news Arrow to Content

October 23, 2015

October 2015 Chapter Meeting

Chapter Business

Following Pizza and Networking Price Oden kicked off the Chapter Business portion of the meeting with:

  • Chapter Survey on Security Issues with Cloud Adoption is posted on the chapter website for members.
  • Beginning in January we will meet on the 4th Wednesday of each month.
  • Volunteers are needed in several areas.

Meeting Presentations

Mike Lange and Shellee Aragon from HP Cloud Services, discussed OpenStack and Container Security.

View Container Security Presentation

View OpenStack Security Presentation

Categories: ||

September 26, 2015

September 2015 Chapter Meeting

Chapter Business

Cary Sholer led the Chapter Business portion of the meeting with the following:

  • An introduction of the 2015 Chapter Survey.  The survey is used to measure cloud security issues and adoption rates.  The survey is available on the chapter website.
  • Members are encouraged to let the Board know of position openings which will be posted to the website.

Meeting Presentations

David Manz, Senior Cyber Security Scientist, and Thomas Edgar, Senior Cyber Security Scientist,  from Pacific Northwest National Laboratory will discuss:

“Cyber security testbed experimentation, now and in future: Experimentation as a Service” 

David Manz is currently a Senior Cyber Security Scientist in the National Security Directorate at the Pacific Northwest National Laboratory. He holds a B.S. in Computer and Information Science from the Robert D. Clark Honors College at the University of Oregon and a Ph.D. in Computer Science from the University of Idaho. David’s work at PNNL includes enterprise resilience and cyber security, secure control system communication, and critical infrastructure security. Prior to his work at PNNL, David spent five years as a researcher on Group Key Management Protocols for the Center for Secure and Dependable Systems at the University of Idaho (U of I). David also has considerable experience teaching undergraduate and graduate computer science courses at U of I, and as an adjunct faculty at Washington State University. David has co-authored numerous papers and presentations on cyber security, control system security, and cryptographic key management.

Thomas Edgar is currently a Senior Cyber Security Scientist in the National Security Directorate at the Pacific Northwest National Laboratory. He has been a Cyber Security Research Scientist at Pacific Northwest National Laboratory since 2006. Edgar’s educational background consists of a B.S. (2004) and M.S. (2006) in Computer Science from the University of Tulsa with a specialization in Information Assurance. While at university, Thomas was a recipient of the NSF Cyber Corps SFS and all five federal information assurance certificates. His expertise lies in critical infrastructure security, protocol development, cyber forensics, network security, and wireless security.  While at PNNL, Edgar has worked in the fields of secure communications protocols, cryptographic trust management, insider threat, and security standards. He was lead developer of the Secure SCADA Communications Protocol (SSCP) as part of the DOE Hallmark Project and assisted in technology transfer. Edgar is currently leading an effort for creating a cryptographic trust management system for control system environments.

View the Presentation

Categories: ||

July 11, 2015

July 2015 Chapter Meeting / Social


Summer Social

  Agenda:

Networking & Fun

Location:
Rock Bottom Brewery

550 106th Avenue NE, Bellevue, WA 98004

Registration has closed for this event
Must be 21 years or older to attend (ID will be checked).

Special meeting with our friends at ISSA, on a special date July 16th 2015, at a special time:  5:30 – 9pm, and a special location, Rock Bottom Brewery in Bellevue.
Enjoy a relaxed evening of good food and drink with friends and colleagues. For brew aficionados take the opportunity to learn about the brewing process from a Brew Master, sample some of Rock Bottom’s brews, and take a tour of the Rock Bottom Brewery.

 

We Care.  Drink responsibly and designate a driver.

