Uncategorized

Central-VA-ISSA-August-2013

Date: August 14, 1130-1PM Topic: Moving the Cheese: Next Generation Migratory Resource Protection Roland Cloutier, ADP’s Chief Security Officer, will share his ideas on the latest advances in security threat mitigation and the security intelligence landscape. Among the topics he will address are the cyber kill chain concept, threat visualization, holistic security intelligence, and the use of […]

Read More

Central-VA-ISSA-July-2013

Date: July 10, 1130-1PM Topic: APT1: Then and Now Mandiant is the industry leader in detecting and investigating advanced cyber attackers. The company tracks multiple threat actors and recently released a report on one such group it refers to as “APT1.” The report links APT1 to the 2nd Bureau of the People’s Liberation army (PLA) General staff […]

Read More

Central-VA-ISSA-June-2013

Date: June 12, 1130-1PM Topic: Who is watching the code? Source Code Repo Anti-Tampering Roughly one-third of US intellectual property value is the form of software, a third is in patents and other copyrighted materials, and the balance is in trade secrets. (Source: http://www.ipnav.com). Every company depends on proprietary software for competitive advantage, to improve customer service, to […]

Read More

Central-VA-ISSA-May-2013

Date: May 15, 2013 1130-1PM Topic: Data Loss Prevention for the Security Practitioner DLP technologies are becoming more mature and capable. However, like any security technology, a technology-first or –only approach is doomed. In this presentation, we will examine a systemic approach to establishing a successful DLP program. We will also examine several best practices that help […]

Read More

Central-VA-ISSA-Apr-2013

Date: April 10, 2013 1130-1PM Topic: Employees at companies all over the world have embraced the new breed of mobile devices and mobile applications that give them more personal productivity.   Businesses have realized this trend and are actively moving to enable greater business productivity on the very devices their employees are bringing into the workplace.  These […]

Read More

Central-VA-ISSA-Mar-2013-Meeting

Security Architecture Security in today’s corporate world, both commercial and Federal, has never been more complex. We find ourselves confronted with a more advanced set of adversaries, more complex enterprise architectures blurring the outside edges of security domains while making use of mobile, cloud, and BYOD architectures, and even more demands on compliance audit reporting. […]

Read More