March 10th, 2023 meeting

DATE:March 10th, 2023
TIME:2:00pm to 4:00pm (PST)
VENUE:Zoom Online meeting
TOPIC:Consumer Privacy is a Challenge for Consumers
PRESENTER: Kevin Murphy (CISSP, CISM, CGEIT)
RECORDING: 

ABSTRACT

Protect Your Privacy

How to Keep Your Data Safe

Who has your data? How did they get it? Organizations large and small collect all manner of information about you and your family, often without your knowledge. And even when it’s collected for innocent purposes, your data can still end up in the wrong hands. Many consumers don’t know they can opt out of this data collection—or how to do it.

Join Kevin Murphy, Business Information Security Officer, as he provides an in-depth look at consumer privacy, including:

The whos, whys, and hows of data collection
The potential dangers of having your data out there
How to keep your information private

BIOGRAPHY

Kevin is the Enterprise BISO (Business Information Security Office) for T-Mobile USA. He was the vice president of cybersecurity operations and governance at IOActive.com. He is a retired U.S. Air Force intelligence officer and the former director of Windows Security Architecture at Microsoft. He has over 25 years of experience in threat intelligence and information security and holds the CISM, CISSP and CGEIT security certifications.

February 10th, 2023 meeting

DATE:February 10th, 2023
TIME:2:00pm to 4:00pm (PST)
VENUE:Zoom Online meeting
TOPIC:Trusted Protector of what matters most: Identities, Access & Privilege +  2023 Cyber Security Trends
PRESENTER: Dan Deganutti (SVP and Canada Country Manager, BeyondTrust)
RECORDING: 

ABSTRACT

In this talk we will review the Top Trends/Predictions for 2023 (BeyondTrust edition) and focus in on a few in particular and how they relate to PAM and Identity. Subsequently we will dive into the tie between Identity/Access/Privileges, the key role they play in a Zero Trust model and how certain aspects are quick wins for any Cyber program.

BIOGRAPHY

I currently have the honor of leading the Canadian team here at BeyondTrust and have been with the organization for the last 6 years. Previously, I have been in the Security space for over 20 years now and have brought 5 vendors into the Canadian marketplace. Passionate about Cyber and (real) Football…don’t get me started on Italy missing the World Cup…again.

January 13th, 2023 meeting

DATE:January 13th, 2023
TIME:2:00pm to 4:00pm (PST)
VENUE:Zoom Online meeting
TOPIC:What’s Working in the Real World and What’s Not: Insights From the IBM Cost of a Data Breach Report
PRESENTER: Evan O’Regan (Associate Partner – IAM Practice – Canada)
RECORDING: 

ABSTRACT

Join IBM IAM expert Evan O’Regan as he shares real-world, practical examples illustrating the value of IAM best practices based on the annual IBM Cost of a Data Breach report and the IBM X-Force Red Incident Response Team after-action reports. Evan will share insights on how to identify and prioritize key activities, how to detect early and avoid the common IAM and Zero Trust pitfalls that often signal eventual failure for the program, as well as what to include an how to align your IAM and Zero Trust business case for success.


As a companion to the practical examples, this discussion will cover a pragmatic understanding of IAM, CIAM, and Zero Trust for the benefit of non-technical practitioners, and how to apply these principles in practice as organizations start or progress their strategy across domains such as Customer Identity and Access Management, Infrastructure and Endpoint, and in securing their Hybrid Cloud environment.

BIOGRAPHY

For over twenty-five years, Evan’s work has centered on the practical application of identity to address the evolving challenges faced by organizations in both public and private sectors. Evan has led Identity and Access Management programs for some of the world’s most recognized brands across a wide range of industries, making him a recognized thought leader in the field of digital transformation. His insights come from experience working on large complex systems as well as emerging identity technologies, blockchain, and self-sovereign identity frameworks.

December 9th, 2022 meeting

DATE:November 9th, 2022
TIME:2:00pm to 4:00pm (PST)
VENUE:Zoom Online meeting
TOPIC:The Cyber Skills Gap War
PRESENTER: Stan Engelbrecht
RECORDING: 

ABSTRACT

For years now, different companies and governments have been sounding the alarm on the talent gap in cyber security. There are a number of factors that are causing this, from the continued advancement in technology, to the ever increase attacks on individuals, businesses, and governments and the impact of workload and expectations on those working in the industry. We will look at how these areas are trending, whether or not we are actually gaining any ground, and what can be done to fix this issue and who is in fact responsible for addressing this issue.

