Event Calendar

Mar
14
Thu
Security Awareness: Developing a Successful Strategy (webinar) @ Webinar
Mar 14 @ 1:00 am – 2:00 am
Wednesday, March 13
2-3 PM EDT
Speakers: Mike Saurbaugh | IANS Faculty
Security awareness receives a lot of attention as organizations strive to improve and maintain an effective program. Awareness is about people, and if people are not aware, security is likely to fail. Employees remain a big target of adversarial tactics that are ever-changing. The difference between “effective” and “ineffective” is in the approach taken with the program.
In this webinar, Faculty Mike Saurbaugh will discuss security awareness and how organizations can elevate their program to be more effective. Attendees will be presented with ideas to improve their program so that they can beyond the annual “Awareness Month” and check box mandates.
Topics of discussion will include:
·         Developing  a solid foundation for your security awareness program
·         Introducing security awareness to the organization
·         Creating an awareness policy
·         Customizing awareness with role based campaigns
·         Tools and techniques
·         Measuring the results
Register at:  http://marketing.iansresearch.com/acton/form/3335/001d:d-0002/0/index.htm
Apr
19
Fri
2013 Boise ISSA Security Conference @ Boise State University
Apr 19 – Apr 20 all-day

11th Annual 2013 Boise ISSA Security Conference will be held on the Boise State University campus on Friday April 19th. The conference brings in 200-300 participants from the Treasure Valley (Boise Area) and the region; including Idaho, Eastern Washington and Oregon, Northern Nevada & Utah. The conference will bring you face-to-face with the regions decision makers and security talent. The conference features a dedicated vendor forum, numerous speaking tracks, a dedicated vendor track, and more. See http://conference.boiseissa.org/

 

May
22
Wed
Rocky Mountain Information Security Conference @ Colorado Convention Center
May 22 – May 24 all-day

The Rocky Mountain Information Security Conference (RMISC) Organizing Committee, in partnership with the Denver Chapters of ISACA and ISSA, is proud to announce the seventh annual RMISC to be held on May 22-23, 2013 in Denver, Colorado! Conference website: http://www.etouches.com/ehome/RMISCEXH2013/Home/

May
23
Thu
IANS Spotlight Webinar Series: Cloud-Based IAM Solutions @ IANS Cloud Security Webinar
May 23 @ 1:00 am – 2:00 am
Identity and Access Management in the Cloud: Emerging Vendor Showcase
May 22 2013 2:00 PM – 3:00 PM (EDT)
Jun
20
Thu
Social Networking Security Issues and Practices @ LDS Office Building
Jun 20 @ 9:00 pm – Jun 21 @ 2:00 am

Second quarterly ISSA Utah Chapter 1/2-Day security seminar. Includes breakfast and lunch.

Sep
20
Fri
iSymposium On Data Security & Privacy @ Adobe Systems
Sep 20 – Sep 21 all-day

The multi-page agenda flyer and speaker bios is 2013_i-symposium_agenda.

8:00 Check‐in, Breakfast

8:30 Welcome: Wade Sherman, VP – Lead Counsel, Digital Marketing, Adobe Systems

8:35 Keynote: CFAA: A Failed Experiment, Eric Goldman, Law Professor, Director, High Tech
Law Institute

9:30 Networking Break

10:00 Breakout: Suggestions for Accessible Documents, Hon. David Nuffer, U.S. District Court,
District of Utah

Breakout: The Surveillance State: From 9/11 to Snowden, Ben Stanley, Attorney,
TechLaw Ventures.

Breakout: Are Employees’ Smart Phones Safe Enough for Business? Scott Blackmer,
Founding Partner, InfoLawGroup LLP

11:00 Networking Break

11:15 Breakout: Exchanging Medical Records Online, Scott Rea, VP GOV/EDU Relations & Sr.
PKI Architect, Digicert

Breakout: EU Data Privacy Directive: Past, Present and Future. Lee Wright, Shareholder
Kirton & Mckonkie; Julie Park, Privacy Officer, Corp. of the Presiding Bishop

Breakout: Ethics CLE, The Cybersecurity Implications of Utah Rule of Professional
Responsibility 1.6: The Standard of Due Care Has Emerged, Matt Sorensen, TechLaw
Ventures

12:15 Lunch and State of the Net, Ben Holt, Attorney, Kilpatrick, Townsend & Stockton

12:30 Presentation of Utah Tech Pioneer Award

12:40 Lunch Keynote: Fast Failure, James Clarke, CEO & Managing Partner, Clarke Capital
Partners

1:30 Networking Break

1:45 Breakout: Getting More Security For Less with Managed Security Services, Eli J.
Martinez, IT Security Risk Manager, Corp. of the Presiding Bishop; Commander, Utah Air
National Guard

Breakout: Who Owns the Customer? James Harrison, CEO and Founder,
okcompare.com

Breakout: CLS Bank Decision, William B. Bunker, Partner, Knobbe Martens

2:45 Networking Break

3:00 Breakout: Consumer Privacy Communications – Practical Strategies for Educating
Consumers by Drafting Effective Policy Statements Across Digital Platforms, Panel,
Sharon Bertelsen, Of Counsel, Ballard Spahr, Mercedes Tunstall, Partner, Ballard Spahr

Breakout: Cloud Security and Managing Use Risks, Carl Allen, Director Information
Security, Intermountain Healthcare

Breakout: Individual Efforts to Maximize Privacy and Security of Data in an era of
Cyberstalking and NSA Surveillance. Charles L. Mudd Jr. Mudd Law Offices

4:00 After Conference Social

Sep
26
Thu
ISSA Utah – Fall Security Seminar @ LDS Office Building
Sep 26 @ 9:30 pm – Sep 27 @ 2:30 am

The quarterly ISSA Utah Chapter 1/2-Day security seminar. Includes breakfast and lunch.

