March Monthly Meeting

Wed, March 15, 2017
8:30am – 12:00 noon

Expedient/Tree of Life, Upper Arlington

Click Here to Register

PARKING NOTICE – Please park in the lot immediately to your right as you pass the entrance gate.

Member – Free
Non-Member – $20

08:15 – 08:45 – Registration with light breakfast

08:45 – 09:00 – Opening Remarks

09:00 – 09:45 – Robert Stewart

Title: Under The Hoodie: Actionable Research from Penetration Testing Engagements

Abstract: In this presentation, Robby will cover the major findings from our latest research, including the vulnerabilities and misconfigurations most often found on our engagements, the effects of account lockouts and two-factor authentication on pen testers, and the most effective countermeasures you can take to detect and prevent criminal hackers from breaking into your network.

Bio:  Robby has worked in most areas of Information Technology for the past twelve years, most recently hacking all the things.  Based out of Ohio, he got his start in user/desktop support and worked his way through supporting both small and large server infrastructures. Robby then moved over to a network engineer, specializing in firewalls and VPN solutions.

10:00 – 10:45 – Shawn Sines

Title: Strategic Planning for Tactical Solutions

Abstract: Shawn will address the need to assess resources and capabilities within your team prior to procuring expensive technology solutions.

Bio: Shawn enjoys discussing Information Security with people at every knowledge level. Teaching others security concepts keeps him engaged and excited. His experiences range from my military service in the US Marine Corps to system engineering, information security evangelism and journalism. Shawn continues to seek out interesting challenges and consistently deliver results.

11:00 – 11:45 – Chris Haley


Abstract: The longer an attacker remains on the network, the higher the risk for damage. Other metrics such as the number of attacks stopped, the ability to recognize attack techniques of certain attackers, or even attribution, are all secondary. Organizations must identify where attacks can occur, how information can leave organizational boundaries, and how the impact of these attacks can be reduced. The organization must also be operationally prepared for rapid detection and response and to provide business continuity in the face of adversity.

Bio: Chris Haley is a Security Consultant with Vectra Networks covering the Ohio Valley territory. Chris spends his work days analyzing attack detections and advocating visibility of traffic inside the network. Prior to joining Vectra, Chris spent nine years at Cisco in presales engineering and architecture roles, where he focused on data center and security technologies.

Chris is a U.S. Marine Corps veteran and received his bachelor’s degree in business from the University of Massachusetts. As a seemingly life long student, Chris is currently chipping away at his MBA. Chris resides in the Cleveland, OH area with his wife and three children. When not on the clock, Chris plays guitar and coaches youth sports.

11:50 – 12:00 – Closing Comments

You may also like...