggebrecht was an integral part of several high-technology businesses offering solutions including enterprise business applications, communications and information security. He held positions with TicketMaster businesses offering solutions including enterprise business applications, communications and information security. He held positions with TicketMaster, Qwest, Level 3 Communications, Gemplex and Virtela, working domestically throughout the US as well as internationally on assignments in Tokyo, London and Denmark. In these positions Rob was primarily focused on corporate finance, product management, business development and technology based service delivery. He holds a degree in International Business from the University of Denver and management certificates from Georgetown and Stanford University. Rob is an active member in the ISO 27000 community and successfully completed the ISO 27001 Lead Auditor Course and exam.

Schedule

5:45-6:15PM Networking/Membership signup / Dinner
6:15-7:15PM Presentation
7:15-7:45PM Q&A

Location Information

Metro Health Conference Center
2225 Main Street
Wyoming, MI, 49519

Map

March 2014 Chapter Meeting

Our March chapter meeting is on Wednesday March 5th, 2014 at 5:45PM. Please RSVP if you plan on attending!

Next Generation of Protection for Network and Endpoint Security – Application Whitelisting & Advanced Threat Detection

Abstract: Over the past decade, the volume of malware produced and potentially infecting organizations, has multiplied by orders of magnitude. The scope of the threat, in conjunction with little to no innovation by traditional security vendors has left organizations like yours vulnerable. Join Brian to discuss the emergence of endpoint malware and the new class of security solutions that can detect threats early and across more points in the kill chain.

Speaker biography: Brian Orr is a Certified Security Professional with over 20+ years of experience in the IT community. The vast majority of his career has been spent as a technical representative for various vendors that offer either business-critical or mission-critical software-based enterprise solutions. Each of the various technologies addresses a certain aspect / layer of a Defense-in-Depth Security Strategy. His diverse & extensive background includes best-of-breed offerings in the areas of Middleware, SOA, J2EE, EAI, SNA, VoIP, FIM, Compliance, DLP, Encryption, & AWL. He is currently working as a Systems Engineer for Bit9 – specializing in Advanced Threat Protection for Endpoint & Server Security.

Schedule

5:45-6:15PM Networking/Membership signup / Dinner
6:15-7:15PM Presentation
7:15-7:45PM Q&A

Location Information

Metro Health Conference Center
2225 Main Street
Wyoming, MI, 49519

Map