Cyber and Physical Security Working Together by SRP

Southwest CyberSec Forum

Monday August 5th, 2019 / 6 PM - 9 PM

WHO: Southwest CyberSec Forum

WHEN: 1st Monday of each month 6:00 PM - 9:00 PM

WHERE: UAT theater at 2625 W Baseline Rd, Tempe, AZ 85283

WHY: To stay current with new cyber threats, explore new security technologies, and network with your peers.

FREE: No membership fees, no RSVP’s, food and drinks provided by our sponsors.

 

Sponsor: Check Point Software Technologies 

Our thanks to Check Point Software Technologies for sponsoring this months meeting!

Check Point Logo
Check Point Software Technologies

Sponsor Contacts:

Enterprise Team: AZ,NM,NV
Brian Besse: Territory Manager BBesse@CheckPoint.com 949-521-3590
Jon Fallon: Security Engineer JFallon@CheckPoint.com
Michael Reuland: Business Development MReuland@checkpoint.com
Katie Schweger Renewals Specialist KSchwege@checkpoint.com

Presentation 1: The New Norm - Cyber and Physical Security Working Together - The SRP Example (7:15-8:00 PM)

by Jay Spradling and Kevin Wruble from the Salt River Project (SRP)

Jay Spradling Profile Picture

Jay Spradling

Manager over Security & Business Continuity

As the Manager over Security & Business Continuity for Salt River Project (SRP), Jay Spradling is responsible for the physical security at eight dams, seven power generating stations, and numerous facilities and substations around Arizona. SRP maintains a service territory of 2,900-square miles spanning portions of Maricopa, Gila and Pinal counties. He is the Past Chair of a regional working group of utility security directors and managers from around the west coast.

Prior to SRP, Jay had a 30 year career in law enforcement. During his 25 years with the Tempe (AZ) Police Department, he served in virtually every Bureau or Division of that department. Among his assignments were Detective, Motorcycle Officer, Gang Sergeant, Basic Training Sergeant, Narcotics Commander, and SWAT Team Commander. He retired as an Assistant Chief of Police and then moved over to the Arizona State University (ASU) Police Department, where he served as their Assistant Chief of Police for another five years.

Jay is a graduate of the FBI National Academy and continues to be active with the Board of their Arizona Chapter.

Jay is a long time member and Past President of the Tempe South Rotary Club. He has been active in numerous other charitable organizations, including Tempe Leadership, American Cancer Society, Paz de Cristo, the Boy Scouts of America, Feed My Starving Children, and the Desert Southwest Chapter of the Alzheimerís Association. Jay is married and has two adult children.

Kevin Wruble

Kevin Wruble

Manager over Cyber Security Identity and Access Management

As the Manager over Cyber Security Identity and Access Management for Salt River Project (SRP), Kevin is responsible for the systems and processes which manage access to SRPís electronic assets. SRP maintains a service territory of 2,900-square miles spanning portions of Maricopa, Gila and Pinal counties.

During his 23 years of experience in the information technology and cyber security industries, Kevin has served in a variety of technical and management roles. Kevin has earned CISSP, GLEG, and ITPM certifications, is a graduate of the University of New Mexico, and is married with two children.

Session Content:

This will be an abbreviated content session based on content at the ASIS Phoenix Chapter Bi-Monthly April 2019 Meeting

  • Quick overview of our what we protect for SRP from a physical and cyber perspective
    • How our specific roles differ and align
    • Backgrounds
    • Terminations
    • Investigations
    • Compliance Requirements
    • A need for common vernacular – “We need everything!”
  • C-Suite Perceptions & Issues
  • Insider Threat
  • Q&A

Presentation 2: PENDING (8:00-8:45 PM)

by TBD

We currently have an open slot for the second presentation and will provide updates throughout the month.

