Raleigh ISSA THURSDAY July 7, 2016 Chapter Meeting
Meeting Sponsor -
5:15 – 6:00pm Career Services (Conference Room 1)
5:15 – 6:00pm CISSP Study Group (Conference Room 2)
5:15 – 6:00pm Back-to-Basics (Main Room) TBA
6:00 – 6:30pm Randys Pizza and Wings/ Drink / Socializing (Lobby)
6:15 - 8:30pm SPECIAL EVENT - CAPTURE THE FLAG - (Conference room 1) – Josh Rahman
7:00 – 7:15pm Board Updates (Main Room)
7:15 – 8:15pm Main Presentation - Clark Walton Managing Director of Reliance Forensics, LLC,
6:15 - 8:30 Capture the Flag Hosted by Josh Rahman - Conference room 1
Josh Rahman is hosting a CTF event during our July Chapter meeting. This CTF event is geared towards beginner to intermediate skill levels. There will be hint throughout the event.
- This is a first come first served event
- All participants will need a fully updated kali linux with at least 1 core and 1 gig of ram.
- topics will include enumeration, exploitation, network traffic analysis, and some other secrets.
- All participants need to be ready to start at 6:15.
7:15 Main Presentation: Security Breaches
Speaker: Clark Walton - Managing Director of Reliance Forensics, LLC,
Clark Walton is the Managing Director of Reliance Forensics, LLC, a private cybersecurity consulting and digital forensics firm based in Charlotte, North Carolina. Clark has practiced law in Charlotte for over 10 years and has been involved in cybersecurity and digital evidence issues for over 15 years. A former CIA cyber threat analyst, Clark is a former member of the American Bar Association Advisory Committee on National Security and is a contributing author to the ABA Cybersecurity Handbook, published in 2013. Also a former assistant DA and special federal prosecutor, he has a Computer Science degree from the University of North Carolina at Chapel Hill and a law degree from Georgetown University Law Center. An adjunct law professor in the areas of cybercrime and evidence, Clark was named the ABA National Outstanding Young Lawyer for 2012 and has lectured and trained attorneys, military assets, and computer forensics and law students regarding the intersection of information security and the law. He is an EnCase Certified Examiner and a Cellebrite Certified Mobile Examiner.
Beginning with the South Carolina Department of Revenue data breach in 2012, and then following breaches at Target, Sony, Home Depot and then the US Office of Personnel Management, public awareness of information security breaches is at its highest level ever. The dynamic has brought to the forefront a series of laws and regulations, both state and federal, requiring entities to report data compromises to government or regulatory bodies, as well as to victims of these compromises. This session will focus on these laws and obligations, the importance of planning for a possible breach, understanding the types of data that an entity maintains in order to minimize risks and move to action, and noting legal boundaries in conducting an internal investigation. The session will also discuss the importance of the involvement in various actors in a breach response plan, including attorneys, information security professionals, public relations personnel, law enforcement or industry regulators. There will also be a discussion of the growing trend toward cyber liability coverage in the insurance industry and current issues associated therewith.