South Florida’s November 2014 meeting will be on Thursday, November 20th, 2014 at Nova Southeastern University. The meeting will take place in the Carl DeSantis Building from 5:30pm – 7:30pm, followed by their usual networking hour.
Special mention: Elections will be held at November’s monthly meeting!
Topic: 2014 Data Breach Investigations Report
Abstract:
• 50 contributing organizations.
• 63,000+ security incidents.
• 1,367 confirmed data breaches.
• 95 countries covered.
Report Finds Nine Basic Patterns Make Up 92 Percent of Security Incidents: No Organization Is Immune From a Data Breach.
Speaker: Michael Marrochello
Bio:
Michael’s career spans various roles over a twenty year period. His background is in Cyber Security, Hosting, Business Continuity and Disaster Recovery. Michael spent 12 years in the United States Army and started his technology career with Digital Equipment Corporation on the disaster recovery team.
He built his first Data Center with MCI in 1995. Michael has been on the board of Accredited Continuity Planners (South East Florida) as well as the Miami Electronic Crimes Taskforce (Secret Service).
Throughout his career he has designed and architected high-available, secure, resilient systems. This knowledge has been a key to success on the Cyber Insiders team within Verizon Business. Michael started with MCI in 2000 and has been with Verizon for 6 years. His role on the Cyber Insiders team is critical in presenting Advanced Security Solutions to the growing landscaper of Advanced Threats.
Sponsor: Verizon
Topic: Leveraging Threat Intelligence to Manage your Risks and Threats
Abstract:
The evolving nature of threats is a top security challenge that organizations face, and targeted attacks are on the rise. Cyber-attacks are increasingly more sophisticated and organized. Adversaries specialize in different aspects of an attack and collaborate to achieve their objectives. To combat these sophisticated attackers, enterprises must also collaborate to create a united defense to beat cyber criminals at their own game. Making effective use of cyber threat intelligence is an important component of an organization’s security program. Cyber threat intelligence can be obtained internally and from external sources. It must be collected, analyzed, shared and leveraged. This talk discusses the evolving threat landscape and how IT security organization need to use intelligence to proactively defend themselves.
Speaker: Stan Wisseman
Bio: Stan Wisseman is a Security Strategist for the Americas within the Enterprise Security Product business unit at HP. In this role, Mr. Wisseman is responsible for driving strategic initiatives for the ESP Security Strategy group and
providing thought leadership and insight regarding the ever changing global threat landscape.
Prior to joining HP in 2014, Mr. Wisseman served as the Chief Information Security Officer for Fannie Mae with responsibilities for information security and business resiliency across the organization. During his time at Fannie Mae, he was instrumental in maturing the information security program, including the establishment of a software security assurance program, evolved security operations to better utilize their SIEM and threat intelligence capabilities, deployed single sign-on and password vaulting enterprise services. He also piloted a security analytics capability within the Security Operations Center.
Mr. Wisseman brings 30 years of information security experience and has applied security best practices to operating systems, networks, systems, software, and organizations. He has worked for NSA, Oracle, Cable & Wireless,
Cigital, and Booz Allen Hamilton in roles that have ranged from Security Engineer, Product Manager, to Director of various Information Security consulting practices. While at Booz Allen, Mr. Wisseman helped establish firm wide communities of practice for software assurance and systems security engineering, building capacity, capabilities, and markets. He also co-chaired the DHS Software Assurance Initiative’s Software Supply Chain working group and established and chaired the Northern Virginia’s chapter for the Open Web Application Security Project (OWASP).
Mr. Wisseman brings 30 years of information security experience and has applied security best practices to operating systems, networks, systems, software, and organizations. He has worked for NSA, Oracle, Cable & Wireless,
Cigital, and Booz Allen Hamilton in roles that have ranged from Security Engineer, Product Manager, to Director of various Information Security consulting practices. While at Booz Allen, Mr. Wisseman helped establish firm wide communities of practice for software assurance and systems security engineering, building capacity, capabilities, and markets. He also co-chaired the DHS Software Assurance Initiative’s Software Supply Chain working group and established and chaired the Northern Virginia’s chapter for the Open Web Application Security Project (OWASP).
Sponsor: HP
Venue: