Platinum Sponsors

Security News

Gold Sponsors


Welcome to the Northeast Florida ISSA Chapter
August 2016 Meeting PDF Print E-mail

August 18th General Mtg & 1Hr CPE Preso 4:30-6pm, Networking 6-7pm with Appetizers

Meeting Location: Sheraton Hotel, Jaguar II, 10605 Deerwood Park Boulevard, Jacksonville, FL 32256

Meeting Sponsor: Proofpoint

Cost: $10 for guests, Free to Registered ISSA Members


Presentation: Secure Your Organization Against Email Threats

Attackers today do not just use one channel to launch their attacks - they use all of them. Email, social media, networks, and mobile apps are all part of the modern cybercriminal's arsenal, and many of these attacks are invisible to traditional security tools. Effective cybersecurity strategies require more than just accurate detection. Solutions that enable efficient response are also imperative for true protection. Join us to learn how to protect your people, data, and brand from impostor emails, ransomware, and other emerging threats seen in today’s complex threat landscape.


For more information visit:


Visit these websites for additional chapter details:

• Local Chapter Website:

• LinkedIn Group Site:

• Patron Sponsors Page:

Schedule for Remaining 2016 Meetings:

Chapter goals and leadership principles:

• To have informative chapter events and fun professional social networking

• Share and promote vendor neutral best practices for information security

• Promote the educational and ethical standards, and the knowledge base of the ISSA association and the CISSP certification

More info: Please contact the local Board of Directors of the Jacksonville / NE Florida ISSA Chapter at: ISSA - This e-mail address is being protected from spambots. You need JavaScript enabled to view it

• Board Members: Chris Layfield (Verizon Enterprise), Vicki Harris (Maximus), Scott Manning (Black Knight Financial), David Croxton (FIS), Rob Carver (Black Knight Financial), James Case (Baptist Health)

To join ISSA: Go to and click Join Now. For the Chapter selection, find Northeast Florida chapter.


June 2016 Meeting PDF Print E-mail

June 9th General Mtg & 1Hr CPE Preso 4:30-6pm, Networking 6-7pm with Appetizers

Meeting Location: Sheraton Hotel, Jaguar II, 10605 Deerwood Park Boulevard, Jacksonville, FL 32256

Meeting Sponsor: Verizon


Our guest speaker: Bhavesh Chauhan

Bhavesh Chauhan is a Principal Client Partner - Security Evangelist within Verizon CTO organization. Previously a Principal in Financial Services and lead the Security Engineering and Professional services for the North East Region of Americas, which includes Enterprise, Government and Education customers for Verizon. Bhavesh has over 15 plus years in Cyber Security and Business Continuity Solutions. Bhavesh has served as an Information Security officer, Government Accreditor, Security Principal, Consultant, Engineer and Architect on security engagements; and has delivered various information security engagements to assist customers mitigate risks and improve security maturity across the enterprise. Bhavesh routinely represents Verizon at information security forums and has delivered various public speaking engagements. He is a board member of the ISACA local chapter. Along with his experience, Bhavesh holds a Master’s of Science Degree in Physics and a number of professional security certifications such as CISSP, CISA, and CISM. Furthermore, he has been a CESG certified Information Assurance advisor to UK public sector from 2001 to 2010.


Presentation: Verizon 2016 DBIR

The Verizon Data Breach Investigations Report (DBIR) uses incident data from contributors around the world. But it also calls on the intelligence gathered by Verizon’s expert security teams. Across hundreds of security assessors and consultants, our nine Security Operation Centers (SOCs), our cyber intelligence teams, and forensics labs on four continents, we process tens of millions of security events each day and around five billion events each month. With this intelligence, we help our customers understand the risk, set up their security policies and operations, identify threats, investigate and contain attacks, and address security compliance requirements.


