In-House Risk-Based Security Controls Assessment (SCA) Process

Monday October 7th, 2019 / 6 PM - 9 PM

WHO: Southwest CyberSec Forum

WHEN: 1st Monday of each month 6:00 PM - 9:00 PM

WHERE: UAT theater at 2625 W Baseline Rd, Tempe, AZ 85283

WHY: To stay current with new cyber threats, explore new security technologies, and network with your peers.

FREE: No membership fees, no RSVP’s, food and drinks provided by our sponsors.

 

Sponsor: Ventech Solutions 

Our thanks to Ventech Solutions for sponsoring this months meeting!

Ventech Solutions Logo

 

Sponsor Contact: Jennifer White
Senior Account Executive
Mobile: 480-297-8016
Jennifer.White@ventechsolutions.com

Presentation 1: In-House Risk-Based Security Controls Assessment (SCA) Process (7:00 - 8:00 PM)

Dr Jerry Craig Logo
Dr. Jerry Craig, D.Sc. CCSP, CISSP, InTP, PMP, ITILv3 Intermediate VP, Security Services of Ventech

Session Content:

Most organizations utilize third-party auditors as well as vulnerability and compliance-based assessments to determine the health of their systems prior to receiving an Authority to Operate (ATO) from a designated authority. Each organization in a specific business sector must follow federally mandated frameworks and processes. This is true whether it’s a healthcare organization utilizing frameworks to satisfy HIPAA and HITRUST requirements, military organizations satisfying the Department of Defense’s Certification and Accreditation (C&A) process, or a federal contractor who is required to maintain a security boundary for a Federal Information Security Management Act (FISMA) system.

Dr. Jerry Craig will review a new process in which Security Controls Assessments (SCA) are managed and operated by in-house assessor teams—which allows the federal government to reduced engagement periods and costs, continuous monitoring, deeper knowledge into control families and individual controls, greater visibility into systems, risk-based system vulnerabilities analysis, and most importantly, the ability to stand in a defensible position in the event of a data breach.

Bio:

As Ventech Solutions’ HIDS Security Director, Dr. Craig is responsible for managing the security operations for the Health Care Quality Information Systems (HCQIS) Infrastructure and Data Center Support (HIDS), a program of the Centers for Medicare and Medicaid Services (CMS). His area of responsibilities includes a Security Operations Center, Security Engineering Team, an Identity & Access Management Team, and a Compliance/Audit Team. In addition to his time supporting CMS, Dr. Craig serves as Ventech Solutions’ Vice President of Security Services.

Dr. Craig has over 20 years of experience delivering mission critical systems, services, and IT security solutions to a wide range of Department of Defense customers, universities, and private sector businesses. Dr. Craig led the implementation of the Armed Forces Health Longitudinal Technology Application (AHLTA) for the United States Navy and Air Force and led the deployment of the United States Marine Corps’ Combat Operations Centers for multiple DoD Special Operations units operating in Southeast Asia. For the past 10 years, Dr. Craig has served as an Adjunct Associate Professor for the University of Maryland University College (UMUC), as well as an Adjunct Professor for Capital Technology University (CTU).

Dr. Craig currently holds a Doctor of Science in Cybersecurity, a Master of Science in Network Security, a Master of Arts in Economics and Business Management, and a Bachelor of Science in Computer Studies. Dr. Craig maintains numerous certifications including ISC2’s Certified Information Systems Security Professional (CISSP) and Certified Cloud Security Professional (CCSP), PMI’s Project Management Professional (PMP), CompTIA’s Security+ and A+, and is a certified Insider Threat Program Manager via Carnegie Mellon University’s Software Engineering Institute.

Presentation 2: Blockchain Security (8:00-8:45 PM)

by Michael Noel

Mike Noel Bio Picture

Michael will discuss some of the security implications around Blockchain which is becoming a platform for innovation in many sectors.

