Event Calendar

SLC (ISC)2 Chapter Winter Meeting – The Future of Android Security @ Adobe Systems Incorporated
Dec 7 @ 5:00 am – 7:00 am

The Future of Android Security

Presenters:  Alex Geiger and John Gluth, Green Hills Inc.

The global enterprise Android mobility market is growing rapidly, yet Android security solutions are in their infancy. We’ll discuss emerging technologies to address secure boot, data-at-rest and in-transit encryption, user authentication, and dual persona (BYOD/EOD) in an Android environment that has proven fertile to hackers. We’ll also touch on the U.S. Government initiatives to build an ultra-secure smartphone using commercial off-the-shelf technology.”

3:00 Introduction of Speakers
3:05 Presentation
4:00 Question & Answer
4:15 Speakers Depart/ISC2 Chapter Business
4:30 Light Refreshments
5:00 Depart

ISSA Winter 2014 Security Seminar @ LDS Riverton Office Building
Mar 6 @ 8:30 am – 12:30 pm
ISSA Spring 2014 Security Seminar @ LDS Riverton Office Building
May 8 @ 8:30 am – 12:30 pm
INTERFACE 2014 – Salt Lake City @ Salt Palace
Sep 11 all-day
CounterIntel Conference and Intel Analyst Training @ The Chateaux Deer Valley
Sep 16 – Sep 18 all-day

Conference, September 16th
Keynote – Mark Weatherford, Principal, The Chertoff Group
Why Targeted ICS Threats Call for Intelligence? – Michael Assante, Director, ICS & SCADA, SANS Institute
Counterintelligence: A Seat At The Table – Ray Batvinis, Professor, The George Washington Unviersity, FBI Supervisory Special Agent (Ret.)

Why Building An Intelligence Team Is Important For Critical Infrastructure Asset Owners – Kristan Wheaton, Associate Professor of Intelligence Studies, Mercyhurst University

Situation Awareness: From Zero To Sector Scale – Ben Miller, Senior Cyber Security Specialist, ES-ISAC
Building Intelligence Infrastructure To Protect Your Critical Infrastructure – Meredith Wilson, Principal Consultant and Advisor, Emergent Risk International

Developing An Internal Threat Intelligence Function – Darin Olton, Principal, Threat & Vulnerability Management

Intel Analyst training, September 17th and 18th:

  • Understanding the intelligence challenge for critical infrastructure
    • Real time risk management
    • Cyber defense competency model
  • Intelligence and Situational Awareness
    • Situational awareness and intelligence requirements generation and gap analysis
    • Situational awareness and threat intelligence tools
    • Using OSINT tools to satisfy intelligence requirements
    • Getting inside the OODA loop
  • Attack Planning and Targeting
    • Attacker characterization
    • Threat identification
    • High value target identification
    • OSINT targeting
    • Targeting countermeasures
  • Creating and Using Situational Awareness and Threat Intelligence
    • Attack scenario generation
    • Indicator list development
    • Review of intelligence management tools
    • Analyzing and actioning incoming intelligence
    • Review of cyber intelligence providers
    • Development of an internal security ontology
  • Industrial Control Systems Cyber Threat Environment
    • OSINT analysis using ICS knowledge
    • OSINT walk-down for ICS-related threat information
  • Information Sharing
    • Comparison of information received through info-sharing organizations/initiatives
    • Infrastructure I&A Competition
ISSA Fall 2014 Security Seminar @ Salt Lake Community College Larry H. Miller Campus
Sep 25 @ 8:30 am – 12:30 pm
PFIC 2014 @ Snowbird
Nov 12 – Nov 14 all-day

Two enrollment categories, each with 8 hours lab, 8 hours lecture and 8 hours training. All attendees will attend every lecture and then split based on category to custom labs and training sessions.

ISSA Holiday Luncheon and Security Keynote @ University of Utah Alumni House
Dec 4 @ 11:30 am – 1:30 pm
ISSA WIS SIG Webinar: The Art of the Ask: How to Ask for – and Get – What You Want in Your Career @ Webinar
Feb 9 @ 2:00 pm – 3:00 pm

ISSA’s Women in Security SIG webinar.

Speaker: Lori Harmon – VP of Sales, Contrast Security

Although the CEO of Microsoft may disagree, your professional destiny is not best left up to fate or “karma.” How can your boss or anyone else know what you want if you don’t ask? And according to a Frost & Sullivan report, the area in which today’s information security professionals need to improve most is communication. Whether it is for a promotion, raise, flexible hours or something else, making it known to those that can help you realize your objective is key. In this webinar, Lori will give real life examples of various “asks” that were successful in her career, as well as provide recommendations on how women in information security can ask for – and get – what they want.


Rocky Mountain Information Security Conference @ Colorado Convention Center
May 12 – May 13 all-day