BIOGRAPHY

Stan Engelbrecht has spent close to 7 years in the SOAR space, from a product development, deployment, and advisory role to many of the fortune 500 companies. He is the current president of the Vancouver ISC2 Chapter and Vancouver Security Special Interest Group. Stan completed his BCIS with concentrations in Systems Admin, Networking, and Security from the University of the Fraser Valley in 2015 but has been working with and tinkering with technology since his mid teens. He is currently the Director of Cyber Security Practice at D3 Security.

November 4th, 2022 meeting & AGM

DATE:November 4th, 2022
TIME:2:00pm to 4:00pm (PST)
VENUE:Zoom Online meeting
TOPIC:Advanced Persistent Cybercrime
PRESENTER: Derek Manky
RECORDING: 
The AGM was delayed from September to November.

ABSTRACT

We are seeing a shift on the threat landscape where cybercrime, including ransomware, is becoming more destructive and targeted towards high valued assets and services. Nation state attacks that target critical infrastructure, government and healthcare are now having an impact across the entire attack surface including businesses’ IT networks. This is the result of the converging threat landscape, where nation state threat actors are working jointly with cybercriminal enterprise, hitting IT and OT networks in tandem. Businesses that were not concerned of being a target from sophisticated APT attacks in the past, are now impacted. Similarly the public sector is further impacted by the larger threat of cybercrime. This elevated game from the adversary has raised the level of risk to organizations to a high watermark never seen before. FortiGuard Labs observed an increase of nearly 100% in 1H 2022 of ransomware variants, driven by the Ransom-as-a-Service (RaaS) model and a growing cybercriminal workforce.

BIOGRAPHY

Derek Manky plays a strategic and visionary role in consulting with leading CSOs/CISOs of Fortune 500 companies worldwide across multiple industries, bringing with him over twenty years of cyber security experience. He leads FortiGuard Labs’ Global Threat Intelligence Team. Mr. Manky has established frameworks in the security industry including responsible vulnerability disclosure, which has exercised the responsible handling of over 1000 zero day vulnerabilities. Manky has been with the Cyber Threat Alliance since it was founded in May 2014 and sits on the steering committee. He has helped to build collaborative platforms in the cyber security industry for over 15 years. Manky collaborates with global forums and expert groups alongside leading political figures, key policy stakeholders and law enforcement, including the World Economic Forum C4C, NATO NICP, INTERPOL, and FIRST.org. His vision is applied to help shape the future of proactive cyber security, with the ultimate goal to make a positive impact towards the global war on cybercrime.

October 14th, 2022 meeting & AGM

DATE:October 14th, 2022
TIME:2:00pm to 4:00pm (PST)
VENUE:Zoom Online meeting
TOPIC:Is the Cookie Monster compromising your identity? How cookies undermine multi-factor authentication
PRESENTER: Chester Wisniewski (Principal Research Scientist at Sophos)
RECORDING: 
The AGM was delayed from September to October.

ABSTRACT

As organizations continue to adopt multifactor authentication (MFA) criminals are now being forced to find ways around it. There has been no shortage of high-profile instances of MFA being bypassed including Electronic Arts, Uber, and YouTube. How strong are the MFA solutions we can choose from and how do criminals bypass them? Why is the Cookie Monster moving from the category of childhood friend to authentication enemy? We’ll explore all of that and more. Join us.

BIOGRAPHY

Chester Wisniewski is a principal research scientist at Sophos. With more than 25 years of professional experience, his interest in security and privacy first peaked while learning to hack from bulletin board text files in the 1980s, and has since been a lifelong pursuit. 


Chester analyzes the massive amounts of attack data gathered by SophosLabs to distill and share relevant information in an effort to improve the industry’s understanding of evolving threats, attacker behaviours and effective security defences. He’s helped organizations design enterprise-scale defense strategies, served as the primary technical lead on architecting Sophos’ first email security appliance, and consulted on security planning with some of the largest global brands.


As a former President of the Vancouver SecSIG he is grateful for no longer being responsible for the meetings, but excited to continue to share and contribute to the security knowledge of our community. You may recognize me from my appearances on Global News, CBC and CTV if you are old enough to still watch news on a TV.