1) Securing the Virtual Environment | How to Defend the Enterprise Against

Presenter: Matthew Wallace, Director of Product Development, ViaWest, Inc.

2) Best Practices, Audit and Control for an Enterprise Vulnerability Management Program

Presenters:  Grant Johnson & Jeff Buzzella, Qualys

3) IT Risk Management: Because You Can Have Too Much Security

Presenter: David A. Nelson, Jr. CISSP, Founder of Integrity Technology Systems

Oct
7
Mon
Community SANS – Implementing and Auditing the Twenty Critical Security Controls @ Double Tree Suites by Hilton Hotel Salt Lake City
Oct 7 – Oct 12 all-day

SEC566:  Implementing and Auditing the Twenty Critical Security Controls – In-Depth

Community Instructor:  James Murray, NCCI Holdings, Inc.

Other:  30 CPE/CMU; Laptop Required

Cybersecurity attacks are increasing and evolving so rapidly that is more difficult than ever to prevent and defend against them. Does your organization have an effective method in place to detect, thwart, and monitor external and internal threats to prevent security breaches?

As threats evolve, an organizations security should too. To enable your organization to stay on top of this ever-changing threat scenario, SANS has designed a comprehensive course on how to implement the Twenty Critical Security Controls, a prioritized, risk-based approach to security. Designed by private and public sector experts from around the world, the Controls are the best way to block known attacks and mitigate damage from successful attacks. They have been adopted by the U.S. Department of Homeland Security, state governments, universities, and numerous private firms.

The Controls are specific guidelines that CISOs, CIOs, IGs, systems administrators, and information security personnel can use to manage and measure the effectiveness of their defenses. They are designed to complement existing standards, frameworks, and compliance schemes by prioritizing the most critical threat and highest payoff defenses, while providing a common baseline for action against risks that we all face.

The Controls are an effective security framework because they are based on actual attacks launched regularly against networks. Priority is given to Controls that (1) mitigate known attacks (2) address a wide variety of attacks, and (3) identify and stop attackers early in the compromise cycle.

The British governments Center for the Protection of National Infrastructure describes the Controls as the baseline of high-priority information security measures and controls that can be applied across an organisation in order to improve its cyber defence.

SANS in-depth, hands-on training will teach you how to master the specific techniques and tools needed to implement and audit the Critical Controls. It will help security practitioners understand not only how to stop a threat, but why the threat exists, and how to ensure that security measures deployed today will be effective against the next generation of threats.

The course shows security professionals how to implement the controls in an existing network through cost-effective automation. For auditors, CIOs, and risk officers, the course is the best way to understand how you will measure whether the Controls are effectively implemented.

Oct
15
Tue
Utah SAINTCON @ Weber State University, Shepherd Union
Oct 15 – Oct 19 all-day

Keynotes

  • Protecting Privacy on the Internet,  Pete Ashdown
  • DNS Exploitation, Cricket Liu, INFOBLOX

Dozens of Presentations plus Presenters Party

Other Things

  • Hacker Challenge Game
  • Ham Radio Training/Exam
  • PGP Key Signing Event
  • After Dark Labs
  • Paintball Event ($15-20 extra)

The $200 fee covers the following:

  • Access to all 4 Days of the Conference.
  • Lunch provided on-site Tues-Thur.
  • All-You-Can-Drink beverages during the con.
  • All Conference Equipment (~$70/person).
  • Dinner on Thursday Night.
  • Parking that the venue.
Oct
17
Thu
White Collar Crime Seminar @ Salt Lake Community College (Taylorsville Redwood Campus)
Oct 17 – Oct 19 all-day

White Collar Crime Seminar
Hosted by the Utah Area Chapter, Association of Certified Fraud Examiners
Thursday and Friday, October 17-18, 2013
Salt Lake Community College, Taylorsville Redwood Campus

(2-page seminar info flyer: 2013 Utah Area Chapter Seminar)

Topics & Presenters

The State’s Best Practices for Detection and Prevention
Governor Gary R. Herbert, Utah State Governor

Procurement Fraud: Finding The Smoking Gun
Brian Payne, Author: White Collar Crime — Vice Provost, Graduate/Undergraduate Academic Programs at Old Dominion University

Conducting Effective Suspect Interviews
Alan Peters, Special Agent, Retired — Federal Bureau of Investigations

Third-Party Risk Management: An Added Dimension in a Corporation’s Ethics and Compliance Program
Sheri Fitzpatrick, CEO — Perfect Home Living

The IRIS Database, a Tool to Prevent/Detect Fraud
Scott Morrill, Program Manager — Investigations Division, Utah Attorney General’s Office

Financial Statement Fraud
Heidi George, Securities Examiner — Utah Division of Securities

The Fight Against Fraud: a Reporter’s Perspective
Tom Harvey, Reporter — Salt Lake Tribune

CyberCrime: Uncovered
Antonio Pooe, CEO — Exactech Forensics

Tax Fraud 2013
Matthew Bird, Criminal Investigator, Internal Revenue Service

Media & Insurance Fraud Schemes
Frank Scafidi, Public Affairs Director, National Insurance Crime Bureau