Welcome to the Northeast Florida ISSA Chapter
March 2015 Meeting PDF Print E-mail

March 26th General Mtg & 1Hr CPE Preso 430-6pm, Networking 6-7pm with Appetizers

Meeting Location: Sheraton Hotel, Jaguar II, 10605 Deerwood Park Boulevard, Jacksonville, FL 32256

Meeting Sponsor: Resolution1 Security

Cost: $10 for guests, Free to Registered ISSA Members



Guest speaker 1: Sean Mason, Vice President Incident Response, Resolution1 Security

After serving his commitment to the US Air Force, Sean has spent his career with Fortune 500 companies (GE, Monsanto, Harris & CSC) where he has worked in a variety of IT & industry verticals, including software development, auditing, information security, Defense, Aviation, Finance, Energy, Biotechnology, and Healthcare. Sean served as the Defense Industrial Base (DIB) representative for Harris from 2009-2011 and also notable is that Sean was the Director of Incident Response for GE, which is considered one of the most sophisticated teams in the world. Sean also serves as a Subject Matter Expert for ISC2, helping to design credentials’ common body of knowledge and exam questions as well as sitting on the ISC2 Application Security Advisory Council (ASAC).

Guest speaker 2: Lucas Zaichkowsky, Enterprise Defense Architect, Resolution1 Security

Lucas Zaichkowsky is responsible for providing expert guidance on the topic of cybersecurity. Prior to joining Resolution1 Security, Lucas was a Technical Engineer at Mandiant where he worked with Fortune 500 organizations, the Defense Industrial Base, and government institutions to deploy measures designed to defend against the worlds most sophisticated attack groups.


Presentation: Bad Guys Finish Last

Asymmetric attacks against corporations have become the new normal and the perception is the defenders need to get security right every time to be successful, while an attacker only has to get it right once. While there is a hint of truth in that generalized statement, it has been proven time and again to be a flawed way of thinking. Data breaches are the result of multiple points of failure from vulnerability exploitation to lack of threat detection and proper incident response. Learn how modern security teams have gained a defenders advantage through defensive posturing and the vision driving Resolution1 Security to enable their success.


For more information visit: www.resolution1security.com



Visit these websites for additional chapter details:

• Local Chapter Website: http://neflorida.issa.org

• LinkedIn Group Site: http://www.linkedin.com/e/gis/1539547

• Patron Sponsors Page: http://neflorida.issa.org/index.php?option=com_content&view=article&id=47&Itemid=69

Schedule for Remaining 2015 Meetings:

April 30
June 4
August 27
October 8
November 19

Chapter goals and leadership principles:

• To have informative chapter events and fun professional social networking

• Share and promote vendor neutral best practices for information security

• Promote the educational and ethical standards, and the knowledge base of the ISSA association and the CISSP certification

More info: Please contact the local Board of Directors of the Jacksonville / NE Florida ISSA Chapter at: ISSA - This e-mail address is being protected from spambots. You need JavaScript enabled to view it

• Board Members: Chris Layfield (Verizon Enterprise), Vicki Harris (Black Knight Financial), Scott Manning (Black Knight Financial), David Croxton (FIS), Rob Carver (Black Knight Financial), James Case (Baptist Health)

To join ISSA: Go to www.issa.org and click Join Now. For the Chapter selection, find Northeast Florida chapter.


February 2015 Meeting PDF Print E-mail

February 19th General Mtg & 1Hr CPE Preso 430-6pm, Networking 6-7pm with Appetizers

Meeting Location: Sheraton Hotel, Jaguar II, 10605 Deerwood Park Boulevard, Jacksonville, FL 32256

Meeting Sponsor: Elastica

Our guest speaker: Kelly Brazil, Director of Systems Engineering

Kelly has dedicated his career to enterprise security and has spent the last fifteen years introducing F500 and G2000 customers in North America and Asia Pacific to emerging security technologies while working for top-tier networking vendors and service providers including UUNET, Juniper Networks, and Palo Alto Networks. Most recently Kelly served as SE Director for Shape Security. Prior to that he served as SE Director at Palo Alto Networks building out the teams in APAC and the Western Region, North America.

