February 2018 Chapter Meeting

February 28th 2018 6pm-8pm

Chapter Meeting Agenda:
6:00pm-6:15pm Networking
6:15pm-6:30pm Chapter Business
6:30pm-8:00pm Presentations
Location: Bellevue City Hall
450 110th Ave. NE
Bellevue, WA 98009

Register

attendance qualifies for 2 CISSP credits

Speakers:

Gururaj Pandurangi, Founder and Partner, Avyan Consulting and Greg Shank, Principal at Cloudneeti
"Achieving Compliance on Public Cloud" Organizations are attempting to innovate rapidly, moving to highly scalable, cloud, and hybrid environments , many times by skipping steps meant to identify flaws in untested code or resisting efforts to add security controls to their applications before it ships, exposing itself to various cyberattacks, and ruining their CxO’s cloud adoption confidence. Introducing key considerations for staying compliant and secure in public cloud cybersecurity practices, case studies, tools, demos and as always some great discussions.
Bio:
Gururaj guides clients towards a business-focused and holistic approach to cloud adoption. The teams he leads specializes in Digital Transformation through cloud-scale application design, DevOps & CI/CD, analytics, Cybersecurity & Compliance, and Internet of Things (IoT).
Greg Shank, a Cloud Security Solutions Principal at Cloudneeti, is enthused about providing guidance to enterprises on achieving their digital transformation goals by accelerating their adoption of cloud services that meet high security and compliance standards.
and
Nick Ellsmore, Co-Founder, Security Colony and Hivint
Trust Me: The convergence of security & marketing
Trust is a human concept.  There is no "formula" for trust and you can't just share your keys and have someone mathematically validate that you are trustworthy. Security – and our belief as consumers that our data is being appropriately protected – is a key part of the trust message.  There are trillions of dollars at stake if we fail to give the community confidence in the way data is protected, not to mention painful and costly regulation. It’s not enough to be secure, we also need to be seen to be secure.  This convergence of security and marketing is driving the creation of “trust sites” by many cloud companies and a range of new initiatives to try to demonstrate the trustworthiness of a business.  This is the next big growth area for the industry: companies going external with their security messages.
Bio:
One of Australia’s best known cyber-security professionals, Nick is Co-founder of Hivint and Security Colony, and was the recipient of the inaugural “Australian Information Security Association (AISA) Information Security Professional of the Year” Award in 2012 for his contribution to the industry.  Previously a co-founder of SIFT and Stratsec which grew to become the largest cyber security consulting firms in Australia before their sale to BAE Systems in 2010, Nick has served on a wide range of industry boards including the Internet Industry Association, the NATA AAC for Software Testing, Electronic Frontiers Australia, multiple Industry Advisory Boards for UNSW, and is a past Australian delegate to the APEC TEL Security & Prosperity Steering Group.  He has been engaged by regional governments to review their national cyber-security strategies, and has delivered projects for APEC and the United Nations. He is now Chief Apiarist with Hivint building a collaboration portal for the Australian information security industry and is an Advisor to Bugcrowd. A regular keynote speaker at conferences, Nick has delivered over 120 presentations on cyber-security strategy and innovation around the world since 2000.

March 28 2018 Chapter Meeting

March 28th 2018 6pm - 8pm

Chapter Meeting Agenda:
6:00pm-6:15pm Networking
6:15pm-6:30pm Chapter Business
6:30pm-8:00pm Presentations
Location: Bellevue City Hall
450 110th Ave. NE
Bellevue, WA 98009

attendance qualifies for 2 CISSP credits

Speakers:

Alexey Stoletny, Managing Director, Sigma Software, Inc., Robert Feeney, Cofounder & CEO, Ringorang Worldwide LLC, Alexey, Robert, Education & Awareness, Microsoft
Tricky Logic –Tips to uncover business logic vulnerabilities in your code
Alexey from Sigma Software will share common mistakes that developers and operations people make that leave vulnerabilities in their code. He’ll share lessons and tips to help developers build stronger code and reinforce software best practices.
Cracking the Code in our Heads - why most cybersecurity training doesn’t work
Robert from Ringorang will share common cyber-attacks that target information workers, and why traditional training is a poor defense. He’ll share what his organization has learned works and does not work to influence organizational behavior shifts to protect enterprises.
Panel – Leveraging the Human Factor to Protect the Cloud and it’s Enterprise Customers
Cyber attacker leverage the human factor to defeat enterprises. Phishing, spear phishing, stealing credentials, finding weakness in software code, and other methods are just a few examples of how cyber security attackers defeat enterprises. What do these attack methods have in common – the human.

April 2018 Chapter Meeting

April 25th 2018 6pm-8pm

Chapter Meeting Agenda:
6:00pm-6:15pm Networking
6:15pm-6:30pm Chapter Business
6:30pm-8:00pm Presentations
Location: Bellevue City Hall
450 110th Ave. NE
Bellevue, WA 98009

attendance qualifies for 2 CISSP credits

Speakers:

Satish Shetty, CEO, Codeproof Technologies
Modern Solutions to Overcome Modern Enterprise Mobility Challenges
Enterprise mobility unlocks unprecedented value propositions for the modern enterprise. With the growing dependence on mobile technologies, enterprises are pursuing ways to unlock the true potential of their mobile workforce. Unfortunately, many organizations have struggled to keep up with the challenges associated with embracing a mobile-first approach. And with the intensifying sophistication of cyber-attack threat vectors, traditional solutions, strategies and practices fail to deliver the security and management capabilities essential to keep your enterprise productively mobile. To address these concerns, we aim to present invaluable insights into the following key solution areas:
  • Data leak prevention technologies and strategies that actually work. How to eliminate risk in BYOD devices accessing corporate network, potentially with vulnerable apps running, or when the device is lost or stolen.
  • How to streamline device management and provisioning process while ensuring high-end security for every device.
  • The game-changing industry trends driven by EMM Technologies from Apple, Google and Samsung.
Bio:
Satish Shetty is CEO and founder of Codeproof Technologies, an enterprise mobile security software company. Shetty has more than 20 years of security and enterprise software development experience. A recognized leader in the mobile device management space, Shetty also has several patents in software security. Shetty's area of expertise includes computer security, cloud computing, software antipiracy and enterprise software management technologies.
Shetty previously worked at Microsoft on development of Windows Operating System and Windows Genuine Advantage product lines. Prior to that, Shetty worked at McAfee on development of various security products including McAfee's flagship products McAfee ePolicy Orchestrator and McAfee VirusScan. He also holds a Bachelor of Engineering degree in Computer Science with distinction from the University of Mysore.
Page Dividing Line