 

FBI Cyber Task Force Update and Lethal Software Bugs

Monday July 1st, 2019 / 6 PM – 9 PM

WHO: Southwest CyberSec Forum

WHEN: 1st Monday of each month 6:00 PM – 9:00 PM

WHERE: UAT theater at 2625 W Baseline Rd, Tempe, AZ 85283

WHY: To stay current with new cyber threats, explore new security technologies, and network with your peers.

FREE: No membership fees, no RSVP’s, food and drinks provided by our sponsors.

 

Sponsor: 

Our thanks to General Dynamics for sponsoring this months meeting!

General Dynamics Logo
General Dynamics

Sponsor Contact:

John E. Alschuler, CISSP, ISSEP
Systems Engineer, Principal
General Dynamics Mission Systems
8201 E. McDowell Rd, M.S. H2220
Scottsdale, AZ 85257

Presentation 1: FBI Cyber Task Force Update (6:45-8:15 PM)

by FBI Special Agent Paul Schaaf, also Phoenix Co-Infragard Coordinator

FBI Seal
Federal Bureau of Investigation

Paul and team will provide an update on the FBI Cyber Task Force and relevant issues we all face as we collectively work together to keep our national infrastructure safe and secure.

 

Presentation 2: Lethal Software Bugs (8:15-9:00 PM)

Elio Profile Picture
Elio Grieco
No one is perfect, but software should be. As we continue to add software into more aspects of our lives, the impact of bugs becomes increasingly more dangerous. Well cover the history of bugs that have killed people, what can be done to prevent such tragedies, and likely future industry trends. We’ll also talk about various policies and techniques that can be used to create software that is trustworthy and bug free.

This plays into last months presentation on the CISSP Domain One and how human life should be priority one when balancing decisions on cyber security.

Building Elegant Security Dashboards for your NOC or SOC & CISSP Domain 1 Security & Risk Management

Phreedom Leadership Photo

Monday June 3rd, 2019 / 6 PM - 9 PM

WHO: Southwest CyberSec Forum

WHEN: 1st Monday of each month 6:00 PM - 9:00 PM

WHERE: UAT theater at 2625 W Baseline Rd, Tempe, AZ 85283

WHY: To stay current with new cyber threats, explore new security technologies, and network with your peers.

FREE: No membership fees, no RSVP’s, food and drinks provided by our sponsors.

 

Sponsor: 

Oracle
Sponsorship by Oracle

Sponsor Contact:

Dan Krpata dan.krpata@oracle.com
Security and Management Specialist
602-549-5197

 

Cyber Threat Rundown with Erik Graham

We have video of our presentations on YouTube!

 

Presentation 1: Building Security Dashboards from Elasticsearch Log Data (7:00-7:45 PM)

by Dean Moore and John Nash of Phreedom Technologies

 

We have video of our presentations on YouTube!

 

John R. Nash Bio Pick
John R. Nash

With the relentless increase in speed and capacity of networks and systems, the logs that are generated can exceed thousands of events per second or more!  Is there any hope for an understaffed security team to keep up with the constant flow of user activity and system events, and hope to make any sense out of it?

John and Dean will show how to build sophisticated security dashboards, sourced from firewall and windows event log data stored in Elasticsearch.  The focus will be on the use of open source tools to build time series histograms and heat maps to identify important data that will highlight how your infrastructure is operating and quickly identify patterns and anomalies that may require further investigation.

Examples:

Dashboard 1
Firewall session for most active users over a 2 day period

Dasboard 3
ISP Daily Bandwidth by Netblock Owner (ASN)

Security Dashboard 2
Daily Heat map of Firewall Policy Events

 

Presentation 2: CISSP Domain 1 Security & Risk Management presented by Tim Hoffman (7:45-8:00 PM)

We have video of our presentations on YouTube!

 

Tim Hoffman
Tim Hoffman

The security & risk management domain is a complex domains that accounts for a total of 16% of the score on the examination. This domain often confuses the more technical personnel because it speaks to business. The intent of the domain puts focus directly on business executives and security personnel who must work together to agree on the proper security activities to perform to achieve optimum governance. The Board and Executive Management will involve themselves with providing strategic direction and making decisions based on risk – then managing risks appropriately while concurrently verifying that the enterprise's resources are used responsibly.

Mr. Timothy Hoffman is a Healthcare Cybersecurity Executive with an extensive US Navy cryptologic background, a serial entrepreneur, and Founder of Tim Hoffman & Associates, LLC. His professional credentials include an MS from Central Michigan University and certifications including: CISSP, GCIH, CCSK, Security+(CE), Network+(CE), ITIL v3, ISO 27001, C|EH, CNDA, Expert Rating PM, ISP, and many others.

Mr. Hoffman’s strength is found in alignment of technology solutions to business needs so as to support business through risk management. His team translates technical speak into everyday language that is easy to understand and has won praise for security program creation, policy & procedure writing, Cloud system design, and network architecture.

Notable career accomplishments include 5 books, radio show host in Italy & US, multiple language facility with fluency in Italian, and platform training to thousands of students on IT & cybersecurity topics for nearly 30 years. He is a competitive level dancer on the global UCWDC scale placing 4th in 2016 and 8th at a higher level in 2019.

 

Presentations on Intel AMT and NGFW Next Generation Firewalls

Presentation 1: Security Implications of Intel's Active Management Technology (AMT)

Presented by Gorden Bader, CISSP

Intel Active Management Technology (AMT) is hardware and firmware technology for remote out-of-band management of personal computers, running on the Intel Management Engine, a separate microprocessor not exposed to the user, in order to monitor, maintain, update, upgrade, and repair them.

Presentation 2: Review of Modern Next Generation Firewalls (NGFW)

by John Nash, VP of Technology, Phreedom Technologies

John R. Nash, VP of Technology Picture
John R. Nash, VP of Technology, LLC

 

John Nash of Phreedom Technologies presents a feature round up of modern perimeter firewalls. There is a lot of confusion and misconceptions, even among security professionals about what modern firewalls do.  Even the terms Next Generation, NGFW or 4th Generation Firewall which are commonly thrown around by vendors can be confusing and misleading.  John breaks down the features of a sampling of the the leading firewall vendors giving you a clear picture of what the proper role of a perimeter firewall plays in your organization and how it ties into your overalls security strategy. This is tailored to professionals at every stage in their career.

Review of Modern Firewalls and the Security implications of Intel’s Active Management Technology (AMT)

Metro Area

Monday May 6th, 2019

This month we have Gordon Bader provide an overview of the Security Implications of Intel's Active Management Technology (AMT) which is an embedded technology in many of the system we all use which provides out-of-band vectors for attack that most companies are not aware of along with John Nash who will be perform a feature round up of modern perimeter firewalls.

Erik Graham will be presenting his popular cyber threat update as usual.

This meeting is free and open to the public, so please invite your friends & bring your best questions. Our goal is to foster the exchange of information between businesses, government and educational institutions.

Free to the public, no RSVP's, food and drinks provided by our sponsors.

2625 W Baseline Rd, Tempe, AZ 85283 (Map)

Sponsor: 

 

At this time we have an open sponsorship slot.  If you would like to sponsor this meeting information on our sponsorship page or contact John Nash

AGENDA

Networking, Food and Drinks

  • 6:00 to 6:30 pm
  • No Entry into the UAT Theater until 6:30 as classes are in session
  • No Food or Drink inside the UAT theater at any time

General Announcements & Sponsor Segment

  • 6:30 to 6:50 pm
  • Sponsorship pending

Cyber Threat Updates by Erik Graham

  • 6:50 to 7:00 pm
  • Erik will be presenting his cyber update in his usual entertaining style.

An overview of the Security Implications of Intel's Active Management TechnologySecurity Management with Gordon Bader

  • 7:00 to 7:45 pm

Intel Active Management Technology (AMT) is hardware and firmware technology for remote out-of-band management of personal computers, running on the Intel Management Engine, a separate microprocessor not exposed to the user, in order to monitor, maintain, update, upgrade, and repair them.

