Print Page   |   Contact Us   |   Report Abuse   |   Sign In   |   Register
Raleigh ISSA September 3 2015 Chapter meeting
Tell a Friend About This EventTell a Friend
Raleigh ISSA September 3 2015 Chapter meeting

Dual Sponsor meeting!! Intelisecure & Synack Agenda: 5:30 – 6:30pm Vendor Presentation - Synack 6:00 – 6:45pm ISSA Career Services (Executive conference room) 6:30 – 7:30pm Dinner Jasmines, beer & wine 7:20 – 7:30pm Chapter Updates from the Board 7:30 – 8:30pm Vendor Presentation -Chuck Bloomquist CTO - Intelisecure "Technical Considerations when Selecting and Deploying a Data Loss Prevention Solution"

9/3/2015
When: 9/3/2015
5:30 PM
Where: RTP Headquarters/Conference Center
12 Davis Drive
Research Triangle Park, North Carolina  27606
United States
Contact: Raleigh ISSA Board


Online registration is closed.
« Go to Upcoming Event List  

 

Raleigh ISSA September 3, 2015 Chapter Meeting

 

MEETING STARTS AT 5:30PM!!!!!

Dual Sponsor!!

                                 

Agenda:
5:30 – 6:30pm  Vendor Presentation - Synack - Redefining Vulnerability Discovery – Beyond Bug Bounty - Gus Anagnos
6:00 – 6:45pm ISSA Career Services (Executive conference room)
6:30 – 7:30pm Dinner Jasmines, beer & wine
7:20 – 7:30pm Chapter Updates from the Board
7:30 – 8:30pm Vendor Presentation -Chuck Bloomquist CTO - InteliSecure "Technical Considerations when Selecting and Deploying a Data Loss Prevention Solution"

 

 5:30-6:30 Synack Presentation

 TITLE:   Redefining Vulnerability Discovery – Beyond Bug Bounty

Companies increasingly turn to bug bounty initiatives to identify weak points and add value to broader security programs. But limitations still exist. What’s the next-generation model for vulnerability discovery?

  SPEAKER: Gus Anagnos

Speaker Bio:

As Vice President of Strategy and Customer Operations at Synack, Gus brings over 18 years of invaluable experience working in information security and enterprise risk.  Gus is known as an industry leader as a result of his hands-on development and implementation of many successful global corporate risk mitigation programs.  Among his many achievements, Gus Anagnos takes pride in having developed and executed one of the most respected crowd sourced security programs in Silicon Valley; because of Gus, PayPal was an early and successful adopter of Bug Bounty and the first financial institution to innovate in this area.


As Vice President of Strategy and Customer Operations at Synack, Gus leverages his diverse experience helping Synack customers harness enterprise grade crowd security intelligence to bolster their security programs and protect their businesses.

 

7:30-8:30  InteliSecure Presentation

TITLE: "Technical Considerations when Selecting and Deploying a Data Loss Prevention Solution"

SPEAKER: Chuck Bloomquist CTO

 

 BIO:

Chuck is the co-founder and Chief Technology Officer at InteliSecure.  He has 20+ years of experience developing and implementing technology based solutions. He pioneered the development and rollout of a successful national internet service provider in the formative days of the ISP industry.  Chuck then transitioned to TicketMaster and designed and implemented new ticketing methods and concessions systems that used cutting edge technology.  He was then recruited to lead the development of customer services centers at Productive Data Systems and Kit Carson Rural Electric, transitioning both organizations’ operations from traditional dial-in call centers to fully integrated communication platforms.  For the past 11 years, Chuck has pioneered the Data Loss Prevention service delivery and support model and supporting platforms.

ABSTRACT:

Technical Considerations when Selecting and Deploying a Data Loss Prevention Solution

 

Data Loss Prevention (DLP) is a powerful and versatile tool in any organizations’ information security arsenal.  Join InteliSecure’s CTO, Chuck Bloomquist and Eric Dahlgren, Director of the Advanced Solutions Group under Chuck, as they discuss the technical considerations for selecting and deploying DLP

The talk will discuss the technical details of DLP, and will review the following:

·         Product Selection

o   Based on specific use cases, such as:

§  Existing infrastructure, business processes and data types

§  Network design – hub and spoke vs. cloud vs. centralized data centers

§  Storage environment

o   Special considerations, such as:

§  Internal political environment and approved vendors

·         Implementation and Management

o   Preparing the Network

o   Logistics of implementation

o   Infrastructure

o   Data Types

§  Data In Motion, Data At Rest and Data In Use

o   Company Processes

·         The Evolving Landscape of DLP

o   Challenges moving forward

o   Future considerations for DLP

o   Vendor challenges

 

Community Search
Sign In


Forgot your password?

Haven't registered yet?

Calendar

12/10/2016
SecureMiami

12/12/2016
Women in Security SIG Monthly Webinar

12/13/2016
SANS/ISSA Women's CONNECT Event

12/15/2016
Healthcare SIG Webinar: Auditing and Access to Electronic Health Records




Copyright © 2016, Information Systems Security Association, All Rights Reserved
Privacy PolicyCopyright Information