Bio:

Fintech Technologist, Publisher, Entrepreneur, and Certified Blockchain Professional, Building Distributed Ledger Architected Organizations

Michael is the Co-Founder and CEO of Blockchain Consultants, Blockchain Weekly Host, Cryptonite Ventures Founding Member, facilitator for three monthly Phoenix Meetups, and one of the first candidates to be Certified by the EC-Council as a Certified Blockchain Professional.

He is on numerous Advisory Boards such as Swift Harvest, Ethera Labs, Lannister Holdings, and Hemp Harvest. Michael is a Member of BizIt M&A and has multiple connections to Private Equity groups, Angel and VC Groups.

 

Cyber and Physical Security Working Together by SRP

Southwest CyberSec Forum

Monday August 5th, 2019 / 6 PM – 9 PM

WHO: Southwest CyberSec Forum

WHEN: 1st Monday of each month 6:00 PM – 9:00 PM

WHERE: UAT theater at 2625 W Baseline Rd, Tempe, AZ 85283

WHY: To stay current with new cyber threats, explore new security technologies, and network with your peers.

FREE: No membership fees, no RSVP’s, food and drinks provided by our sponsors.

 

Sponsor: Check Point Software Technologies 

Our thanks to Check Point Software Technologies for sponsoring this months meeting!

Check Point Logo
Check Point Software Technologies

Sponsor Contacts:

Enterprise Team: AZ,NM,NV
Brian Besse: Territory Manager BBesse@CheckPoint.com 949-521-3590
Jon Fallon: Security Engineer JFallon@CheckPoint.com
Michael Reuland: Business Development MReuland@checkpoint.com
Katie Schweger Renewals Specialist KSchwege@checkpoint.com

Presentation 1: The New Norm – Cyber and Physical Security Working Together – The SRP Example (7:15-8:00 PM)

by Jay Spradling and Kevin Wruble from the Salt River Project (SRP)

Jay Spradling Profile Picture

Jay Spradling

Manager over Security & Business Continuity

As the Manager over Security & Business Continuity for Salt River Project (SRP), Jay Spradling is responsible for the physical security at eight dams, seven power generating stations, and numerous facilities and substations around Arizona. SRP maintains a service territory of 2,900-square miles spanning portions of Maricopa, Gila and Pinal counties. He is the Past Chair of a regional working group of utility security directors and managers from around the west coast.

Prior to SRP, Jay had a 30 year career in law enforcement. During his 25 years with the Tempe (AZ) Police Department, he served in virtually every Bureau or Division of that department. Among his assignments were Detective, Motorcycle Officer, Gang Sergeant, Basic Training Sergeant, Narcotics Commander, and SWAT Team Commander. He retired as an Assistant Chief of Police and then moved over to the Arizona State University (ASU) Police Department, where he served as their Assistant Chief of Police for another five years.

Jay is a graduate of the FBI National Academy and continues to be active with the Board of their Arizona Chapter.

Jay is a long time member and Past President of the Tempe South Rotary Club. He has been active in numerous other charitable organizations, including Tempe Leadership, American Cancer Society, Paz de Cristo, the Boy Scouts of America, Feed My Starving Children, and the Desert Southwest Chapter of the Alzheimerís Association. Jay is married and has two adult children.

Kevin Wruble

Kevin Wruble

Manager over Cyber Security Identity and Access Management

As the Manager over Cyber Security Identity and Access Management for Salt River Project (SRP), Kevin is responsible for the systems and processes which manage access to SRPís electronic assets. SRP maintains a service territory of 2,900-square miles spanning portions of Maricopa, Gila and Pinal counties.

During his 23 years of experience in the information technology and cyber security industries, Kevin has served in a variety of technical and management roles. Kevin has earned CISSP, GLEG, and ITPM certifications, is a graduate of the University of New Mexico, and is married with two children.