Gordon is a recently retired systems architect with over 40 years of experience in software/systems engineering, with an emphasis in real time embedded systems, as applied to electronic warfare, flight management systems, GPS, GIS systems, encryption systems, satellite communication systems (SBS, Iridium, Celestri, Teledesic) and system security architectures (multiple levels of security (MLS), multiple independent levels of security (MILS), separation and cross domain).

Join Gordon  he reviews the security implications of this ubiquitous, but not commonly understood technology.

A Feature Round Up of Modern Perimeter Firewalls with John Nash

  • 7:45 to 8:45 pm

John R. Nash Bio Pick
John R. Nash

John Nash of Phreedom Technologies will present the feature round up of modern perimeter firewalls.

There is a lot of confusion and misconceptions, even among security professionals about what modern firewalls do.  Even the terms Next Generation, NGFW or 4th Generation Firewall which are commonly thrown around by vendors can be confusing and misleading.  John will break down the features of a sampling of the the leading firewall vendors and allow you to leave with a clear picture of what the proper role of a perimeter firewall plays in your organization and how it ties into your overalls security strategy. This is open to professionals at every stage in their career.

Over the last 34 years, John has worked for Rockwell International in the R&D labs for the GPS system, as a field engineer for communication carriers deploying packet switched technologies and is now VP of Technology for Phreedom Technologies with his business partner Dean Moore.

Wrap Up and Networking

  • 8:45 to 9:00 pm

ISO 27001 Information Security Management and Hacking Hired

Metro Area

Monday April 1st, 2019

This month we have Dave Anders presenting on Information Security Management with an emphasis on ISO 27001 along with Rachel Harpley who will be presenting Hacking Hired: Work the Vectors, Get the offer.

Erik Graham will be presenting his popular cyber threat update as usual.

This meeting is free and open to the public, so please invite your friends & bring your best questions. Our goal is to keep you, your co-workers, and your family informed and safe

Free to the public, no RSVP’s, food and drinks provided by our sponsors.

2625 W Baseline Rd, Tempe, AZ 85283 (Map)

Sponsor: 

 

At this time we have an open sponsorship slot.  If you would like to sponsor this meeting information on our sponsorship page or contact John Nash

AGENDA

Networking, Food and Drinks

  • 6:00 to 6:30 pm
  • No Entry into the UAT Theater until 6:30 as classes are in session
  • No Food or Drink inside the UAT theater at any time

General Announcements & Sponsor Segment

  • 6:30 to 6:50 pm
  • Sponsorship pending

Cyber Threat Updates by Erik Graham

  • 6:50 to 7:00 pm
  • Erik will be presenting his cyber update in his usual entertaining style.

Information Security Management with Dave Anders

  • 7:00 to 7:45 pm

As CEO/Partner of iCertWorksISO Manager and SecuraStar, Dave Anders has worked for decades managing a broad spectrum of risk management products and services for some of the largest organizations in the world

Join Dave as he reviews the method and approach used to apply the ISO 27001 framework to multinational organizations with complex risk models.

 

 

Hacking Hired: Work the Vectors, Get the Offer with Rachel Harpley

  • 7:45 to 8:45 pm

Rachel Harpley of Recruit Bit Security will present the insider track on how to manage your cyber security career trajectory.

There are no traditional career paths in cyber security, but the recruiting process often lacks transparency. Come learn from an insider to build your own career. This talk, “Hacking Hired,” identifies the four primary vectors of your job search and shares insights on how to work these vectors to your advantage to create the career you want. From a high-level, these vectors are the tools, technology, organizations and people. This is open to professionals at every stage in their career.