For more information visit:


April 2016 Meeting PDF Print E-mail

April 7th General Mtg & 1Hr CPE Preso 4:30-6pm, Networking 6-7pm with Appetizers

Meeting Location: Sheraton Hotel, Jaguar II, 10605 Deerwood Park Boulevard, Jacksonville, FL 32256

Meeting Sponsor: Optiv Information Security

Our guest speaker: Danny Pickens, Director Global Threat Intelligence Center

Danny Pickens has over five years of experience within cyber security in the areas of intrusion detection, incident handling and management, and cyber threat analysis and fifteen years of experience as an all-source intelligence analyst covering conventional, asymmetric, and counterterrorism intelligence analysis. Mr. Pickens is currently the Director of the Global Threat Intelligence Center at Optiv, managing a staff of Cyber Threat Intelligence analysts charged with conducting research and analysis to support Optiv’s Managed Security Services. Mr. Pickens also serves as a Brigade S-2 NCOIC in the U.S. Army Reserve.

Presentation: Lessons Learned in Intelligence from an MSS

Intelligence in information security is a hard game to play. In this breakout, we will cover some lessons learned at the MSS level, and how those can be translated to enterprise security operations.


For more information visit:


May 2016 Meeting PDF Print E-mail

May 12th General Mtg & 1Hr CPE Preso 4:30-6pm, Networking 6-7pm with Appetizers

Meeting Location: Sheraton Hotel, Jaguar II, 10605 Deerwood Park Boulevard, Jacksonville, FL 32256

Meeting Sponsor: Avecto

Our guest speaker: Rodger Colvin

Rodger Colvin is a Senior Technology Consultant at Avectro.


Presentation: Social Engineering: Lessons Learned

In this lively presentation, Rodger will use the analogy of the high street bank to share learnings from security principles of the past that are still valid today. With real examples of social engineering and high profile hacks, Rodger will explain why good security is easy with solid foundations in place. He will share insight and tips of where to start with a defense in depth security strategy that really works in the ongoing quest against cyber threats.


For more information visit:


February 2016 Meeting PDF Print E-mail

February 18th General Mtg & 1Hr CPE Preso 430-6pm, Networking 6-7pm with Appetizers

Meeting Location: Sheraton Hotel, Jaguar II, 10605 Deerwood Park Boulevard, Jacksonville, FL 32256

Meeting Sponsor: Cigital

Our guest speaker: Jeff Sauntry, Managing Principal

Mr. Sauntry is a Managing Principal at Cigital with P&L responsibilities for five states in the Southeastern US, including Florida. Over the span of the two and half decades he has held senior management roles leading software engineering teams for large Independent Software Vendors (ISVs – Novell & Computer Associates), telecommunications (AT&T Consulting), service providers (Unisys & STMS) and big three consulting firms (KPMG and PWC). He currently holds the following industry certifications: CISSP, PCIP, CISM, CCFE & CFE. He is a fellow Floridian that lives in Bradenton, FL. When he isn’t helping customers solve tough security problems he enjoys digital photography, sport bikes and introducing people to the many awesome aquatic opportunities the Sunshine State has to offer. As a certified commercial captain he loves to hosts on or under the water adventures leveraging his rating as a PADI Master Scuba Diver Trainer to certify new scuba divers.


Presentation: Justifying the Correct Security Spend

Demonstrating and quantifying the value or ROI for security expenditures is a tough and never-ending battle. Like every other competing capital expenditure or operating expense, each organization must try to balance investing in the right amount of security to satisfy the organization’s risk appetite while meeting an ever increasing set of regulatory and privacy requirements. Leveraging open source assessments, utilizing industry specific peer-comparisons, and analyzing emerging industry trends are great ways to build a business case for appropriate budget allocation for strategic initiatives & tactical security projects. During this presentation we will explore some of the key considerations for determining whether you should address an organizational capability shortcoming by building the capability organically in-house, or teaming with an external firm or Subject Matter Expert (SME). Capturing the correct metrics, determining the original source of security vulnerabilities introduction, and creating continuous feedback improvement processes can provide critical data points that an organization can utilize to demonstrate and measure the effectiveness and value of specific security initiatives. Finally, we will discuss the opportunity to reduce the cost of remediation by addressing certain security concerns at optimal stages of application/platform deployment. The output of this discussion will provide attendees with the insight and means to answer senior management’s most frequent question – Are we spending the right amount on information security? In the interest of adhering to the allotted time for this presentation, we will focus primarily on application security, secure software development life cycle (SSDLC), PCI DSS v 3.1 requirements, and security testing; but the approach and recommendations are applicable to a wide range of security initiatives.


For more information visit:



Page 1 of 5
Copyright © 2016 All Rights Reserved.