Event Sponsored by:

Visit Dell's website Vist Lancope's website

Categories: ||

June 26, 2015

June 2015 Chapter Meeting

Chapter Meeting Agenda:
6:00pm-6:15pm Networking
6:15pm-6:30pm Chapter Business
6:30pm-8:00pm Presentations
Location:
Microsoft Offices

Bravern, Bellevue, WA 98004

Register to Attend

attendance qualifies for 2 CISSP credits

Speakers and Presentations:

Colin Folawn, and Christopher Howard, Attorney’s at Schwabe, Williamson & Wyatt,  Legal Issues Regarding Privacy and Data Security

Colin Folawn and Christopher Howard will discuss a variety of legal issues that concern companies who provide cloud computing services, including the following: privacy and data security breach, insurance coverage, data disposal, data retention, and more.

Categories: ||

May 29, 2015

May 2015 Chapter Meeting

Chapter Business

Denise Simons kicked off the Chapter Business portion of the meeting which included:

  • A review of upcoming meetings including:
    • June Meeting presentation on Security Breach and Contractual Issues.
    • July 16th Summer Social with ISSA at the Rock Bottom.  The Summer Social takes the place of our regular July meeting.
    • August, no meeting.
    • September Meeting with PNNL on the latest research in cyber security.
    • October Meeting at HP offices in Seattle on a deep dive into OpenStack.
  • Volunteer needed to work on our Facebook and Google+ sites.
  • A number of open positions at Microsoft.  Check our website news for announcements.

Meeting Presentations

Bill Wang, BI Consultant.

Presentation: Implementing Self-Service BI Securely with Microsoft Office 365 PowerBI
With the increasing BI capabilities through Microsoft Azure and Office 365 PowerBI offering, many organizations can get a jump on user-centric self-service BI solutions leveraging various hybrid implementations of Azure/Office 365 and on-prem BI systems while maintaining data integrity and security. Mr. Wang reviews the different implementation scenarios and the associated security requirements.

View the Presentation

Craig Erickson, CEO, metriQuality

Presentation:  Strong Authentication and Encryption (with references to frameworks promoted by the FIDO Alliance) and how all this relates to the CSA Report April 2015: Security Guidance for Early Adopters of the Internet of Things

Craig reviews the highlights from the RSA / CSA April 2015 conference with a deeper look at the FIDO alliance framework.

View the Presentation

Categories: ||

April 24, 2015

April 2015 Chapter Meeting

Chapter Meeting Agenda:
6:00pm-6:15pm Networking
6:15pm-6:30pm Chapter Business
6:30pm-8:00pm Presentations
Location:
Bellevue City Hall

450 110th Avenue NE, Bellevue, WA 98004
Directions / Parking / Conf.Rooms

Register to Attend

attendance qualifies for 2 CISSP credits

Speakers and Presentations:

Frank Simorjay, CISSP / ISSA Distinguished Fellow, Senior Product Manager Architect and Content Developer, Microsoft
Presentation:  Overview of the CSA CCM/STAR/CAIQ and Other Research Projects
It’s been a while since the chapter has looked at the tools and research work done by the CSA. Come for a tour through the CSA research library, and spend time exploring the core capabilities from CSA including the Cloud Controls Matrix 3.0. 1 (CCM), the Consensus Assessments Initiative Questionnaire v3.0.1 (CAIQ) , and the Security, Trust & Assurance Registry  (STAR), and how the relate and interact.

Frank Simorjay (CISSP, ISSA Distinguished Fellow) is a cloud, security architect content developer and blogger. Frank is passionate to promote security computing, and smart cloud adoption. Frank is a senior content developer for the cloud and enterprise team. Frank was a Senior Product Manager Architect and content developer for the Microsoft, and the author of Data classification for cloud readiness , Cloud Security Readiness Tool, Security Intelligence Report volume eight to twelve, and the Payment Card Industry Data Security Standard Compliance Planning Guide. Frank is the founder and a long-standing member of ISSA Puget Sound, the Seattle-area branch of the Information Systems Security Association, and he has been recognized as a distinguished fellow with the Association. In addition, Frank represents a leadership role with the Cloud Security Alliance (CSA). Frank is a security product and program manager as well as a compliance subject matter expert (SME) on cloud, big data, and IoT. Prior to  Microsoft Frank was a senior engineer for NetIQ and for NFR Security, where he designed security solutions for enterprise networks in banking and telecommunications for more than 10 years.