 

Wrap Up and Networking

  • 8:45 to 9:00 pm

Southwest CyberSec Forum Sponsored by Phreedom Technologies

Metro Area

Monday March 4th, 2019

WHO: Southwest CyberSec Forum
WHEN: 1st Monday of each month (excluding holidays)
WHERE:  UAT theater at 2625 W Baseline Rd, Tempe, AZ 85283 (NEW LOCATION!)
WHY: To stay current with new cyber threats, explore new security technologies, and network with your peers.
FREE: No membership fees, no RSVP’s, food and drinks provided by our sponsors.

This month we have Rebecca Wynn presenting on Cybersecurity.  Rebecca, (CISSP, CRISC, CASP, CCISO) is a very accomplished speaker and leader in cybersecurity and someone you don’t want to miss, and Elio Grieco will be presenting on AI, Machine Learning and the driving forces behind them.

Erik Graham will be presenting his popular cyber threat update as usual.

This meeting is free and open to the public, so please invite your friends & bring your best questions. Our goal is to keep you, your co-workers, and your family informed and safe

Notice: Until Further Notice, all future meetings will be at the University of Advancing Technology in Tempe, AZ.

2625 W Baseline Rd, Tempe, AZ 85283 (Map)

Sponsor: 

 

Phreedom Logo
Phreedom Technologies

Phreedom Technologies offers premier managed IT, security and infrastructure services which take distractions off your plate and allow you to focus on your business.   Our solutions include core network, on/off-site backups and managed security.

As a small business owned and managed by local entrepreneurs, Phreedom is agile, responsive and accessible.

Contact Dean (602-336-3452) or John (602-336-3451) to get started.

Phreedom is proud to support the Phoenix cyber community though our regular sponsorship of the SWCSF.

AGENDA

Networking, Food and Drinks

  • 6:00 to 6:30 pm
  • No Entry into the UAT Theater until 6:30 as classes are in session
  • No Food or Drink inside the UAT theater at any time

General Announcements & Sponsor Segment

  • 6:30 to 6:50 pm
  • Sponsorship pending

Cyber Threat Updates by Erik Graham

  • 6:50 to 7:00 pm
  • Erik will be presenting his cyber update in his usual entertaining style.

Cybersecurity Masterpiece Theater with Dr. Rebecca Wynn

  • 7:00 to 7:45 pm

Who should be put in jail if a company has a data breach? Come and take part in looking at recent court cases, pending legislation, data breaches, and be on the jury. Who should be sent to jail? CEO? CIO? CTO? CISO? Employee?

Named 2017 Cybersecurity Professional of the Year – Cybersecurity Excellence Awards, Chief Privacy Officer (CPO) SC Magazine, Global Privacy and Security by Design (GPSbyDesign) International Council Member, SC Magazine’s List of “Women in IT Security – Top Influencers for 2018, and finalist Women in Technology Business Role Model of the Year 2018 – Dr. Rebecca Wynn is lauded as a “game-changer who is ten steps ahead in developing and enforcing cybersecurity and privacy best practices and policies.” She is a “big picture” thinker who brings nearly 20 years of experience in Information Security, Assurance & Technology. Recently she led the information security, privacy, and compliance pre-acquisition, acquisition and post-acquisition of LearnVest, Inc. to Northwestern Mutual Life Insurance Company – a Fortune 100 company. She is well known for being a gifted polymath, having deep understanding of current cyber security challenges and privacy issues. She has a proven track record of taking companies to the next level of excellence in many sectors including government, financial services, fintech, healthcare, information technology, legal, semiconductors, and retail. Always open to new opportunities.

Elio Grieco

  • 7:45 to 8:45 pm

What is Machine Learning?  How is it different than AI?  How does it work, how is it being used today and what are the implications for cybersecurity industry?

Elio Profile Picture
Elio Grieco

As a respected member of the Phoenix cyber community Elio will be speaking on AI/Machine Learning, the factors that are driving the adoption of these technologies, how they are being used and their trajectory and impact on our tech and society.

