Platinum Sponsors

Security News

Gold Sponsors


Welcome to the Northeast Florida ISSA Chapter
November 2015 Meeting PDF Print E-mail

November 19th General Mtg & 1Hr CPE Preso 430-6pm, Networking 6-7pm with Appetizers

Meeting Location: Sheraton Hotel, Jaguar II, 10605 Deerwood Park Boulevard, Jacksonville, FL 32256

Meeting Sponsor: STEALTHbits Technologies

Cost: $10 for guests, Free to Registered ISSA Members


Our guest speaker: Brad Bussie, Director of Product Management, STEALTHbits Technologies

Brad Bussie is an award winning fifteen year veteran of the information security industry. He holds an undergraduate degree in information systems security and an MBA in technology management. Brad possess premier certifications from multiple vendors, including the CISSP from ISC2. He has a deep background architecting solutions for identity management, governance, recovery, migration, audit, and compliance. Brad has spoken at industry events around the globe and has helped commercial, federal, intelligence, and DoD customers solve complex security issues.


Presentation: Cleaning Up AD Once and For All

Active Directory is the technical implementation of your business policy. It provides authentication and authorization services for the majority of IT systems and is growing more complex, less secure, and more difficult to manage over time. In short, AD is a mess. Stale resources, an inability to figure out what groups grant access to, no good processes for granting and revoking access, and no involvement by data owners are just a few of the most common problems associated with a messy AD and they prevent most organizations from meeting their operational and security goals. When Active Directory is out of control, it becomes difficult or impossible to answer basic questions about group membership, ownership, toxic conditions like circular nesting, and where stale resources are costing time and money. A messy AD may also prevent you from completing major initiatives like Identity and Access Management, domain migrations or consolidations, and meeting your audit and compliance needs. In this session you'll learn how organizations of all sizes are approaching the growing problem of Active Directory complexity and ways to be proactive and ensure the success of migrations, consolidation, and ongoing management and protection.


For more information visit:


Visit these websites for additional chapter details:

• Local Chapter Website:

• LinkedIn Group Site:

• Patron Sponsors Page:


Schedule for remaining 2015 Meetings:
Holiday Party date TBD

Schedule for 2016 Meetings:

Chapter goals and leadership principles:

• To have informative chapter events and fun professional social networking

• Share and promote vendor neutral best practices for information security

• Promote the educational and ethical standards, and the knowledge base of the ISSA association and the CISSP certification

More info: Please contact the local Board of Directors of the Jacksonville / NE Florida ISSA Chapter at: ISSA - This e-mail address is being protected from spambots. You need JavaScript enabled to view it

• Board Members: Chris Layfield (Verizon Enterprise), Vicki Harris (Black Knight Financial), Scott Manning (Black Knight Financial), David Croxton (FIS), Rob Carver (Black Knight Financial), James Case (Baptist Health)

To join ISSA: Go to and click Join Now. For the Chapter selection, find Northeast Florida chapter.


October 2015 Meeting PDF Print E-mail

October 8th General Mtg & 1Hr CPE Preso 430-6pm, Networking 6-7pm with Appetizers

Meeting Location: Sheraton Hotel, Jaguar II, 10605 Deerwood Park Boulevard, Jacksonville, FL 32256

Meeting Sponsor: GuidePoint Security


Our guest speaker: Lee V. Mangold, GuidePoint Security

Lee has over 15 years of working experience in the computer and Information Security field and a diverse portfolio including security architecture, compliance, assessment, academic security research, and security engineering in both the private and public sector. Before coming to GuidePoint, Lee was a Security Operations Manager, Information Assurance Security Officer, and software engineering lead for a major US Army research laboratory. He holds a Bachelor's degree in Applied Computer Science and a Masters of Business Administration with Applied Computer Science specialization from Troy University, and is a Doctoral Candidate in Computer and Information Security at NorthCentral University. He is currently the Vice President of the Florida Cyber Alliance, the Vice President of the Central Florida ISSA, an officer with Security BSides Orlando, and a CyberPatriot mentor.


Presentation: Cloud Security Best Practices: A Practitioners View

This talk will focus on understanding and remediating cloud security issues. We will discuss IaaS, PaaS, and SaaS from the perspective of the security and IT practitioner. Rather than talk about audit controls, we’ll look at real examples of cloud security practices and discuss ways in which those issues could be remediated. We will also talk briefly about Cloud Access Security Brokering (CASB) tools and how they play a role in cloud security.


