Print Page   |   Contact Us   |   Report Abuse   |   Sign In   |   Register
Raleigh ISSA January 7, 2016 Chapter meeting
Tell a Friend About This EventTell a Friend
 

Sponsor: Elastica ::::::::AGENDA:::::::: 5:00 – 6:00pm B2B Open forum discussion - Solicit ideas and feedback on how to shape B-to-B, CISSP Review, and other education initiatives for 2016. 6:00 – 6:45pm ISSA Career Services (Executive conference room) 6:00 – 7:30pm Dinner, beer & wine 7:00 – 7:15pm Chapter Updates from the Board 7:15 – 8:30pm Main Presentation -Elastica - Key components required for a risk-based approach to protecting information in the cloud generation.

1/7/2016
When: Jan 7th 2016
5PM-8:30PM
Where: RTP Headquarters/Conference Center
12 Davis Drive
Research Triangle Park, North Carolina  27606
United States
Contact: Raleigh ISSA voting board


Online registration is closed.
« Go to Upcoming Event List  

Raleigh ISSA January 7, 2016 Chapter Meeting

Meeting Sponsor: Elastica - A Blue Coat Company     

 AGENDA

5:00 – 6:00pm  Back-to-Basics - Open forum discussion -  Solicit ideas and feedback on how to shape B-to-B, CISSP Review, and other education initiatives for 2016. Chuck Kesler/Rick Kassiah
6:00 – 6:45pm ISSA Career Services (Executive conference room)
6:00 – 7:30pm Dinner(Jasmine), beer & wine
7:00 – 7:15pm Chapter Updates from the Board
7:15 – 8:30pm Main Presentation - elastica- Key components required for a risk-based approach to protecting information in the cloud generation.

   

Back-to-Basics(B2B) 5:00-6:00

Open forum discussion -  Solicit ideas and feedback on how to shape B-to-B, CISSP Review, and other education initiatives for 2016. Chuck Kesler/Rick Kassiah

All attendees are invited.  The purpose of this open forum is to identify training needs and how the chapter may be able to help.  

 

Main Presentation 7:15-8:30

Title: Key components required for a risk-based approach to protecting information in the cloud generation.
Abstract: It's no longer a question of if clouds are secure. Rather the question is how are you going to ensure that employees make appropriate use of and interact safely with applications from cloud service providers? Cloud governance, visibility and control are critical issues that need to be addressed. For many organizations cloud strategy still lags cloud use. After touching upon cloud ownership and risk acceptance, we'll, look closely at the two things you still have control over, and certainly accountability for -- the people and the data.
 

 

Marty Weiss


Speaker Bio: Marty M. Weiss is the Director of Sales Engineering at Elastica, and the author of Auditing IT Infrastructure for Compliance and Security+ Exam Cram. He is responsible for helping customers manage security and compliance across cloud applications. He started his career within information security while serving in the United States Navy and has since held various position across information security, risk and compliance. Marty graduated with an MBA form the Isenberg School of Management at the University of Massachusetts Amherst.

 

CompanyElastica, now part of Blue Coat, is the leader in Data Science Powered™ Cloud Access Security. Its CloudSOC™ platform empowers companies to confidently leverage cloud applications and services while staying safe, secure and compliant. A range of Elastica Security Apps deployed on the extensible CloudSOC™ platform deliver the full life cycle of cloud application security, including auditing of shadow IT, real-time detection of intrusions and threats, protection against intrusions and compliance violations, and investigation of historical account activity for post-incident analysis. Blue Coat is a leader in advanced enterprise security, protecting 15,000 organizations every day, including 88 of the 100 largest global companies.

Community Search
Sign In


Forgot your password?

Haven't registered yet?

Calendar

9/26/2016
Secure360-Wisconsin

9/29/2016
Healthcare SIG Webinar: Use of Cloud Services in the Healthcare Industry

10/6/2016
WOMEN CYBER SECURITY PROFESSIONALS LUNCH AND LEARN

10/7/2016
2016 Cyber Security Conference - Cyber Threat Intelligence




Copyright © 2016, Information Systems Security Association, All Rights Reserved
Privacy PolicyCopyright Information