Presentation: The Seven Deadly Sins of Traditional DLP in the New World of SaaS

Data loss prevention in the context of SaaS applications is starkly different from what needs to be done for traditional on-premises enterprise applications. A new approach to DLP is needed by organizations that are now relying on a hybrid of on-premise and SaaS applications. In this presentation we’ll discuss seven common challenges with securing content in the cloud and modern approaches to addressing the problem.

For more information visit: www.elastica.net



December 2014 Holiday Party PDF Print E-mail

December 11th Holiday Party hosted by our Platinum Sponsor - Quadrant Information Security

5:30pm-9pm, Food and Drinks provided

Meeting Location: Sneaker's Sports Grill (Private Event Room)

8133 Point Meadows Dr, Jacksonville, FL 32256 (at Baymeadows and 9A/295)

Chance to review the latest Sagan SIEM and MSSP Services. Free Drawings and Giveaways!


Cost: Free for guests and registered ISSA Members (RSVP required by Dec 7)


For more information about Quadrant Information Security visit: www.quadrantsec.com


January 2015 Meeting PDF Print E-mail

January 15th General Mtg & 1Hr CPE Preso 430-6pm, Networking 6-7pm with Appetizers

Meeting Location: Sheraton Hotel, Jaguar II, 10605 Deerwood Park Boulevard, Jacksonville, FL 32256

Meeting Sponsor: Splunk

Our guest speaker: Andrew D'Auria, Sr. Sales Engineer

Andrew has been working in the software business since graduating from Rutgers University in 1996. His focus over the last decade or so has been information security. He has experience with various technologies including big data analytics, SIEM, log management, endpoint security, encryption, network security, web protection and email filtering. He is a seasoned sales engineer, having worked in this role for companies such as McAfee, netForensics, RSA, SurfControl and MessageLabs. Andrew currently works as a Senior Sales Engineer on the Splunk Major Accounts team, covering the largest companies in the Carolinas. Andrew is a native of New York City, though he and his family retreated to the warmer climate and friendlier environment around Raleigh, NC over 7 years ago and he hasn't looked back.


Presentation: Battling APTs Using the Kill Chain Method

Security threats of yesterday where primarily technology-driven, which meant that technology-based countermeasures were a viable means of protecting our organizations. Today's Advanced Persistent Threats are a major challenge largely because they don't merely rely on technology, but are driven by people and processes using advanced technology to target your organization. To counter these threats, organizations must learn to adapt their people, processes and technology. Learn about how the Kill Chain paradigm can help your organization understand and counter today's modern APT threat.


For more information visit: www.splunk.com


October 2014 Meeting PDF Print E-mail

October 30th General Mtg & 1Hr CPE Preso 430-6pm, Networking 6-7pm with Appetizers

Meeting Location: Sheraton Hotel, Jaguar II, 10605 Deerwood Park Boulevard, Jacksonville, FL 32256

Meeting Sponsor: Varonis Software

Cost: $10 for guests, Free to Registered ISSA Members


Guest speaker: Mike Perrault, Systems Engineer - Varonis Software


Presentation: Human Side of Data Protection

The most valuable, fastest growing asset a business owns is its human-generated data—the documents, spreadsheets, videos, presentations, and emails that people create and share every day. Breaches involving human-generated data happen almost every day. Why? Because employees have far more access than they need, activity is usually not logged or analyzed, and it's difficult to spot abuse. Learn how big data analytics can help lock down overexposed data, prevent breaches, reduce excessive permissions, and enable a sustainable data protection strategy in the face of unprecedented data growth.


For more information visit: www.varonis.com



Page 1 of 3
Copyright © 2015 neflorida.issa.org. All Rights Reserved.