Summary of upcoming ISSA events
- Chapter Meeting – April 17th – Operational Security
- Information Security Summit 2 & 3 May
- SANS Training – group discounts available! (3 or more people)
Monthly Meeting – Operational Security
Where: J. Liu Restaurant, Worthington
When: Wednesday April 17th, 2013
Time: 7:45am – 11:30am
Member Cost: FREE
Non-Member Cost: $20
Schedule: 07:45 – 08:00 : Registration with light breakfast
0800-0900 Target User Awareness with Behavioral Science
Abstract: End user security behavior is a human problem not a technology problem, so learn to address it through proven methods. Stop one bad end user behavior at a time use the principles of behaviorism on a low/zero budget… as a bonus, there’s almost no math! The discussion will cover strategy, indentifying specific goals, leveraging low/no cost methods, actual results and feedback from executives and employees. This approach can be adapted to any environment with a little creativity, executive support and a ski mask.
Speaker: Mike Morabito has spent 10 years as a security practitioner at Cardinal Health
0900-1000: Attacking (and Defending) Mobile Devices
Abstract: An organization that isn’t currently using mobile devices, whether “company” owned or BYOD, is a rarity. With almost 6 billion (with a “b”) mobile cellular subscriptions worldwide, mobile devices are an attractive target for criminals. Whether the attack originates from an organized crime syndicate or by virtue of the device being a target of opportunity, the truth of the matter is that mobile defensive measures are a necessity. This presentation covers a variety of attacks against mobile devices, as well as the defensive techniques that you can apply to minimize exposure and risk. It also provides an overview of tools that infosec professionals can use to test the effectiveness of those defenses.
Bio: By day, Jerod (@slandail) is CTO & Principal Security Consultant with Jacadis, an award-winning security solutions and services provider. By night, he’s a husband, father, writer, filmmaker, martial artist, and social media junkie. Jerod has over a decade of IT, infosec, and compliance experience. He spent years as an Information Security Specialist with American Electric Power before moving to Abercrombie & Fitch. At A&F, Jerod built out and managed the information security program. His team was tasked with security operations, PCI and SOX compliance, and identity and access management. His approach to infosec has two key tenets: don’t be afraid to void warranties, and you shouldn’t need to bypass security to get your work done. http://about.me/slandail
10:00 – 11:00 : Text Analytics
Analysts and researchers in all areas are faced with this problem: our analog world is overflowing with digital information, and yet the precise piece of information which is pertinent to the task at hand is very difficult to find in huge volumes of text.
Imagine the time and the effort that can be saved if intelligence analysts or a researchers could discern “at a glance” where they should focus their efforts, or if they could know which documents (out of thousands) are the most relevant and worthy of reading and which they can skip.
Many innovative Text Analytics tools and technologies are rapidly becoming available to the research and analysis community, but no one tool can solve all of the problems. The following topics will be discussed:
1. What is “Text Analytics” and who it is for?
2. Trends in Text Analytics and more efficient ways to process information such as :
i. Entity extraction /Semantic approach
ii. Smart search
iii. Sentiment analysis
iv. Information visualization
v. Relationship analysis
vi. Information rating
3. What you should look for in a text analytic tool?
4. A survey of innovative commercial and open source tools available
5. Comprehensive approach to problem solving:
i. Big data vs. “Small” data
ii. Workflow design
iii. Analyst participation and feedback
iv. Proactive approach
About the presenter:
Victoria Loewengart spent a large part of her 20+ year career developing software technologies to extract information from structured data and unstructured text. She has also researched the issues that affect Intelligence communities, including intelligence collection, cybersecurity, and competitive intelligence. Victoria has published numerous articles on topics ranging from text analytics to intelligence analysis and cyber security. Her book “An Introduction to Hacking & Crimeware: A Pocket Guide” was published by IT Governance, UK, January 19, 2012. She is also a co-founder of AKOTA Technologies (www.akotatech.com).