Wrap Up and Networking

  • 8:45 to 9:00 pm

Meeting 2019-Feb

Metro Area

Monday February 4th, 2019

WHO: Southwest CyberSec Forum
WHEN: 1st Monday of each month (excluding holidays)
WHERE:  UAT theater at 2625 W Baseline Rd, Tempe, AZ 85283 (NEW LOCATION!)
WHY: To stay current with new cyber threats, explore new security technologies, and network with your peers.
FREE: No membership fees, no RSVP’s, food and drinks provided by our sponsors.

This month we have Tool Time with Tim Gracia (SANS Instructor) providing a run down on useful Cybersecurity tools. Tim will be followed by Gavin Klondike whom will be doing a deep dive on Machine Learning which is a trending technology that has significant implications for the Cybersecurity arena.

Erik Graham will be presenting his popular cyber threat update as usual.

This meeting is free and open to the public, so please invite your friends & bring your best questions. Our goal is to keep you, your co-workers, and your family informed and safe

Notice: Until Further Notice, all future meetings will be at the University of Advancing Technology in Tempe, AZ.

2625 W Baseline Rd, Tempe, AZ 85283 (Map)

Sponsor: 

Fortinet Logo
Fortinet

We provide top-rated network and content security, as well as secure access products that share intelligence and work together to form a cooperative fabric. Our unique security fabric combines Security Processors, an intuitive operating system, and applied threat intelligence to give you proven security, exceptional performance, and better visibility and control–while providing easier administration.

Fortinet Contacts:

 

AGENDA

Networking, Food and Drinks

  • 6:00 to 6:30 pm
  • No Entry into the UAT Theater until 6:30 as classes are in session
  • No Food or Drink inside the UAT theater at any time

General Announcements & Sponsor Segment

  • 6:30 to 6:50 pm
  • Sponsorship by Fortinet whom provides world-class security solutions
Fortinet Logo
Sponsor: Fortinet

Cyber Threat Updates by John Nash

  • 6:50 to 7:00 pm
  • Erik is out today so John will cover all cybersecurity news of note since the last meeting.

Links from Cyber Threat Update:

Tool Time with Tim Garcia

  • 7:00 to 7:45 pm
  • As a long standing SAN instructor and a veteran security professional Tim Garcia will review useful cybersecurity tools, is always a group favorite and will be sure to make the forum well worth your time.
  • Tim has been kind enough to share his presentation which can be found here. Note: this link/location may change when we re-organize the site.

Machine Learning for Security Analysts with Gavin Klondike

  • 7:45 to 8:45 pm

Machine Learning Abstract:

Today, over a quarter of security products for detection have some form of machine learning built in. However, “machine learning” is nothing more than a mysterious buzzword for many security analysts. In order to properly deploy and manage these products, analysts will need to understand how the machine learning components operate to ensure they are working efficiently. In this talk, we will dive head first into building and training our own machine learning models using the 7-step machine learning process.

And Gavin has graciously provided the slides to his presentation in advance which can be accessed below. Thanks Gavin!

SlideShare: Machine Learning for Security Analysts

Slides: https://www.slideshare.net/GTKlondike/machine-learning-for-security-analysts

GitHub: Machine-Learning-for-Security-Analysts

GitHub Code/Docs: https://github.com/NetsecExplained/Machine-Learning-for-Security-Analysts

Gavin’s Bio:

Gavin is a senior consultant and researcher who has a passion for network security, both attack and defense. Through that passion, he runs NetSec Explained; a blog and YouTube channel which covers intermediate and advanced level network security topics, in an easy to understand way. His work has given him the opportunity to be published in industry magazines and speak at conferences such as Defcon and CactusCon. Currently, he is researching into ways to address the cybersecurity skills gap, by utilizing machine learning to augment the capabilities of current security analysts.