and

Cary Sholer, Security Program Manager at Microsoft, and CSA Seattle Chapter Research Director
Presentation: Results of the 2014 CSA Seattle Chapter Survey on Cloud Adoption and Security Issues

Cary is a Security Program Manager with Microsoft.  His specialties include: Critical Event Risk Management, Breach Response Program Development, Computer Forensics Investigations, IT Risk Management, Information Security Consulting, IT Architecture Services, and IT Leadership Training.

Categories: ||

March 27, 2015

March 2015 Chapter Meeting

Chapter Business

After networking and pizza Cary Sholer kicked off the Chapter Business portion of the meeting which included:

  • A number of open positions.  Check our website news for announcements.

Meeting Presentations

Chad Hardin, Senior Scientist, Koverse

Presentation:  Indexing and Querying Schema Free Data with Mandatory and Discretionary Access Control
Abstract:  While Accumulo is incredibly scalable and stable, it (and similar Big Data databases) are limited to generic key and value storage functionality. To make it easier for users to ingest and query schema-free data, several key-value indices must be created and maintained not only with data, but access control information. Chad discussed how to take a KV database like Accumulo and create a higher abstract concept of Collections: schema-free records with logarithmic searching ability and embedded access control.

View the Presentation

Shannon Hennessy and Andrew Luke, IT Audit and Security Analysts, TrustCC

Presentation: Cloud Vigilance
Abstract:  Cloud security is not a fire and forget method of data security management. It requires continuously ensuring that the vendor is protecting your data properly. Andrew and Shannon discussed the best practices for interacting with cloud service providers and the considerations for choosing who to use.

View the Presentation

Categories: ||

February 27, 2015

February 2015 Chapter Meeting

Chapter Business

After networking and pizza Michael Baker kicked off the Chapter Business portion of the meeting which included:

  • A number of open positions with Microsoft.  Check our website news for announcements.

Meeting Presentations

Bob Gilbert, Sr. Director of Product Marketing, Netskope

Presentation:  Perimeters and Unicorns: Two Things That Only Exist in IT Fairyland
Abstract:  Bob Gilbert provided a bird’s-eye view of how mobile and cloud have conspired to dissolve the enterprise perimeter and transform IT as we know it. Bob discussed his take on how these dynamics have shifted the role of enterprise IT, why letting users “go rogue” is the path to business success, and how smart IT teams are becoming brokers of technology to help drive of growth and profits for the next decade.

View the Presentation

Categories: ||

January 23, 2015

January 2015 Chapter Meeting

Chapter Business

After networking and pizza Price Oden kicked off the Chapter Business portion of the meeting which included:

  • A number of open positions with Microsoft.
  • Call for a volunteer to work on our podcast series.

Meeting Presentations

Karl J. Weaver, Business Development Manager with Newport Technologies discussed “The Growth of Host Card Emulation for NFC Mobile Payment Smartphones in the Cloud”.
Karl is an internationally-trained wireless/mobility executive, highly experienced in OEM sale sof technology products in emerging and developed markets. Extensive experience hunting, marketing and selling consumer electronics products in Asia and Europe negotiating contracts, localizing and launching products, training agents and distributors, developing marketing programs, and conducting seminars and giving speeches at industry functions. Fluent speaker of Mandarin Chinese. Hard-working, motivated, and willing to travel.

View the Presentation

Norm Barber, Managing Director with UnifyCloud discussed “Migrating Critical Applications to Private and Public Clouds Quickly and in Compliance”.
Norm has held positions as Principal Program Manager with Microsoft’s Identity and Security / Azure Division; as Microsoft’s Strategic Security Advisor for the Financial Services Industry, and a Partner and Global Services Director – Security & Privacy Solutions for Andersen Worldwide.

View the Presentation

Categories: ||

Page Dividing Line