September 4, 2015


      NEOISF September 16, 2015 Meeting

—< NORTHEAST OHIO INFORMATION SECURITY FORUM MEETING
—< Wednesday September 16, 2015
—< 6:30 PM – 8:00 PM
—< Pizza and social start 6:00 PM
—< Location: OEC at 4205 Highlander Pkwy Richfield, OH 44286
—< Open to everyone and free as always

The Northeast Ohio Information Security Forum will hold our monthly meeting at the above date and time.

Agenda:

Running a Threat Based Vulnerability Management Program
by Ryan Whalen from Tenable Network Security

Security organizations have no problem finding vulnerabilities on enterprise networks – the volume of security data is constantly growing. The greater challenge is sifting through this data to determine which of these vulnerabilities pose the greatest risk to the business and prioritizing remediation efforts. Using available threat data and performing attack path analysis enables a strategic, threat-based approach to vulnerability management and remediation.

Ryan’s, BIO:
Ryan is a Sales Engineer at Tenable Network Security, where he works with customers on leveraging Tenable’s products to improve their security programs.  Ryan has worked in the IT security industry for over 10 years and has assisted many enterprises in improving their vulnerability management programs.  Prior to joining Tenable, Ryan was an IT risk manager at Nationwide Insurance and a principal security consultant at Jacadis (www.jacadis.com).

How to Speed up Your Shell Scripts
by Ed Smeltz

If you were the coach of a track team and you wanted to win a relay race, you would naturally want to pick your best runners at that distance for that relay team. Shell programming is no different in that some commands are dramatically faster than others at a given task. And some ways of combining and using commands in shell are significantly faster than others. We will examine the issues involved and discuss specific techniques to get the most performance out of your shell scripts.

Ed’s Bio:
With more than three decades of IT experience, Ed Smeltz is a senior technical consultant with Rolta Advizex. The author of the “High Performance Linux Shell Programming Reference,” he combines the application acceleration techniques he pioneered and implemented at Motorola Fort Worth in the 1980’s with the bash/korn/bourne shell programming he has used in his work as a consultant since 1999.

 

Don’t forget to come early, starting at 6:00 PM, for pizza and pop.

Another great meeting from NEO Info Sec Forum – we hope to see you there!

 

– NEOISF Board –



del.icio.us|Digg|Furl|ma.gnolia|RawSugar|reddit|Spurl|Google|StumbleUpon



July 20, 2015


      NEOISF August 19, 2015 Meeting

—< NORTHEAST OHIO INFORMATION SECURITY FORUM MEETING
—< Wednesday August 19, 2015
—< 6:30 PM – 8:00 PM
—< Pizza and social start 6:00 PM
—< Location: OEC at 4205 Highlander Pkwy Richfield, OH 44286
—< Open to everyone and free as always

The Northeast Ohio Information Security Forum will hold our monthly meeting at the above date and time.

Agenda:

Ansible – And why it works for me
by Charles Yost from Binary Defense

A 45 minute overview of the what, where, how, and why of using Ansible. Covers alternatives, what Ansible is, what Ansible’s dependencies are, jargon pertaining to Ansible, and what it can do to make your life easier. Also includes some tips and tricks for everyday use.

Charles’s, BIO:
Charles Yost is currently a Security Developer at Binary Defense Systems. He has worked in the IT industry for over 10 years in a wide variety of roles including: Printer Technician, VoIP Systems Administrator, .Net Developer, and Web Developer. Throughout his life his number one passion is learning new skills. He can often be found researching and learning, attempting to keep up with the quickly evolving field of technology. Charles enjoys teaching and talking to others about technology and it’s many uses. He is a member of NEOISF, and attends as many InfoSec conferences as he can justify with his wife.

10 Reasons Your Security Education Program Sucks
by Kris French

Cynicism at the intentions and questionable competency of our users is rampant in information security.  We all know that a defense system is only as strong as its weakest point.  This point is too often our people.  It’s not right to blame them for this.  Security is our job, and if we recognize a weak point and don’t protect it, we’re not doing our jobs.  In this talk, I’ll walk you through the part of your job you’re ignoring, and how to do it better. 

Kris’s Bio:
Kris is the manager of application security, risk, and compliance at Hyland Software where he leads security training efforts for both technical and non-technical departments.  He is also founder of local information security group CleveSec which aims to bring security awareness outside of the echo chamber while still helping to sharpen the skills of those in the know.