YouTube: https://www.youtube.com/channel/UCsKK7UIiYqvK35aWrCCgUUA
Website: https://netsecexplained.com/

Past talks and publications:

Wrap Up and Networking

  • 8:45 to 9:00 pm

Meeting Recap 2019-Jan

Jan 7th, 2019 Meeting Recap

And as usual we had another great session this Month! Casey Reid of Tenable did a terrific presentation on Vulnerability Management and outlined the challenges even the largest companies have with tracking their network assets.  Erik Graham also provided the monthly Cyberthreat run down which is as much entertaining as it is educational.

Vulnerability Management 2.0

Casey Reid, Principle Security Engineer at Tenable

Some of the key points were of Casey’s presentation were as follows:

Asset Management:

The ability to know what you have on your network through regular scanning, as well as a process to decide when to allow a device on its network based on its risk score and whether it has been scanned or not.

Scanning Containers and other virtualized and variable workloads

Containers provided by kubernetes docker present special challenges when it comes to scanning.

Scanning Cloud Resources:

Identifying tools and processes to detect and scan ephemeral resources. In many cases this is best handled by intelligent agents that can integrate with your scanning tools:

Scanning ICA/SCADA Control Systems

Focus on scanning non-traditional assets such as ICA/SCADA control systems

CVE Scoring and what is wrong with it

The issues with CVE scoring and how you sometimes have to override those defaults and create custom methodologies to prioritize your remediation based on whether exploitable exist for those vulnerabilities as well as if they are at the edge or in more protected network zones.

Group Discussion

Finally there was a lively discussion around these topics with healthy participation by the audience. It is always good to see a dynamic group interaction like the one we had last night which indicates we have engaging speakers and an audience that is willing to challenge them.

FBI Presentation:

Paul Schaaf of the FBI also provided key information on the trends on Cyber and the ongoing challenges we all have as we enter 2019.

Sponsorship by Nuix:

Finally, thanks to David Petty and Matt Dunbar of Nuix for sponsoring. They provided key information on their product line and how they are solving tough problems in security management for some of the largest organizations in the world.

Nuix Logo

 

Thanks all for Attending!

Meeting 2019-Jan

Federal Panel

Monday January 7th, 2019

WHO: Southwest CyberSec Forum
WHEN: 1st Monday of each month (excluding holidays)
WHERE:  UAT theater at 2625 W Baseline Rd, Tempe, AZ 85283 (NEW LOCATION!)
WHY: To stay current with new cyber threats, explore new security technologies, and network with your peers.
FREE: No membership fees, no RSVP's, food and drinks provided by our sponsors.

 

Our FBI forum is always our most attended meeting and we expect a good turnout for this one as well. Be sure and invite all your friends for a very informative and timely presentation from Paul Schaaf, Special Agent. He will be proceeded by Casey Reid of Tenable (Provider of Nessus) presenting "Vulnerability Management 2.0." And of course Erik Graham will be presenting his popular cyber threat update as well.

This meeting is free and open to the public, so please invite your friends & bring your best questions. Our goal is to keep you, your co-workers, and your family informed and safe

Notice: Until Further Notice, all future meetings will be at the University of Advancing Technology in Tempe, AZ.

2625 W Baseline Rd, Tempe, AZ 85283

Sponsor: 

Nuix Logo

NUIX Endpoint security, governance, risk and compliance

Contact:

David Petty
SVP Commercial Sales
David.Petty@nuix.com | http://www.nuix.com
Ph: 1-703-969-5056
Herndon, VA

LinkedIn

 

AGENDA

*6:00 to 6:30*
Networking outside the UAT theater

(No Food Inside Theater Please per UAT rules)

*6:30 to 6:50 pm* 
General Announcements & Sponsor Segment

*6:50 to 7:00 pm*
Cyber Threat Updates by Erik Graham

*7:00 to 7:45 pm*
Vulnerability Management 2.0

Presented By

Casey Reid, Principle Security Engineer

Tenable (Maker of Nessus Software)

LinkedIn

*7:45 to 8:45 pm*
Paul Schaaf presents FBI Year End Review and What's Coming for 2019

*8:45 to 9:00 pm*
Wrap Up and Networking