Print Page   |   Contact Us   |   Report Abuse   |   Sign In   |   Register
Raleigh ISSA June 5 2014 Chapter Meeting
View Registrations Tell a Friend About This EventTell a Friend
Raleigh ISSA June 5 2014 Chapter Meeting

As always the greatest ISSA Chapter in the universe has an absolutely awesome agenda (Best in the universe) planned for the June 5th chapter meeting. TRIPLE PLAY!!! 1) B2B - Networking 101 2) Chris Maroun from CyberArk will present “Managing Privileged Account Security” 3) Featured Presentation –NC FBI Red Dart Team – “The Company Man: Protecting Americas Secrets” – Video and discussion Special Thanks to our meeting sponsor - CyberArk

6/5/2014
When: 6/5/2014
5:00 PM
Where: McKimmon Center NC State
1101 Gorman Street
Raleigh, North Carolina  27606
United States
Contact: Voting Board


Online registration is closed.
« Go to Upcoming Event List  

Raleigh ISSA June 5th Chapter Meeting + B2B


Sponsored by: CyberArk                               

AGENDA:

5:00 - 5:45pm Back 2 Basics –Networking 101

6:00 - 6:45pm Jobs Networking (Look for room location on lobby directory)
5:45 - 7:00pm Sponsor Presentation – Chris Maroun - “Managing Privileged Account Security”

6:00 – 7:00pm Dinner – (Raleigh Times)
7:00 – 7:15pm Chapter Updates from the Board
7:15 – 8:30pm Presentation –
– Featured Presentation –NC FBI Red Dart Team – “The Company Man: Protecting Americas Secrets” – Video and discussion


MEMBERS PLEASE RSVP HERE- >
http://www.issa.org/events/event_details.asp?id=436945

 

GUESTS PLEASE RSVP HERE-- > http://raleighissaguest.eventbrite.com

 

BACK TO BASICS (5:00PM – 5:45PM)

 

TITLE:  Networking 101

DESCRIPTION:
  We will cover the fundamentals of networking (the digital kind), including addressing, ports, protocols, network devices, and real world examples.

 

SPEAKER: Peter Hewitt, QSA, ASV, GAWN, GCWN, GCFA, GCIH, GWAS, CISSP, CISA, Senior Security Engineer at Agio


SPEAKER BIO: 

Peter is an information assurance professional with close to two decades of experience working with financial, insurance and technology organizations. He even spent some time in sales, but he's all better now (although he still pronounces the letter "q" with a mild eye twitch). Pete specializes in penetration testing, Windows security, wireless security, forensics and incident response. This year, he plans to feed his acronym addiction by getting the OSCP.



SPONSOR PRESENTATION (5:45-7:00PM)

 

TITLE:  Managing Privileged Account Security

 

SPEAKER:  Chris Maroun - Regional Sales Engineering Manager - CyberArk

 

SPEAKER BIO:

Chris Maroun is the Regional Sales Engineering Manager for the East Coast region of the United States.  He is responsible for the technical management of all accounts within the region. 

Maroun has been involved in Privileged Account Security for over 8 years, and has successfully identified and implemented solutions that have helped secure the critical infrastructure of many of the world’s largest companies.  Previously, Chris worked within the Systems Administration teams for some of the region’s largest financial institutions.

With that knowledge and years of hands on experience Chris has dealt with an array of questions and custom requests. Chris has been able to successfully implement and educate a wide range of customers throughout his tenure with CyberArk. 

Now involved with all accounts across the East Coast he has established relationships with many of the region’s best known enterprises.

 

Main Presentation (7:15-8:30PM)   

 

TITLE:  “The Company Man: Protecting America’s Secrets”

PRESENTATION ABSTRACT:

The Company Man: Protecting America's Secrets, a compelling story based upon
an actual FBI investigation involving the targeting of a US company's trade
secrets by a foreign adversary.  This film is one of the FBI's primary tools
in spreading awareness about the threat of economic espionage and protection
of trade secrets.

Robert Moore has been a loyal employee for nearly 15 years but is having
financial difficulties at home.

Eight thousand miles away, a devastating apartment fire in Shanghai, China
kills 57 people. Then comes a job offer to Robert from a local
headhunter...and a break-in at the factory where he works. These three
seemingly unrelated events soon threaten the financial viability of the
entire company, and the small community where he lives.

The Company Man is based on a true story. It is a cautionary tale for all
employees to be invested in the protection of their company's trade secrets.

Produced by the FBI's Counterintelligence Strategic Partnership Unit in
association with the National Counterintelligence Executive and Rocket Media
Group

 

SPEAKER:  Members of the Red Dart Team

 

Red Dart Bio:   The stated purpose of the RED DART program is to create a unified, cross-
agency team of counterintelligence (CI) professionals dedicated to the
protection of classified, export controlled, and sensitive technology
research throughout the state of North Carolina.

The backbone of the RED DART program is an aggressive and focused CI
awareness and education briefing program aimed at Cleared Contractors,
academic institutions, or other entities supporting Department of Defense
research in North Carolina. The briefing program focuses on bringing
real-time, specific, and relevant CI information to industry in order for
them to better protect themselves and their intellectual property. The end
result of the aggressive nature of the briefing program is increased
reporting of suspicious incidents, both in quality and quantity.

 

RSVP Link: http://www.issa.org/events/event_details.asp?id=436945

See more details at the Raleigh ISSA Event Page

http://raleigh.issa.org/ai1ec_event/2014-06-meeting

Community Search
Sign In


Forgot your password?

Haven't registered yet?

Calendar

10/6/2016
WOMEN CYBER SECURITY PROFESSIONALS LUNCH AND LEARN

10/7/2016
2016 Cyber Security Conference - Cyber Threat Intelligence

10/11/2016
SANS/ISSA Women's CONNECT Event

10/12/2016 » 10/13/2016
Hawaii's 23rd Annual Discover Security Conference 2016

10/13/2016
October 2016 CISO Mentoring Webinar Series




Copyright © 2016, Information Systems Security Association, All Rights Reserved
Privacy PolicyCopyright Information