Tag Archives: 2013

August 2013 Chapter Meeting

Our August chapter meeting is on Wednesday August 7th, 2013 at 5:45PM. Larry Yob will be speaking about Data Loss Prevention (DLP). Please RSVP if you plan on attending!

Abstract: Presentation will give an overview of Data Loss Prevention (DLP) technology and definitions of data in motion, data at rest and data in use.  Strategies and lessons learned from DLP customers around the country.  Also talk about risk of an enterprise big brother DLP.

Presenter information: Larry Yob is an Information Security Officer for Ascension Health Information Services (AHIS).  Ascension Health Information Services (AHIS), part of Ascension Health Alliance, is the largest Catholic health system, the largest private nonprofit system and the third largest system (based on revenues) in the United States, operating in 23 states and the District of Columbia.  Currently with his role as Information Security Officer he is responsible for Data Loss Prevention (DLP) and regionally oversees security for 12 Health Ministry’s.

Previously he worked as a system administrator, Lotus Notes developer, Citrix administrator, and a HIPAA Security Officer for a local community mental health authority.

Presentation material

Schedule

  • 5:45-6:15PM Networking/Membership signup / Dinner
  • 6:15-7:15PM Presentation
  • 7:15-7:45PM Q&A

Location Information

Metro Health Conference Center
2225 Main Street
Wyoming, MI, 49519
Map

July 2013 Chapter Meeting

Our July chapter meeting is on Wednesday July 10th, 2013 at 5:45PM. Note the meeting is one week later than normal due to the July 4th holiday. The topic for the meeting will be BeEF – It’s what’s for dinner. Please RSVP if you plan on attending!

Abstract: The Plague once said, “We are Samurai… the Keyboard Cowboys…  and all those other people who have no idea what’s going on are the cattle… Mooo.” This talk will go in depth on BeEF – The Browser Exploitation Framework, a penetration-testing tool to attack browsers.  I will teach you how the tool works, how to hook clients, and a demo of some of its very powerful features.  We will use BeEF to pivot to internal systems, create reverse tunnels, and much more.  Finally, we will discuss some countermeasures to prevent from getting trampled by the BeEF herd.

Presenter information: Jeff Bleich is a Senior Security Consultant with Secure Ideas. He has worked in the Information Security field for the last 9 years. Jeff has a considerable amount of experience in the healthcare, manufacturing, and automotive industries. Previous to Information Security, Jeff worked in network engineering and system administration.

Jeff is very active in the Information Security community. He co-founded GrrCON, a large Information Security and hacker conference, based out of Grand Rapids, MI. He is also the president of the (ISC)² West Michigan Chapter. Jeff attends and speaks at conferences around the U.S.

Jeff has a Masters of Science degree and currently holds the GPEN, GWAPT, GCIH, CISSP, and CISM certifications.

June 2013 Chapter Meeting

Our June chapter meeting is on Wednesday June 5th, 2013 at 5:45PM. The topic for the meeting will be Securing Healthcare Information with Virtual Desktops. Please RSVP if you plan on attending!

Abstract: The strategic benefit of Virtual Desktops within healthcare is being adopted aggressively. Metro Health has been using virtual desktops with SSO in production health system-wide over the last several years. Seminar attendees will gain an understanding of how implementing a fast roaming solution with SSO leads to greater security for virtual desktop solutions and show a significant ROI for their healthcare system.

Presentation material

Presenter Information: Aivars Apsite is the Technology Strategist at Metro Health Hospital in Grand Rapids, Michigan. His responsibilities center around the strategic direction, leadership and integration of their infrastructure technologies and applications. He holds a Master’s of Science in Computer Information Systems. Prior to joining Metro Health, he has held information technology leadership positions in the insurance, telecommunications, and furniture manufacturing sectors.

Schedule

  • 5:45-6:15PM Networking/Membership signup / Dinner
  • 6:15-7:15PM Presentation
  • 7:15-7:45PM Q&A

Location Information

Metro Health Conference Center
2225 Main Street
Wyoming, MI, 49519
Map

May 2013 Chapter Meeting

Our May chapter meeting is on Wednesday May 1st, 2013 at 5:45PM. The topic for the meeting will be Mining the Spam Mailbox for fun and profit. Please join us!

Abstract: Developing situational awareness and actionable intelligence from the spam your organization receives to defend your infrastructure.

Presenter Information: Joel Weever is the Security Incident Response Coordinator for the Michigan Department of Technology Management and Budget, Office of Michigan Cyber Security. For over a decade he has stumbled, bumbled, and clawed his way through the Digital Forensics Incident Response side of IT Security for the State of Michigan and the Department of Homeland Security Operations Center (DHS-SOC). His job includes part-time Forensicator, Fireman, and Finder of Bad Things. He spends his spare time causing trouble for his management, enjoying the West Michigan shoreline, and chasing his two sons around the house.

Schedule

  • 5:45-6:15PM Networking/Membership signup / Dinner
  • 6:15-7:15PM Presentation
  • 7:15-7:45PM Q&A

Location Information

Metro Health Conference Center
2225 Main Street
Wyoming, MI, 49519

April 2013 Chapter Meeting

Our April chapter meeting is on Wednesday April 3rd, 2013 at 5:45PM. The title of the meeting will be What do you mean they’re already in our network? Please join us!

Abstract: Mandiant has created a buzz in the security community with the release of the “APT1” report. Having that intel is great and organizations should be able to take this information and search their logs for these signs of intrusions. What if you found that your company is indeed compromised? Would you or someone in your organization know how to respond to an incident of this type? This talk will focus on methods used to respond to targeted or advanced attacks. Using timeline analysis and memory forensics we will walk through the forensic data of a targeted compromise. We will begin to put those pieces of the puzzle together until we can build that picture of what happened.

Presenter Information: Jack Crook has been in information security for over a decade and has been performing incident response for over 6 years now. He currently is an Incident Handler for one of the worlds largest companies where he specializes in host / network analysis of advanced intrusions. Jack is also the founder of a local digital forensics / incident response group called mi4n6 and devotes much of his free time to the community by creating forensics challenges and mentoring others.

Schedule

  • 5:45-6:15PM Networking/Membership signup / Dinner
  • 6:15-7:15PM Presentation
  • 7:15-7:45PM Q&A

Location Information

Metro Health Conference Center
2225 Main Street
Wyoming, MI, 49519