Export or edit this event...

ISACA event - Applied Information Security: Your Best Offense is a Solid Defense

Oregon Department of Fish & Wildlife, Salem, OR
4034 Fairview Industrial Drive Southeast
Salem, OR 97302, US (map)

Oregon Department of Fish & Wildlife 4034 Fairview Industrial Dr SE, Salem, OR 97302

Website

Description

Applied Information Security: Your Best Offense is a Solid Defense

Hear from the Director of Cybersecurity from PGE discuss approaches to building an effective security function using inputs from within the organization, and the CEO and Founder of Verification Labs, on how threat actors utilize available information to map your environment and create a network security attack. Learn how automation techniques can be applied to enhance your defenses and the steps necessary in building an improved incident response.

Where: Oregon Department of Fish & Wildlife 4034 Fairview Industrial Dr SE, Salem, OR 97302

4 CPE

Cost: $20 ISACA Members

$25 Guest/Non-Member

Agenda:

Time: 8:30 am- 10:15 am

Chris Nolke, PGE Cybersecurity Director Topic: Building an Efficient Cybersecurity Organization

Come hear the Director of Cybersecurity from PGE discuss approaches to building an effective security function using inputs from within the organization, and results from risk assessments to inform levels of resources required in developing an efficient security organization tooled for and ready to support the evolving business direction of a utility organization.

In this session you will learn:

  • industry and marketplace considerations useful in searching for the right candidates
  • practices in aligning the organization security requirements to strategic areas with the business
  • methods for engaging broad stakeholders for support of investment levels required for information security function

Break: 10:15 am - 10:30 am Time: 10:30 am - 12:15 pm

Trey Blalock, CEO Verification Labs Topic: Network detection and mapping-Using Automation to Build an Effective Security Response Strategy

Come listen to the CEO and Founder of Verification Labs walk us through a two part session focusing initially on how security threats map and obtain information about your network to identify vulnerabilities for exploit. We will cover how new automation approaches are allowing security professionals to create improved response in addressing these issues.

In this session you will learn:

  • what information bots and other security threats collect in identifying attack vectors
  • what your network reveals about your organization
  • emerging approaches to robust incident management programs leveraging automation rather than resources to enhance response.

We hope to see you there!

Share

Tags