Session Content:

This will be an abbreviated content session based on content at the ASIS Phoenix Chapter Bi-Monthly April 2019 Meeting

  • Quick overview of our what we protect for SRP from a physical and cyber perspective
    • How our specific roles differ and align
    • Backgrounds
    • Terminations
    • Investigations
    • Compliance Requirements
    • A need for common vernacular – “We need everything!”
  • C-Suite Perceptions & Issues
  • Insider Threat
  • Q&A

Presentation 2: PENDING (8:00-8:45 PM)

by TBD

We currently have an open slot for the second presentation and will provide updates throughout the month.

 

Building Elegant Security Dashboards for your NOC or SOC & CISSP Domain 1 Security & Risk Management

Phreedom Leadership Photo

Monday June 3rd, 2019 / 6 PM - 9 PM

WHO: Southwest CyberSec Forum

WHEN: 1st Monday of each month 6:00 PM - 9:00 PM

WHERE: UAT theater at 2625 W Baseline Rd, Tempe, AZ 85283

WHY: To stay current with new cyber threats, explore new security technologies, and network with your peers.

FREE: No membership fees, no RSVP’s, food and drinks provided by our sponsors.

 

Sponsor: 

Oracle
Sponsorship by Oracle

Sponsor Contact:

Dan Krpata dan.krpata@oracle.com
Security and Management Specialist
602-549-5197

 

Cyber Threat Rundown with Erik Graham

We have video of our presentations on YouTube!

 

Presentation 1: Building Security Dashboards from Elasticsearch Log Data (7:00-7:45 PM)

by Dean Moore and John Nash of Phreedom Technologies

 

We have video of our presentations on YouTube!

 

John R. Nash Bio Pick
John R. Nash

With the relentless increase in speed and capacity of networks and systems, the logs that are generated can exceed thousands of events per second or more!  Is there any hope for an understaffed security team to keep up with the constant flow of user activity and system events, and hope to make any sense out of it?

John and Dean will show how to build sophisticated security dashboards, sourced from firewall and windows event log data stored in Elasticsearch.  The focus will be on the use of open source tools to build time series histograms and heat maps to identify important data that will highlight how your infrastructure is operating and quickly identify patterns and anomalies that may require further investigation.

Examples:

Dashboard 1
Firewall session for most active users over a 2 day period

Dasboard 3
ISP Daily Bandwidth by Netblock Owner (ASN)

Security Dashboard 2
Daily Heat map of Firewall Policy Events

 

Presentation 2: CISSP Domain 1 Security & Risk Management presented by Tim Hoffman (7:45-8:00 PM)

We have video of our presentations on YouTube!

 

Tim Hoffman
Tim Hoffman

The security & risk management domain is a complex domains that accounts for a total of 16% of the score on the examination. This domain often confuses the more technical personnel because it speaks to business. The intent of the domain puts focus directly on business executives and security personnel who must work together to agree on the proper security activities to perform to achieve optimum governance. The Board and Executive Management will involve themselves with providing strategic direction and making decisions based on risk – then managing risks appropriately while concurrently verifying that the enterprise's resources are used responsibly.

Mr. Timothy Hoffman is a Healthcare Cybersecurity Executive with an extensive US Navy cryptologic background, a serial entrepreneur, and Founder of Tim Hoffman & Associates, LLC. His professional credentials include an MS from Central Michigan University and certifications including: CISSP, GCIH, CCSK, Security+(CE), Network+(CE), ITIL v3, ISO 27001, C|EH, CNDA, Expert Rating PM, ISP, and many others.

Mr. Hoffman’s strength is found in alignment of technology solutions to business needs so as to support business through risk management. His team translates technical speak into everyday language that is easy to understand and has won praise for security program creation, policy & procedure writing, Cloud system design, and network architecture.

Notable career accomplishments include 5 books, radio show host in Italy & US, multiple language facility with fluency in Italian, and platform training to thousands of students on IT & cybersecurity topics for nearly 30 years. He is a competitive level dancer on the global UCWDC scale placing 4th in 2016 and 8th at a higher level in 2019.