Our sixth and last member meeting for 2016 will be held December 20th, 1:00-4:00pm, at the Ewald Conference Center in St Paul. Come out and join us for our informative presentations and great networking with your coworkers, colleagues and friends!
- Social networking: 1pm – 1:30pm
- President and Board opening statements: 1:30pm – 1:50pm
- Presentation: 1:50 – 2:40pm
- Break: 2:40pm-2:50pm
- Presentation: 2:50pm – 3:40pm
- Drawings and closing remarks: 3:40pm – 4pm
- Happy Hour
Right after the chapter meeting, join us at the Surley Brewing Co. for a happy hour social/networking opportunity and visit with your friends and colleagues.
Essentials of Incident Response
The RSA® Essentials of Incident Response focuses on why incident response capability is required to combat today’s advanced threats. Unfortunately, there is no automated “easy button” that provides 100% security. We will review the relationship between security controls and threat detection, the roles required for sustained operations, and provide a model for operational success.
Shane Harsch, CISSP
Shane is an information security professional with over 25 years of experience ranging from military to manufacturing to security consulting and professional services. He has managed and architected SOCs for the military and managed service providers. Shane is a commissioned officer in the US Army with a Masters in Business (MBA), and maintains the following certifications: intrusion analyst (GCIA), incident handling (GCIH), enterprise defense (GCED), and information security (CISSP). Shane is currently with RSA as a Senior Solution Success Manager.
Attacks on Enterprise Social Media
Current threat vectors show targeted attacks on social media accounts owned by enterprises and their employees. Most organizations lack a defense-in-depth strategy to address the evolving social media threat landscape. The attacks are outside their network, commonly occur through their employee’s personal accounts, and circumvent existing detection technologies. In this presentation we’ll explore the taxonomy of social media impersonation attacks, phishing scams, information leakage, espionage, and more. We’ll then provide a method to categorize these threats and develop a methodology to adapting existing incident response processes to encompass social media threats for your organization.
Michael T. Raggo, CISSP, NSA-IAM, CCSI, ACE, CSI
Michael, Chief Research Scientist, ZeroFOX (CISSP, NSA-IAM, ACE, CSI) has over 20 years of security research experience. His current focus is social media threats impacting the enterprise. Michael is the author of “Mobile Data Loss: Threats & Countermeasures” and “Data Hiding: Exposing Concealed Data in Multimedia, Operating Systems, Mobile Devices and Network Protocols” for Syngress Books, and contributing author for “Information Security the Complete Reference 2nd Edition”. A former security trainer, Michael has briefed international defense agencies including the FBI and Pentagon, is a participating member of FSISAC/BITS, and is a frequent presenter at security conferences, including Black Hat, DEF CON, Gartner, RSA, DoD Cyber Crime, OWASP, HackCon, and SANS.
Are non-members and guests welcome at meetings and events?
Yes, we welcome individuals at large from the security community to join us for any of our events. We simply ask that, after experiencing personally the value of our community at two events, individuals consider joining ISSA for the additional benefits that membership provides.
Why do we have to register to attend meetings and events?
Besides assisting the board with planning logistics for our events, registering for meetings and events, then checking in when you attend, provides you with self-service documentation you can print out to support your CPE credits if you are audited.
Do I have to bring my printed ticket to the event?
No, printed tickets are not necessary, you will still be able to check in. However, having a printed or electronic copy of your ticket does speed up the check in process.
***Information/image release. By registering for this event, I agree that:
- I am allowing my contact information included in the registration to be shared with MN ISSA and I may be contacted by MN ISSA
- I grant MN ISSA and/or ISSA International the right to use any candid photos or videos taken during the event in future marketing and communication efforts, to include, but not limited to, websites, brochures, advertisements, magazines, newspapers, newsletters, emails, videos and web conferences.