The Utah ISSA chapter has started its Twitter account: @ISSA_Utah. The content and management will be controlled by email@example.com.
Archive for Education
The Denver Chapters of the the ISSA Denver and ISACA Denver are hosting the Rocky Mountain Information Security Conference 2015 on 12-13 May at the Colorado Convention Center in Denver. Register at: RMISC Registration.
Registration fees are $190 for ISSA or ISACA Members, $290 for Non-Members, $140 for Government Employees, and $75 for Full Time Students. Use “ISSACHAPTER2015” when you register.
Computer and Enterprise Investigations Conference (CEIC) will be 18-21 May at Caesars Palace in Las Vegas. The digital-investigations event is sponsored by Guidance Software. It combines hands-on labs and lectures taught by industry professionals. It is specifically designed for incident responders and information security specialists to learn the latest security tactics and network with fellow experts from around the world.
Brian Krebs will be the featured Keynote Speaker. He is the cybercrime investigative journalist who broke the story of the Target breach.
Guidance Software has offer ISSA Utah chapter members an discount of $450 off the current registration price. See https://www.guidancesoftware.com/ceic/Pages/about-ceic.aspx for event details. Contact firstname.lastname@example.org for registration and discount.
The Annual Rocky Mountain Information Security Conference (RMISC) is the only conference of its kind in the Rocky Mountain region. A convenient, affordable knowledge-builder for IT security, audit and compliance professionals at all levels. RMISC provides the perfect blend of education, networking and opportunities that are critical to your success in today’s economy and security climate!
12-13 May 2015
Colorado Convention Center, Denver
For more information and registration, see http://rmisc.squarespace.com/
It is that awesome time of the year again. Paraben’s PFIC is near and back to the mountains of Snowbird Utah on 12-14 November 2014. There is a full agenda, larger exhibit hall, and more offerings for a broader attendee base.
There are two enrollment categories, each with 8 Hours of Labs, 8 Hours of Lectures, & 8 Hours of Training: Basic and Advanced. All attendees will attend the general lectures and then break-off into specific classes, custom labs, and training sessions based on category. By end of conference, attendees will get to attend everything in their category.
See https://www.pfic-conference.com/ for the agenda, location and registration details.
The ISSA-Utah Chapter is proud to sponsor CISSP Test Preparation Training, right here in Salt Lake City!
|When:||October 13 -15th, 2014; 8:45am – 5:00pm|
|Where:||Utah Retirement Systems
540 East 200 South
Salt Lake City, UT
Please see our flyer for all the details:
2014 CISSP Training_Flyer
Thomas R. Peltier is the president of Thomas R. Peltier Associates, and founder of the Southeast Michigan Computer Security Special Interest Group, and has taught the information security curriculum for a master’s certificate at Eastern Michigan University. Prior to this, Peltier was director of policies and administration for Netigy Corporation’s Global Security Practice. At CyberSafe Corporation, Peltier was the national director for consulting services. While employed at Detroit Edison, Tom implemented the development of a corporate information protection program that was recognized for excellence in the field of computer and information security by winning the CSI’s Information Security Program of the Year for 1996. Peltier has also served as president at Blaier & Associates, as an information security specialist for General Motors Corporation, as an information security officer for the Chevrolet-Pontiac-Canada Group and in various positions at the Chevrolet Engineering Center.
John G. O’Leary, CISSP, is President of O’Leary Management Education. His background spans four decades as an active practitioner in information systems, IT Security and contingency planning. He has designed, implemented and managed security and recovery for networks ranging from single site to multinational. John has trained tens of thousands of practitioners, and conducted on-site programs at major corporations and government facilities worldwide. He has also facilitated meetings of Working Peer Groups, where security professionals from diverse corporations share ideas, concerns and techniques. John was the recipient of the 2004 COSAC award and the 2006 EuroSec Prix de Fidelite.
The INTERFACE- Salt Lake City IT Conference series is coming back to Salt Lake City for its 10th year on September 11th at the Salt Palace.
INTERFACE is the national series of CPE accredited educational conference focused on information security, physical security, IT infrastructure (BC/DR, data storage & recovery), and enterprise communications.
For this year’s INTERFACE Conference the ISSA Salt Lake City Chapter is proud to partner with one of the nation’s top IT Conferences.
INTERFACE and ISSA would like to invite you to the Conference with a complimentary invitation to you, your staff, peers, and colleagues. Once again, the Conference is taking place September 11th at the Salt Palace.
Event Information here: http://interfacetour.com/tour/slc14/
Complimentary Registration Link Here: http://interfacetour.com/evites/slc/issa.htm
Take advantage and join your fellow ISSA members as well as the area’s top IT leaders, providers and thought leaders for the purposes of information exchange and community networking.
Lunch will be served, you will have the opportunity for CPE credits, and there is a reception following the Keynote.