September 9th, 2022 meeting & AGM

DATE:September 9th, 2022
TIME:2:00pm to 4:00pm (PST)
VENUE:Zoom Online meeting
Meeting ID: 98484395392 Passcode: 09220922
TOPIC:Decentralized Finance: Bitcoins and Blockchains and Digital Cash, Oh My!
PRESENTER: Rob Slade (M. Sc.)
RECORDING: 

ABSTRACT

NFTs and cryptocurrencies have become enormously popular, recently, but are also wildly speculative. Starting with the principles of, and research into, digital cash, we will examine valuation, fungibility, technologies, infrastructures, and the basic principles underlying this field. In addition, we will note the speculative nature of much of this “wealth.” What is a cryptocurrency? What is a currency? Starting with the concepts of value and trust, we look briefly at true digital currencies, and the shortcuts that cryptocurrencies have taken. We build an outline for the requirements for digital cash, why cryptocurrencies have only partly fulfilled those requirements, and why NFTs are even worse. Currently, “investment” in cryptocurrencies is highly speculative, and seems to be roughly equivalent to putting anticipated winnings at a casino into your stock portfolio. And, by the way, BLOCKCHAIN IS NOT THE ANSWER!!!

BIOGRAPHY

Rob Slade is an information security and management consultant from North Vancouver, British Columbia, Canada. (Or he may be an AI experiment gone horribly wrong, and hooked up to various email addresses.) He has consulted for Fortune 100 companies, has taught on six continents, gets calls from intellectual property lawyers, is frequently published in the Information Security Management Handbook, and authored “Robert Slade Guide to Computer Viruses,” “Software Forensics,” “Dictionary of Information Security,” “Cybersecurity Lessons from CoVID-19,” and two thirds of “Viruses Revealed.” He got his start in security researching viruses. (But not this type of virus.) More information than anyone would want to know about him is available at


https://twitter.com/rslade
http://en.wikipedia.org/wiki/Robert_Slade
http://catless.ncl.ac.uk/Risks/search?query=slade
http://shouldersofinfosec.pbworks.com/w/page/146046189/Rob%20Slade%20%20%28Slade%2C%20Robert%29
https://community.isc2.org/t5/forums/recentpostspage/user-id/1324864413
https://www.youtube.com/playlist?list=PLUuvftvRsRv4bMs_scU3TyBZzuvW7kpZi
http://fibrecookery.blogspot.com
https://www.amazon.com/Robert-Slade/e/B001H6MUCW

August 12th, 2022 meeting

DATE:August 12th, 2022
TIME:2:00pm to 4:00pm (PST)
VENUE:Zoom Online meeting
Meeting ID: 894 7268 0162 Passcode: 436345
TOPIC:Security Awareness programs: Why they are important and how to start one for free
PRESENTER: Anthony Green (Manager, Security Operations and Compliance – CPA BC)
RECORDING: 

ABSTRACT

Anthony has provided thousands of staff with security awareness training and during this webinar, he will talk a little bit about what he learned and how anybody can implement a security awareness program.


The first half of the presentation will start by explaining what a Security Awareness program entails and why it is essential to an organization. This will be followed up by some tips and processes recommended to be implemented company wide before implementing a program.


The second half of the presentation will be a lot more practical as we will go over some free tools that anybody can use to begin building a security awareness program for free now! E.g. Phishing Simulation, Phish Button, Email Awareness Campaigns, etc.

BIOGRAPHY

Anthony Green is currently the Manager of Security Operations and Compliance Manager (MSOC) at Chartered Professional Accountants of British Columbia.


Prior to joining CPABC, Anthony led PCI compliance as a Security Analyst for one of Western Canada’s largest retailers – London Drugs. Anthony has also been elected to serve as the President for the ISACA Vancouver Chapter after previously serving as Vice-President and Director of Communications.


In the evenings Anthony teaches the Cyber Security Micro-Credential at UBC and Security Fundamentals at VCC.


Anthony is also a co-founder of Tracer Digital, a Vancouver-based firm that aids small businesses in securing and marketing their online presence.


Anthony is very enthusiastic about giving back to the local Information Security community by mentoring young graduates and teaching local small businesses the fundamentals of cybersecurity they would otherwise not have been exposed to. Anthony curates cybersecurity resources to the general public through the CPA BCs newsroom with content such as cyber security articles and podcasts with local security leaders.

