Identity and Access Management in the Cloud: Emerging Vendor Showcase | |||
|
The quarterly ISSA Utah Chapter 1/2-Day security seminar. Includes breakfast and lunch.
1) Securing the Virtual Environment | How to Defend the Enterprise Against
Presenter: Matthew Wallace, Director of Product Development, ViaWest, Inc.
2) Best Practices, Audit and Control for an Enterprise Vulnerability Management Program
Presenters: Grant Johnson & Jeff Buzzella, Qualys
3) IT Risk Management: Because You Can Have Too Much Security
Presenter: David A. Nelson, Jr. CISSP, Founder of Integrity Technology Systems
Keynotes
- Protecting Privacy on the Internet, Pete Ashdown
- DNS Exploitation, Cricket Liu, INFOBLOX
Dozens of Presentations plus Presenters Party
Other Things
- Hacker Challenge Game
- Ham Radio Training/Exam
- PGP Key Signing Event
- After Dark Labs
- Paintball Event ($15-20 extra)
The $200 fee covers the following:
- Access to all 4 Days of the Conference.
- Lunch provided on-site Tues-Thur.
- All-You-Can-Drink beverages during the con.
- All Conference Equipment (~$70/person).
- Dinner on Thursday Night.
- Parking that the venue.
White Collar Crime Seminar
Hosted by the Utah Area Chapter, Association of Certified Fraud Examiners
Thursday and Friday, October 17-18, 2013
Salt Lake Community College, Taylorsville Redwood Campus
(2-page seminar info flyer: 2013 Utah Area Chapter Seminar)
Topics & Presenters
The State’s Best Practices for Detection and Prevention
Governor Gary R. Herbert, Utah State Governor
Procurement Fraud: Finding The Smoking Gun
Brian Payne, Author: White Collar Crime — Vice Provost, Graduate/Undergraduate Academic Programs at Old Dominion University
Conducting Effective Suspect Interviews
Alan Peters, Special Agent, Retired — Federal Bureau of Investigations
Third-Party Risk Management: An Added Dimension in a Corporation’s Ethics and Compliance Program
Sheri Fitzpatrick, CEO — Perfect Home Living
The IRIS Database, a Tool to Prevent/Detect Fraud
Scott Morrill, Program Manager — Investigations Division, Utah Attorney General’s Office
Financial Statement Fraud
Heidi George, Securities Examiner — Utah Division of Securities
The Fight Against Fraud: a Reporter’s Perspective
Tom Harvey, Reporter — Salt Lake Tribune
CyberCrime: Uncovered
Antonio Pooe, CEO — Exactech Forensics
Tax Fraud 2013
Matthew Bird, Criminal Investigator, Internal Revenue Service
Media & Insurance Fraud Schemes
Frank Scafidi, Public Affairs Director, National Insurance Crime Bureau
Paraben’s PFIC Conference has been an annual event since 2008. Since that time it has rapidly evolved into a higher attended conference with a broader scope of topics reaching from deeply technical into the legal aspects of the forensics and eDiscovery industry. Those who attend PFIC are as diverse as our topics, from law enforcement and lawyers, to corporate entities, government agents, private investigators, and educational institutions. If you haven’t had the opportunity to attend, this is your chance to experience the fresh air and mountains of Utah as well as the fresh topics that will be the highlight of this year’s conference. If you’ve already attended, then you know what to expect and are as excited as we are about it!
The Holidays are Here!
We will be hosting the chapter’s annual holiday luncheon on Dec 5. This luncheon is free to chapter members.
Our speaker this year is Pete Ferguson, of eBay Inc., who will discuss Why and How to Partner with Physical Security. Pete’s remarks should provide an interesting focal point for the event. Please come and enjoy the afternoon with ISSA Utah. We look forward to seeing you there!
Speaker: Pete Ferguson, Manager, Safety & Security Program Development, eBay Inc
Topic: Why and How to Partner with Physical Security
Securing people and places often are overlooked when compared to information security risks. Preventing people physical access to your facility as well as ensuring a good people-based crisis management program are in place are critical to the overall security strategy.
Speaker Bio: Pete has worked with eBay since it first came to Utah in 1999. With only 1,500 global employees at the time, he was on the ground level and responsible for introducing safety and security policies and practices to Utah -– and shortly thereafter to many additional locations as the company grew. He has served as a manager for global customer service locations and regional manager for both the Americas and Asia Pacific regions. With an educational and experiential background in Communications, Public Relations, he is now responsible for policy, awareness, and auditing programs for eBay’s 500+ global Safety and Security team. He also hold his Certified Protection Professional (CPP) designation from the American Society of Industrial Security (ASIS).
RSVP Today!
To obtain an accurate count of those who will attend our upcoming holiday luncheon please RSVP at: http://www.rsvpmenow.com/, with the event code: 26453.
Another option would be to use this QR code from your smart phone.
Conference, September 16th
Keynote – Mark Weatherford, Principal, The Chertoff Group
Why Targeted ICS Threats Call for Intelligence? – Michael Assante, Director, ICS & SCADA, SANS Institute
Counterintelligence: A Seat At The Table – Ray Batvinis, Professor, The George Washington Unviersity, FBI Supervisory Special Agent (Ret.)
Why Building An Intelligence Team Is Important For Critical Infrastructure Asset Owners – Kristan Wheaton, Associate Professor of Intelligence Studies, Mercyhurst University
Situation Awareness: From Zero To Sector Scale – Ben Miller, Senior Cyber Security Specialist, ES-ISAC
Building Intelligence Infrastructure To Protect Your Critical Infrastructure – Meredith Wilson, Principal Consultant and Advisor, Emergent Risk International
Developing An Internal Threat Intelligence Function – Darin Olton, Principal, Threat & Vulnerability Management
Intel Analyst training, September 17th and 18th:
- Understanding the intelligence challenge for critical infrastructure
- Real time risk management
- Cyber defense competency model
- Intelligence and Situational Awareness
- Situational awareness and intelligence requirements generation and gap analysis
- Situational awareness and threat intelligence tools
- Using OSINT tools to satisfy intelligence requirements
- Getting inside the OODA loop
- Attack Planning and Targeting
- Attacker characterization
- Threat identification
- High value target identification
- OSINT targeting
- Targeting countermeasures
- Creating and Using Situational Awareness and Threat Intelligence
- Attack scenario generation
- Indicator list development
- Review of intelligence management tools
- Analyzing and actioning incoming intelligence
- Review of cyber intelligence providers
- Development of an internal security ontology
- Industrial Control Systems Cyber Threat Environment
- OSINT analysis using ICS knowledge
- OSINT walk-down for ICS-related threat information
- Information Sharing
- Comparison of information received through info-sharing organizations/initiatives
- Infrastructure I&A Competition