KEYNOTE: Creating a Vision for the Use of Emerging Technologies in the Enterprise presented by David Fletcher, CTO, State of Utah
Other highlights include:
Presentations by: Trend Micro, Storagecraft, VEEAM, Palo Alto Networks, TW Telecom and many more……..
You will also enjoy the opportunity to speak with many top Local, Regional, and National IT providers.
Please pass the registration link on to those that would benefit from attending INTERFACE. Thanks so much and we look forward to seeing you there.
Complimentary Registration Link Here: http://interfacetour.com/evites/slc/issa.htm
See you there!
Intense School / InfoSec Institute are national providers of IT and InfoSec professional development courses. They offers ISSA members 20% off any currently valid training program. Courses/boot camps include Ethical Hacking, Computer Forensics, Web Applications Penetration Testing, CISA, CISM, etc. You must provide proof of ISSA membership to the enrollment specialist to receive the discount.
We anticipate a great seminar loaded with good information!
Special thanks to our sponsors, Qualys and Guidance Software.
Richard Thompson, Director – Professional Services, GUIDANCE SOFTWARE
“Incident Response: Six Steps for Managing Cyber Breaches”
Now that security breaches are practically unavoidable, organizations must adopt new postures to be prepared for and successfully respond to incidents at the first sign of intrusion. The speed at which you identify the breach, halt progress of infectious malware, stop access and ex-filtration of sensitive data, and remediate the threat will make significant difference in controlling risk, costs, and exposure during an incident. This presentation will outline the six essential steps to effective incident response in order to greatly increase your success in managing cyber breaches.
Dmitry Dessiatnikov, President, SECURITY AIM
“BYOD and Mobile Application Security”
The explosion of the mobile application market coupled with acceptance of “bring your own device” (BYOD) to enterprise environments comes with its unique security risks. While driven by a rise in productivity, convenience and overall user satisfaction BYOD increases the attack surface that most businesses are not prepared for. In this presentation we will cover the reasons for concern along with a live demonstration of a remote compromise of an Android phone in a corporate environment. We will also discuss the OWASP top 10 mobile risks and demonstrate some common issues with a vulnerable iOS mobile application. A free tool will be shared with the audience that can be used to assess their corporate BYOD environments.
Bri Rolston, Chief Research Geek, GkCHICK RESEARCH
“Threat Intel, Proper Use and Application.”
Case Study: Red October attacks. She will break down the threat intel used and show how to develop a technical security response plan for it. Few security teams have the ability to read threat information, understand how it affects risk, and then develop a strategic technical response.
|When:||Thursday, 6th of March 2014; 9:00 am – 1:00 pm (check-in starts at 8:30 am)|
|Cost:||ISSA and ISACA members: $35, Non-members: $50, limited seating – register today!|
|Where:||LDS Riverton Office Building (see map for directions).
Note: Those who register online prior to the event, are not required to provide photo id at the door.
|Credit:||3 CPE Credits|
|Join ISSA:||To join the ISSA at https://www.issa.org/Join.html. General membership annual fee is $110; student fee $45 per year.|
The Holidays are Here!
We will be hosting the chapter’s annual holiday luncheon on Dec 5. This luncheon is free to chapter members.
Our speaker this year is Pete Ferguson, of eBay Inc., who will discuss Why and How to Partner with Physical Security. Pete’s remarks should provide an interesting focal point for the event. Please come and enjoy the afternoon with ISSA Utah. We look forward to seeing you there!
To obtain an accurate count of those who will attend our upcoming holiday luncheon please RSVP at: http://www.rsvpmenow.com/, with the event code: 26453.
Another option would be to use this QR code from your smart phone.
Annual Holiday Luncheon 2013
Date: December 5, 2013
Time: 11:30 am – 1:00 pm
Location: University of Utah Alumni House map
155 Central Campus Drive
University of Utah,Salt Lake City,UT 84112
Cost: Free for ISSA members; $25 for non-members
Speaker: Pete Ferguson, Manager, Safety & Security Program Development, eBay Inc
Topic: Why and How to Partner with Physical Security
Securing people and places often are overlooked when compared to information security risks. Preventing people physical access to your facility as well as ensuring a good people-based crisis management program are in place are critical to the overall security strategy.
Speaker Bio: Pete has worked with eBay since it first came to Utah in 1999. With only 1,500 global employees at the time, he was on the ground level and responsible for introducing safety and security policies and practices to Utah -– and shortly thereafter to many additional locations as the company grew. He has served as a manager for global customer service locations and regional manager for both the Americas and Asia Pacific regions. With an educational and experiential background in Communications, Public Relations, he is now responsible for policy, awareness, and auditing programs for eBay’s 500+ global Safety and Security team. He also hold his Certified Protection Professional (CPP) designation from the American Society of Industrial Security (ASIS).