July 8th, 2022 meeting

DATE:July 8th, 2022
TIME:2:00pm to 4:00pm (PST)
VENUE:Zoom Online meeting
RSVP Required – register at Zoom
TOPIC:The Role of Physical Security in Cyber Security
PRESENTER: Gerry Sieracki (CISSP, Director of Public Relations (ISC)² San Diego Chapter, TLO, ILO)
RECORDING: 

ABSTRACT

When people think of Cyber Security the first thing most people think of are items like ransomware, patching, vulnerabilities, and hacking. Often overlooked is the most basic, fundamental level of protection, physical. In today’s world we can no longer separate the requirements for physical and cyber security. They are both reliant on one another and you cannot have one without the other. This presentation will cover some thoughts on Physical Security, how it relates to Cyber Security, and some lived through examples of incidents I’ve encountered on the job. The goal is to spark some thought and conversation on Physical Security and how it relates to Cyber Security.

BIOGRAPHY

Gerry is a seasoned IT veteran with almost 25 years of progressively responsible work in IT. He currently works as a Network Administrator in the Critical Infrastructure Water Sector focusing on networking and cybersecurity. He has been the Project Lead for several major networking (LAN\WAN) and infrastructure upgrades. Gerry works closely with external agencies such as the FBI, DHS and the SD-LECC on cybersecurity issues.

Gerry earned his CISSP in May 2015. He is a member of Infragard, MS-ISAC (Multi State Information Sharing and Analysis Center), a TLO (Terror Liaison Officer), an ILO (Infrastructure Liaison Officer), and member of the Cyberhood Watch Water and Power Sector – Los Angeles\San Diego. Gerry is trained in the National Incident Management System (NIMS) and has additional training on physical security for Critical Infrastructure.

June 10th, 2022 meeting

DATE:June 10th, 2022
TIME:2:00pm to 4:00pm (PST)
VENUE:Zoom Online meeting
RSVP Required – register at Zoom
TOPIC:Value Assurance: A Novel Approach to Information Security Programs in Organizations
PRESENTER: Sabino Marquez
RECORDING: 

ABSTRACT

The evolution of Information Security from a technical sub-discipline of IT to a strategic enabler of stakeholder value continues unabated. Join Sabino as he discusses innovations in Information Security management and outlines a novel program that places InfoSec squarely “in the business” where it can directly influence the value conversation. Value Assurance is a management strategy which reframes the Information Security function as a strategic investment that enables the Revenue and Go-to-Market strategies and can drive higher valuations at equity events. By aligning the assurance mandate to value and communicating assurance wins in revenue terms, assurance leaders can lead from behind to help accelerate revenue velocity, enable market differentiation, materially increase stakeholder trust, and ultimately help to boost valuation.

BIOGRAPHY

Sabino is an experienced assurance leader who empowers organizations through the strategic governance of their Information Security and Value Assurance programs. A natural entrepreneur and storyteller, Sabino brings over 20 years of experience in the B2B SaaS and Retail Banking sectors to help organizations create and defend ultimate value for their stakeholders. You can learn more about Sabino and his approach to leading the assurance practice here and here.

May 13th, 2022 meeting

DATE:May 13th, 2022
TIME:2:00pm to 4:00pm (PST)
VENUE:Zoom Online meeting
RSVP Required – register at Zoom
TOPIC:Disinformation and Fake News – Democracy Dies in Lies
PRESENTER: Stephen Carras
RECORDING: 

ABSTRACT

January 6th was a wake-up call for democracies and ordinary citizens around the world; fake news isn’t just some meme on social media that your annoying cousin shares to everyone, it almost brought the world’s largest democracy to its knees. While the media and ordinary citizens talk about fake news and those who perpetrate its spread, not as many know its history, and how nation states like Russia use it to influence unwitting pawns around the world. More importantly, how do we as societies (both Canada, the United States, and other nations) proactively and successfully engage with people who believe in these conspiracies and bring them back to normal views and beliefs to prevent future acts of domestic extremism from occurring.

BIOGRAPHY

Stephen is an American living in the Seattle / Bellevue area working as an Engineer, Cybersecurity at T-Mobile. He holds degrees in Security and Risk Analysis – Information and Cybersecurity, and Business with Minors in Finance and Renewable Energy from Penn State. Currently he is also pursuing a Masters in Cybersecurity Analytics and Operations from Penn State while working at T-Mobile. While he is relatively new to the world of cybersecurity, he has worked at other companies in the clean technology and finance industries before making the transition to cybersecurity. In his free time he enjoys learning new technologies, investing, and drinking Starbucks Frappuccinos.

