Archive for February 2014

2014 Spring Security Seminar

Presentations:

Download PDF Incident Response: Six Steps for Managing Cyber Breaches – Guidence Software

Download PDF BYOD and Mobile Application Security – Security Aim

Download PDF Consuming-Threat-Intel-More-Effectively_Rolston

 

Registration: Registration Closed

Download PDF  Download Flyer

We anticipate a great seminar loaded with good information!
Special thanks to our sponsors, Qualys and Guidance Software.

Speaker:

Richard Thompson, Director – Professional Services, GUIDANCE SOFTWARE

“Incident Response: Six Steps for Managing Cyber Breaches”

Now that security breaches are practically unavoidable, organizations must adopt new postures to be prepared for and successfully respond to incidents at the first sign of intrusion. The speed at which you identify the breach, halt progress of infectious malware, stop access and ex-filtration of sensitive data, and remediate the threat will make significant difference in controlling risk, costs, and exposure during an incident. This presentation will outline the six essential steps to effective incident response in order to greatly increase your success in managing cyber breaches.

Speaker:

Dmitry Dessiatnikov, President, SECURITY AIM

“BYOD and Mobile Application Security”

The explosion of the mobile application market coupled with acceptance of “bring your own device” (BYOD) to enterprise environments comes with its unique security risks. While driven by a rise in productivity, convenience and overall user satisfaction BYOD increases the attack surface that most businesses are not prepared for. In this presentation we will cover the reasons for concern along with a live demonstration of a remote compromise of an Android phone in a corporate environment. We will also discuss the OWASP top 10 mobile risks and demonstrate some common issues with a vulnerable iOS mobile application. A free tool will be shared with the audience that can be used to assess their corporate BYOD environments.

Speaker:

Bri Rolston, Chief Research Geek, GkCHICK RESEARCH

“Threat Intel, Proper Use and Application.”

Case Study: Red October attacks. She will break down the threat intel used and show how to develop a technical security response plan for it. Few security teams have the ability to read threat information, understand how it affects risk, and then develop a strategic technical response.

When: Thursday, 6th of March 2014; 9:00 am – 1:00 pm (check-in starts at 8:30 am)
Cost: ISSA and ISACA members: $35, Non-members: $50, limited seating – register today!
Where: LDS Riverton Office Building (see map for directions).
Note: Those who register online prior to the event, are not required to provide photo id at the door.
Credit: 3 CPE Credits
Join ISSA: To join the ISSA at https://www.issa.org/Join.html. General membership annual fee is $110; student fee $45 per year.