For more information visit:



June 2015 Meeting PDF Print E-mail

June 4th General Mtg & 1Hr CPE Preso 430-6pm, Networking 6-7pm with Appetizers

Meeting Location: Sheraton Hotel, Jaguar II, 10605 Deerwood Park Boulevard, Jacksonville, FL 32256

Meeting Sponsor: Verizon Enterprise

Our guest speaker: John Sgromolo, Verizon Risk Team

Recognized internationally as an accomplished practitioner in the disciplines of Digital Forensics and Cyber Crime Investigations, John’s diverse background includes a combined total of over twenty-five (25) years of managing complex digital investigations, supervising digital evidence processing facilities and serving as a Master Instructor in the field of Digital Forensics. John’s most recent achievement has been the creation and implementation of the Digital Forensics practice for one of America’s largest telecommunications companies, Verizon Communications, Inc. During his tenure at Verizon, John has personally led work resulting in the positive resolution of the most technically complex and high-profile cyber investigative cases in the history of Verizon Legal and Verizon Security. John currently serves as a Senior Consultant for Verizon’s elite cyber incident response group, the Verizon RISK Team.


Presentation: Verizon 2015 Data Breach Investigations Reports (DBIR)

More than a decade of data TRACKING THE EVOLUTION OF CYBER THREATS. Keep your organization on the winning side of cybercrime by understanding attackers’ methods. The 2015 report contains 11 years of historical data analyzing more than 100,000 security incidents.


For more information visit:


August 2015 Meeting PDF Print E-mail

August 27th General Mtg & 1Hr CPE Preso 430-6pm, Networking 6-7pm with Appetizers

Meeting Location: Sheraton Hotel, Jaguar II, 10605 Deerwood Park Boulevard, Jacksonville, FL 32256

Meeting Sponsor: Quadrant Information Security


Our guest speaker: Champ Clark, CTO Quadrant Information Security

Champ Clark III is the CTO at Quadrant Information Security based in Jacksonville, Florida. He is the author of several Syngress books on VoIP security and is a regular speaker at Defcon, HOPE, and CCC. He is the primary developer behind the Sagan log analysis engine ( and has been interviewed in various magazines including Wired, 2600, and HP World.


Presentation: Hunting in the SOC and Latest Advancements in Log Analysis

Champ will share the latest trends seen in the Quadrant Information Security 24/7 SOC (security operations center). The combination of hundreds of threat feeds and clients combined with their team of analysts searching and correlating events 24/7...they have a unique perspective and pulse on the threats we all face. Also, Champ will update the group on the latest advancement in log analysis that can help us all.


For more information visit:



April 2015 Meeting PDF Print E-mail

April 30th General Mtg & 1Hr CPE Preso 430-6pm, Networking 6-7pm with Appetizers

Meeting Location: Sheraton Hotel, Jaguar II, 10605 Deerwood Park Boulevard, Jacksonville, FL 32256

Meeting Sponsor: Vormetric

Our guest speaker: Joe Tomasone

Joe has over 25 years in the information management and security industry. Most notably, Joe worked with Fortress Technologies (now a part of General Dynamics), where his responsibilities included consulting with enterprise customers on wired and wireless encryption and security, as well as evangelistic outreaches to industry associations such as Infragard and ISSA and to various governmental agencies at the local, State, and Federal levels, including briefings to the various civilian and military infosec and intelligence organizations. Joe’s infosec experience also includes industry leaders nCipher (a manufacturer of Hardware Security Modules; now a part of Thales e-Security) and currently Vormetric where he consults with customers on how to leverage encryption and other technologies in their organizations.


Presentation: Lessons To Learn From the Sony Attack

The recent breach at Sony made headlines not only due to the depth of the breach, but also due to the public disclosure of the breached material. This resulted in massive, unexpected problems for Sony – and imparted a few lessons that we can all learn from. In this presentation, we will learn not only how to avoid becoming the “next Sony”, but why this is more important than it might seem on the surface.


For more information visit:



Page 1 of 4
Copyright © 2015 All Rights Reserved.