April 8th, 2022 meeting

DATE:April 8th, 2022
TIME:2:00pm to 4:00pm (PST)
VENUE:Zoom Online meeting
RSVP Required – register at Zoom
TOPIC:Phishing, are you ready for the next small or big threat?
PRESENTER: Miles Walker
RECORDING: 

ABSTRACT

With phishing attack crimes rising 600% since covid hit, protecting against it is one of the biggest issues facing the tech world today. Miles is eager to arm you with the knowledge of how to safeguard your business from phishing where 90% of cyber crimes start and give you some real world insights and practical information to better protect you and your business.

BIOGRAPHY

Miles Walker is the Channel Development Manager of Graphus.ai, one of Kaseya’s newest acquisitions. Miles joins the team after 15 years in Sales/Marketing and Account Management in London and Toronto. He is now based in Vancouver where his professional career started in Radio @ 104.9 XFM after studying Marketing/Sales and International Business at Capilano University. When Miles is not playing basketball, travelling, sailing or collecting street art he is evangelizing all things cyber security through his LinkedIn videos, events and of course virtually!

March 11th, 2022 meeting

DATE:March 11th, 2022
TIME:2:00pm to 4:00pm (PST)
VENUE:Zoom Online meeting
RSVP Required – register at Zoom
TOPIC:Consumer Privacy is too Complicated for Consumers
PRESENTER: Kevin Murphy (CISM, CGEIT, CISSP)
RECORDING: 

ABSTRACT

The average consumer really has no idea what personal information they are sharing online and how companies (and governments) track their online behaviour. How did we get here? Come join us as we review what consumers can do to “sort of” protect their personal information online.

BIOGRAPHY

Kevin was the vice president of cybersecurity operations and governance at IOActive.com. He is a retired U.S. Air Force intelligence officer and the former director of Windows security architecture at Microsoft. He has over 25 years of experience in threat intelligence and information security and holds the CISM, CISSP and CGEIT security certifications.

February 11th, 2022 meeting

DATE:February 11th, 2022
TIME:2:00pm to 4:00pm (PST)
VENUE:Zoom Online meeting
RSVP Required – register at Zoom
TOPIC:7 Mindset Shifts for Success in the Digital World
PRESENTER: Dr. Linda Miller
RECORDING: Link to recorded session

ABSTRACT

Who knew that going digital would end up enabling a more human world. Now that we’re on the brink of international standards for equity and inclusion, sustainable practices and full transparency, how should corporations and businesses position themselves for success and avoid the dangers of a hyper-enabled population? The answer: think about what you would have done 20 years ago, and do the exact opposite.


This talk explores the 7 keys to not just surviving but thriving in a world of hyper-connectedness and constant radical change.


Outline:
Cast off Industrial Age practices and thinking
Relocate certainty, trust, and truth
Imbue meaning and purpose at all levels
Build change intelligence as a capability
Lead ‘transformationally’ day to day
Seek the breakdown then go for the breakthrough
Co-create the future

BIOGRAPHY

Dr. Linda Miller has made a career of transformative change. She has been on leading edge implementations of most major business technologies since 1978.

After a 20-year career in information technology, Dr. Miller sought to humanize how technology was implemented in public and private corporations. Her pursuit led to a PhD in spiritual psychology, post graduate work in executive coaching, and multiple certifications in running successful strategic change initiatives.

Her range of experience spans government to multi-nationals, IT governance practices to corporate restructures to consortiums. Her clients include insurance companies, banking institutions, municipal and provincial governments, mobility technology providers, and law firms.

In 2008 Dr. Miller saw the need for new business tools, techniques, and measurement models that equip leaders and teams to thrive in the high speed, high complexity and highly ambiguous contexts that have become the norm.

Over 7 years of masters and doctoral research, she developed a framework of methods and practices that enable corporations to be successful in technology driven radical change and build the capability to continuously transform. Her courses, advisory services, and published works has helped transforming organizations across Canada and around the world.

Find out more about Dr. Miller and her company at www.iMindTransformation.com

January 14th, 2022 meeting

DATE:January 14th, 2022
TIME:2:00pm to 4:00pm (PDT)
VENUE:Zoom Online meeting
RSVP Required – register at Zoom
TOPIC:Security Awareness Lessons from Dr. Bonnie
PRESENTER: Rob Slade
RECORDING: Link to recorded session

ABSTRACT


Dr. Bonnie Henry, as BC’s Chief Medical Health Officer, has demonstrably saved tens of thousands of lives over the course of the pandemic. With the regular CoVID press briefings, she has also provided a MasterClass in effective communication of complex technical subjects. This reference provides real-world examples of the most significant points in designing and implementing an effective security awareness program. It also conclusively proves, with mathematical certainty, the importance of a security awareness training program.

BIOGRAPHY

Rob Slade had his booster shot on Boxing Day, and, besides, as an old antivirus researcher, Rob knows that there is no conclusive evidence that Omicron can transmit over Zoom, so you are probably safe to attend this (virtual) meeting. On the other hand, having lost Gloria, Rob’s emotional stability is probably worse than ever, so attend at your own risk. More information than anyone would want to know about Rob is available at http://fibrecookery.blogspot.com/

December 10th, 2021 meeting

DATE:December 10th, 2021
TIME:2:00pm to 4:30pm (PDT)
VENUE:Zoom Online meeting
RSVP Required – register at Zoom
TOPIC:Operational Threat Hunting for the Enterprise
PRESENTER: Neumann Lim (Deloitte)
RECORDING:Link to recorded session

ABSTRACT


According to IBM’s 2020 Cost of a Data Breach Report, security automation solutions — including AI, analytics and orchestration — and incident response (IR) preparedness, including formation of IR teams and testing IR plans, showed the greatest reduction in data breach costs. Threat hunting is a key component in security operations and incident response preparedness. This talk will guide you through the foundations of beginning to operationalize threat hunting into your enterprise.

BIOGRAPHY

Neumann Lim is a senior manager at Deloitte where he leads the development of the services, strategies and methodologies on cyber detection and incident response. Prior to this role, Neumann spent several years working with large enterprises and governments specializing in incident response. With more than 14 years of infosec experience, he has delivered numerous cyber risk assessments, coordinated national incident responses across multiple industries. Neumann has been invited to share his thought leadership at many security conferences such as Grayhat BlueTeam Conf, DefCon Village, HTCIA Canada, Toronto CISO Summit and CCTX.

November 12th, 2021 meeting

DATE:November 12th, 2021
TIME:2:00pm to 4:30pm (PDT)
VENUE:Zoom Online meeting
RSVP Required – register at Zoom
TOPIC:Searching for the Balance: Infosec at a Different Angle
PRESENTER:Kovan Mohammed Ameen
RECORDING:Link to recorded session

ABSTRACT

Can we ever catch up to all the chaos? How far behind are we?


When do we get to rest? Will it get worse before it gets better? Will there ever be a point in time where stability is a possibility?… These and many other questions alike have a familiar tone, uncertainty. And I can say with confidence that most, if not all of us, have had questions like that at some point in our lives, regardless of the reasons behind them.
In this talk, we’ll be asking those same questions about information security, with the hopes of clearing the path to find the answers we need, whether that’s going back to the drawing board or evolving to adapt our current solutions in a new way.


Side note: There’s hope, but we need to act fast.

BIOGRAPHY

Senior Information Systems Security student at Southern Alberta Institute of Technology (SAIT). I developed a passion for hacking at just 14 years of age, at first, I wanted to become a pen tester but after pursuing post-secondary education in infosec, I found myself enjoying the educational, analytical, and research side of infosec more. My goal is to have a foundation that creates large-scale cooperation between different organizations and promotes new ways of thinking when it comes to finding long-term solutions to problems the industry faces.

October 8th, 2021 meeting

DATE:October 8th, 2021
TIME:2:00pm to 4:30pm (PDT)
VENUE:Zoom Online meeting
RSVP Required – register at Zoom
TOPIC:Shoulders of InfoSec Project
PRESENTER: Jack Daniel
RECORDING:Link to recorded presentation

Please note a portion of this meeting will be dedicated to the AGM.

ABSTRACT

When frustrated we may ask ourselves “where are we going and why are we in this handbasket?”, but we rarely have the time to really reflect on where we’re going as an industry and how we got here─and who led the way. The people and ideas which were the foundations of information security are not ancient history, yet few of us know much about them. We are too busy running to keep up and never have time to look back. In this talk we will meet some of the people who founded and advanced our field, and hear some of their stories.

BIOGRAPHY

Jack Daniel is the Community Advocate for Tenable, is a co-founder of Security BSides, a community builder, storyteller, technologist, historian, mentor, and security professional. He has over 20 years’ experience in network and system administration and security, and has worked in a variety of practitioner and management positions. Jack is a technology community activist, a podcaster, and a frequent speaker at technology and security events. Jack used to put letters after his name but he doesn’t anymore; some fell off, others were pushed.

September 10th, 2021 meeting

DATE:September 10th, 2021
TIME:2:00pm to 4:00pm (PDT)
VENUE:Zoom Online meeting
RSVP Required – register at Zoom
TOPIC:Measuring how well you are managing Information Security
PRESENTER:Walter B. Williams (CISSP, SSCP)
RECORDING:Link to recorded presentation

ABSTRACT

We create controls to manage the risk of a compromise of availability, integrity, confidentiality, privacy, control, authenticity, and utility to the organization for which we are responsible for. To understand if the controls are effective, you have to measure their performance against goals established for each control against the risk tolerance of the organization. This sounds good on paper, but is one of the hardest things to get right in the management of an information security program. We’ll examine what NIST, CIS, and ISO has to say regarding the measurement of our controls, and how to construct metrics. We’ll look at how to identify the applicable controls per each risk to your organization. We’ll construct metrics for completeness of implementation, for effectiveness, and for adverse impact to your organization for those controls and look at ways to map these back to the risks your organization is managing.

BIOGRAPHY

Walter has served as an infrastructure and security architect at firms as diverse as GTE Internetworking, State Street Corp, Teradyne, The Commerce Group and EMC. He has since moved to security leadership, where he’d served as at IdentityTruth, Passkey, Lattice Engines, and Monotype. He is an outspoken proponent of design before build, an advocate of frameworks and standards, and has spoken at Security B-Sides, Source Boston, Boston Application Security Conference, Rochester Security Summit, Wall of Sheep Village within DefCon, RiskSec Toronto and other venues . His articles on Security and Service Oriented Architecture have appeared in the Information Security Management Handbook, and he has a book with CRC press on the same topic. He has a book on How to Create an Information Security Program from Scratch which will be available for purchase on September 15. He sat on the board of directors for the New England ISSA chapter and was a member of the program committee for Metricons 8 and 10. He has a masters degree in Anthropology from Hunter College.

August 13th, 2021 meeting

DATE:August 13th, 2021
TIME:2:00pm to 4:00pm (PDT)
VENUE:Zoom Online meeting
RSVP Required – register at Zoom
TOPIC:The Role of Physical Security in Cyber Security
PRESENTER: Gerry Sieracki (CISSP, Director of Public Relations (ISC)² San Diego Chapter, TLO, ILO)
RECORDING: Link to recorded presentation

ABSTRACT

When people think of Cyber Security the first thing most people think of are items like ransomware, patching, vulnerabilities, and hacking. Often overlooked is the most basic, fundamental level of protection, physical. In today’s world we can no longer separate the requirements for physical and cyber security. They are both reliant on one another and you cannot have one without the other. This presentation will cover some thoughts on Physical Security, how it relates to Cyber Security, and some lived through examples of incidents I’ve encountered on the job. The goal is to spark some thought and conversation on Physical Security and how it relates to Cyber Security.

BIOGRAPHY

Gerry is a seasoned IT veteran with almost 25 years of progressively responsible work in IT. He currently works as a Network Administrator in the Critical Infrastructure Water Sector focusing on networking and cybersecurity. He has been the Project Lead for several major networking (LAN/WAN) and infrastructure upgrades. Gerry works closely with external agencies such as the FBI, DHS and the SD-LECC on cybersecurity issues.

Gerry earned his CISSP in May 2015. He is a member of Infragard, MS-ISAC (Multi State Information Sharing and Analysis Center), a TLO (Terror Liaison Officer), an ILO (Infrastructure Liaison Officer), and member of the Cyberhood Watch Water and Power Sector – Los Angeles/San Diego. Gerry is trained in the National Incident Management System (NIMS) and has additional training on physical security for Critical Infrastructure.