Monthly Meeting: February 18, 2015

Meeting Details
Where: Expedient/Tree of Life, Upper Arlington
When: Wednesday, February 18, 2015
Time: 8:00am – 11:30am
Member Cost: FREE
Non-Member Cost: $20

Schedule:
08:00 – 08:15 : Registration with light breakfast

08:15 – 09:00 : Shawn Sines, Senior Security Analyst
Title:”Is Your Hair on Fire or are you just happy to see me?”
Subtitle: Understanding Crisis and IR Team Management

Abstract: Information Security professionals and IR tool vendors talk a lot about the detection, monitoring and response capabilities of products, but seldom talk about what makes the best mix of people to ensure your response team works. Understanding people and the psychology of how human beings react in a crisis informs our ability to build effective response capabilities within our organizations. This presentation covers the softer skills of hiring the right team, why the best team might not always be the right team and how understanding instinctual human reactions to crisis can better help you prepare for that eventual day when everything goes wrong and you’re team is left holding the baton to investigate and fend off the invaders.

Speaker Bio: Shawn Sines is a seasoned information security professional who in his career has held positions loading high explosives on attack aircraft, as a rentable mercenary building information security incident response programs, communicating sometimes bad news during a crisis and otherwise serving as that technical translation layer to technical and executive leadership. He has worked for THE large higher-education institution in Columbus, OH, spent time in the journalistic trenches at Central Ohio’s greatest surviving newspaper and now works at a global consumer products company in a senior security role.

09:05 – 9:55 : Second Topic TBD

09:55 – 11:00 : Third Topic TBD

Click here to register

Posted in Monthly Meeting | Comments Off

Monthly Meeting: January 21, 2015

Meeting Details
Where: Expedient/Tree of Life, Upper Arlington Google Maps link
When: Wednesday, January 21st, 2015
Time: 8:00am – 11:30am
Member Cost: FREE
Non-Member Cost: $20

Schedule:
08:00 – 08:15 : Registration with light breakfast

08:15 – 09:00 : Edward McCabe, Principal Consultant
Title: “Everything you wanted to know about Threat Intelligence, but were afraid to ask.”

Open presentation and discussion around this ‘Threat Intelligence’ thing we keep hearing about. We will address questions such as Why Threat Intel & Why Now? What Threat Intel is (and is not) as well as discuss common misconceptions, the pro’s and con’s, technical benefits and business value. We’ll also look at how to slay the FUD dragon when snake oil salesmen come knocking on your door.

09:05 – 9:55 : Sarah Ackerman, Technology Service Line Director
Title: Social Media as a Vector for Cyber Crime

As social networking becomes part of our day-to-day lives, individuals have found this technology as an attractive vehicle to perpetrate cyber-crimes.  The anonymity provided on social networks allows a person to easily portray another user’s identity.  Cyber criminals exploit these vulnerabilities to steal user credentials, which can in turn be used to breach a company’s network infrastructure.  This presentation will focus on the process, effects and safeguards against cyber-attacks through social networking platforms.

  • Process – Explain the various steps and methods used to carry out cyber-attacks.
  • Effect (or result) – Outline the possible ramifications of a cyber-attack to a company/network.
  • Safeguard – Demonstrate methods individuals can use to limit cyber-attacks and identify possible threats.

As the Technology service line Director at Clark Schaefer Consulting, Sarah Ackerman provides the firm with extensive experience and knowledge regarding information security, IT audit, and other technology and control related services. Sarah oversees all IT and Security related projects, responsible for the overall engagement quality and performance of the services provided to individual clients. As a CISSP and CISA, Sarah has extensive experience in delivering security services such as vulnerability assessments, penetration testing, and web application security reviews. She has consulted with numerous organizations to enhance their information systems security and privacy controls within a wide variety of industries, applying a disciplined approach in accordance with “best practice” standards. Providing technical expertise balanced with a risk-based approach, Sarah seeks to align business goals of clients with their technical strategic initiatives; her work in security operations has resulted in a proven track record of success in identifying system control weaknesses, protecting information assets, and leading clients to successful organizational changes. She has successfully served in a variety of roles including consulting, risk management, and internal audit, and is an active member of ISACA, ISSA, (ISC)2, and IIA.

09:55 – 11:00 : Third Topic TBD

Click here to register

Posted in Monthly Meeting | Comments Off