Don’t forget to come early, starting at 6:00 PM, for pizza and pop.

Another great meeting from NEO Info Sec Forum – we hope to see you there!

 

– NEOISF Board –



del.icio.us|Digg|Furl|ma.gnolia|RawSugar|reddit|Spurl|Google|StumbleUpon



June 23, 2015


      NEOISF July 15, 2015 Meeting

—< NORTHEAST OHIO INFORMATION SECURITY FORUM MEETING
—< Wednesday July 15, 2015
—< 6:30 PM – 8:00 PM
—< Pizza and social start 6:00 PM
—< Location: OEC at 4205 Highlander Pkwy Richfield, OH 44286
—< Open to everyone and free as always

The Northeast Ohio Information Security Forum will hold our monthly meeting at the above date and time.

Agenda:

Where to start when your environment is f*(k3d
by Amanda Berlin from Hurricane Labs

The building blocks of getting management buy in.

Amanda’s, BIO:
Amanda Berlin is currently a Network Security Engineer at Hurricane Labs. She has been working in the IT industry for around 10 years and has worked in both public and private sector as well as spending a decent time in healthcare. She managed the internal phishing campaign at a medium size healthcare facility to promote user education about phishing and hacking through an awards based reporting program. She is a lead organizer for CircleCityCon, volunteers at many other conferences, and enjoys writing and teaching others. Amanda lives at home with her three boys and “Rabbit” the cat.

 

Untitled Second Talk
by Alex Hamerstone from TrustedSec

Alex’s, BIO:
During his career, Alex has developed literally thousands of policies and procedures for organizations of many sizes. With a solid understanding of business processes, human resources, finance, security, and technology he is uniquely positioned to provide a great deal of value to any organization.

Don’t forget to come early, starting at 6:00 PM, for pizza and pop.

Another great meeting from NEO Info Sec Forum – we hope to see you there!

 

– NEOISF Board –



del.icio.us|Digg|Furl|ma.gnolia|RawSugar|reddit|Spurl|Google|StumbleUpon



June 8, 2015


      NEOISF June 17, 2015 Meeting

—< NORTHEAST OHIO INFORMATION SECURITY FORUM MEETING
—< Wednesday June 17, 2015
—< 6:30 PM – 8:00 PM
—< Pizza and social start 6:00 PM
—< Location: OEC at 4205 Highlander Pkwy Richfield, OH 44286
—< Open to everyone and free as always

The Northeast Ohio Information Security Forum will hold our monthly meeting at the above date and time.

Agenda:

“Practical Legal and Insurance Considerations for Mitigating Cyber Liabilities”
by Isaac Figueras

Let’s face it – data breaches have become a fact of life. However, when things go wrong for companies, like the theft of personal data or the circulation of damaging email conversations, the resulting damage to a business’s hard fought reputation can be massive. In addition to the technical issues that should be considered in preparing for a breach, there are legal, compliance, and insurance issues that must be taken into account as well. This discussion will assist attendees in understanding how to find and review insurance policies, navigate legal liabilities resulting from a breach, and undertake measures to prevent a company’s employees or vendors from being its largest liabilities.

“Blue Team 101”
by Jamie Murdock & Josh Pachmayer from Binary Defence

When you think of Information Security, most people think red team. But lets face it, blue team is where it’s at. We’re going cover the basics of what the blue team is and why we need more focus on defending.

Jamie, BIO:
For over 15 years, Jamie has specialized defending, securing, and protecting corporate networks. During this time, he has built security operation centers for Fortune 500 companies, providing expert guidance in all areas of security operations. He has built incident response and threat intelligence programs, including assisting federal agencies on cyber-crime investigations. Jamie has presented at regional and national conferences on the topics of security operations centers and threat intelligence.

Don’t forget to come early, starting at 6:00 PM, for pizza and pop.

Another great meeting from NEO Info Sec Forum – we hope to see you there!

 

– NEOISF Board –



del.icio.us|Digg|Furl|ma.gnolia|RawSugar|reddit|Spurl|Google|StumbleUpon



« Newer PostsOlder Posts »

Local Security Jobs @ our LinkedIn Group!


Support our Sponsors:


Visit our friends: