Skip Main Navigation
Page Content

Save This Event

Event Saved

Alamo ISSA and ISACA Meeting- August 21st, 2018

Tuesday, August 21, 2018 from 12:00 PM to 4:00 PM (CDT)

Alamo ISSA and ISACA Meeting- August 21st, 2018

Ticket Information

Ticket Type Remaining Sales End Price Fee Quantity
Member - ISSA or ISACA
Please bring an electronic or paper copy of the ticket to the ISSA meeting. We'll be scanning the bar code from the tickets in order to replace the previous entry and member check-in process.
132 Tickets Aug 21, 2018 $30.00 $0.00
Guest   more info 28 Tickets Aug 21, 2018 $35.00 $0.00
Active Military Member   more info 28 Tickets Aug 21, 2018 $15.00 $0.00
Full Time Student (12 Hours)   more info 29 Tickets Aug 21, 2018 $15.00 $0.00

Share Alamo ISSA and ISACA Meeting- August 21st, 2018

Event Details

Alamo ISSA and ISACA Meeting on August 21st, 2018
Maggiano’s Little Italy – The RIM 17603 I-10
San Antonio, TX 78257 Noon until 4:30 PM

Benefits of attending this joint Alamo ISSA and ISACA Meeting:

The meeting gives you the opportunity to earn 3 CPE’s toward your certifications.
Network with other information security professionals in the area.
Lunch is included with your ticket.
After the meeting, a mixer sponsored by Cisco will be held until 6:30 PM in Maggiano’s Bar area.


Speaker: Jesse Oranday, Frost Bank


Bio: Jesse Oranday is the lead Red Hat System Administrator for Frost Bank. With over 30 years of experience in the IT field as a Unix Administrator, Jesse has worked on HPUX, Solaris, IRIX and Linux based platforms. His recent focus has been the implementation of automation processes in support of application deployment and security compliance in a standardized environment.


Title: Roadmap to Red Hat Standardization: Your mileage may vary


Abstract: With year after year growth in the number of Red Hat systems at Frost, the implementation of automated deployments for applications and core builds became a requirement, not a goal. Additionally, the emergence of several fast-paced Agile teams necessitated the change in the System Admin role from active project team member to centralized support. This discussion will cover the use and issues with deployment of software tools like Red Hat Satellite, Jenkins, Chef, Centrify and Lieberman ERPM in an enterprise environment from the System Admin perspective.


Speaker: Rob Kraus, Senior Director, Global Threat Intelligence Center Operations, NTT Security


Bio: Rob is currently responsible for coordination and facilitating operations and key projects within NTT Security’s Global Threat Intelligence Center (GTIC). Rob is a Certified Information Systems Security Professional (CISSP), specializing in vulnerability research, malware analysis, threat intelligence, web application security assessments, external and internal penetration testing, and social engineering. Rob is also the author of the Seven Deadliest Windows Attacks and Co-Author for the Seven Deadliest Network Attacks books, part of Syngress Publishing’s Seven Deadliest Attack Series.


Title: NTT Security 2018 Global Threat Intelligence Report Key Findings and Highlights


Abstract: Cybercrime remains a pervasive threat; attractive and lucrative in its ability to generate profits with minimal risk of attribution or interdiction. Barriers to entry are reducing due to the diversification of illicit subscription services, automated software toolkits, and vast online criminal support forums. Cybercriminal ingenuity continues to mature, making the most of attack opportunities arising from new technology adoption. In this presentation, we explore the findings of the NTT Security Global Threat Intelligence Report and provide insights to guide your security investment decisions aligned with your industry sector, geographic profile, and risk appetite. We share notable insights into the evolving and emerging threat landscape, including ransomware, threat intelligence, industry targeting, and compliance regulations observed during the past year.

Speaker: Mike Herr

Bio: Mike Herr is a Senior SIEM Consultant with McAfee where he designs, installs, and configures the McAfee SIEM. He advises customers on the integration of log sources, threat data and creation of content to meet their security monitoring and compliance requirements. In his 21 years of experience, Mike has worked in various roles such as system administration, information assurance, network defense, and security operations. Mike is retired Air Force and holds a Master’s degree in Computer, Information and Network Security from DePaul University and has CISSP, C|EH, and GCIH certifications.


Title: SECMON Use Cases: A Love-Hate Relationship


Abstract: Security Monitoring is essential to any security operation, but with blurred boundaries, thousands of users and systems, and millions of events it can become an arduous task. How do you determine what to monitor, alert on, and respond to? Depending on your toolset, you may have vendor generated content, but that may not meet all of your monitoring requirements. How do you transform that bright idea for monitoring the latest threat into vetted and actionable content? The answer is defining a SECMON use case. This talk will define what a security monitoring use case is, discuss best practices, and provide sources for generating new use cases. After this talk, hopefully you will have more Love than Hate for SECMON Use Cases.

Have questions about Alamo ISSA and ISACA Meeting- August 21st, 2018? Contact

Save This Event

Event Saved

When & Where

Maggiano's Little Italy
17603 Interstate 10
San Antonio, TX 78257

Tuesday, August 21, 2018 from 12:00 PM to 4:00 PM (CDT)

  Add to my calendar

Please log in or sign up

In order to purchase these tickets in installments, you'll need an Eventbrite account. Log in or sign up for a free account to continue.