Monday October 7th, 2019 / 6 PM - 9 PM
WHO: Southwest CyberSec Forum
WHEN: 1st Monday of each month 6:00 PM - 9:00 PM
WHERE: UAT theater at 2625 W Baseline Rd, Tempe, AZ 85283
WHY: To stay current with new cyber threats, explore new security technologies, and network with your peers.
FREE: No membership fees, no RSVP’s, food and drinks provided by our sponsors.
Sponsor: Ventech Solutions
Our thanks to Ventech Solutions for sponsoring this months meeting!
Sponsor Contact: Jennifer White
Senior Account Executive
Presentation 1: In-House Risk-Based Security Controls Assessment (SCA) Process (7:00 - 8:00 PM)
Most organizations utilize third-party auditors as well as vulnerability and compliance-based assessments to determine the health of their systems prior to receiving an Authority to Operate (ATO) from a designated authority. Each organization in a specific business sector must follow federally mandated frameworks and processes. This is true whether it’s a healthcare organization utilizing frameworks to satisfy HIPAA and HITRUST requirements, military organizations satisfying the Department of Defense’s Certification and Accreditation (C&A) process, or a federal contractor who is required to maintain a security boundary for a Federal Information Security Management Act (FISMA) system.
Dr. Jerry Craig will review a new process in which Security Controls Assessments (SCA) are managed and operated by in-house assessor teams—which allows the federal government to reduced engagement periods and costs, continuous monitoring, deeper knowledge into control families and individual controls, greater visibility into systems, risk-based system vulnerabilities analysis, and most importantly, the ability to stand in a defensible position in the event of a data breach.
As Ventech Solutions’ HIDS Security Director, Dr. Craig is responsible for managing the security operations for the Health Care Quality Information Systems (HCQIS) Infrastructure and Data Center Support (HIDS), a program of the Centers for Medicare and Medicaid Services (CMS). His area of responsibilities includes a Security Operations Center, Security Engineering Team, an Identity & Access Management Team, and a Compliance/Audit Team. In addition to his time supporting CMS, Dr. Craig serves as Ventech Solutions’ Vice President of Security Services.
Dr. Craig has over 20 years of experience delivering mission critical systems, services, and IT security solutions to a wide range of Department of Defense customers, universities, and private sector businesses. Dr. Craig led the implementation of the Armed Forces Health Longitudinal Technology Application (AHLTA) for the United States Navy and Air Force and led the deployment of the United States Marine Corps’ Combat Operations Centers for multiple DoD Special Operations units operating in Southeast Asia. For the past 10 years, Dr. Craig has served as an Adjunct Associate Professor for the University of Maryland University College (UMUC), as well as an Adjunct Professor for Capital Technology University (CTU).
Dr. Craig currently holds a Doctor of Science in Cybersecurity, a Master of Science in Network Security, a Master of Arts in Economics and Business Management, and a Bachelor of Science in Computer Studies. Dr. Craig maintains numerous certifications including ISC2’s Certified Information Systems Security Professional (CISSP) and Certified Cloud Security Professional (CCSP), PMI’s Project Management Professional (PMP), CompTIA’s Security+ and A+, and is a certified Insider Threat Program Manager via Carnegie Mellon University’s Software Engineering Institute.
Presentation 2: Blockchain Security (8:00-8:45 PM)
by Michael Noel
Is blockchain really secure?
“Secure” It turns out is very hard to define in the context of blockchains.
Secure from whom?
Secure for what?
Blockchain Security depends on your perspective, Today we will be covering several different blockchain perspectives including,
A. The centralization question, Centralization is at least part of the problem. Data stored in a large depository is far more attractive to a potential hacker.
B. Permissioned systems, Building private or community systems AKA Permissioned blockchains for increased security is a severely misguided one. Permissioned systems, STILL raise questions.
C. The Centralization of Decentralized Systems, Despite blockchain technology being decentralized, there are still centralized aspects of it, such as cryptocurrency exchanges.
D. eclipse attack, Nodes on the blockchain must remain in constant communication to compare data, is this a strength, or a vulnerability?
E. Tokenomics is not Economics, Approaching Blockchain Security from the coding perspective is very important, and just like any other form of security, the human factor must be considered. Tokenomics is another important factor we need to understand with any blockchain implementation.
F. Tokenized Assets, Security Tokens are coming, what steps are necessary to protect Digital representations of your organization's equity and therefore control?
Michael Noel - Certified Blockchain Professional, Building Distributed Ledger Architected Organizations
Michael is the Co-Founder and CEO of Blockinetics, Founder of Blockchain Equities, Blockchain Weekly Host, Cryptonite Ventures Founding Member, facilitator for three monthly Phoenix Meetups, and one of the first candidates to be Certified by the EC-Council as a Certified Blockchain Professional.
He is on numerous Advisory Boards such as Swift Harvest, Ethera Labs, Lannister Holdings, and Hemp Harvest. Michael is a Member of BizIt M&A and has multiple connections to Private Equity groups, Angel and VC Groups.
In 2011 a friend introduced him to cryptocurrency mining and they started a Crypto mining operation In 2014. Later that year the discovery of Ethereum nurtured a hard pivot to rationalizing workflows and developing Smart Contracts. Michael Co-Founded Blockchain Consultants, Inc. in 2016 and has been helping multiple companies in multiple industries, adopt Distributed Ledger Technology ever since.
Specialties: Blockchain, Distributed Ledger, Cyber Security, Marketing, Entrepreneurship, Information Technology, Big Data, Graph Processing, Micron Automata Processor, Disruptive Technologies, Disruptive Innovation, Growth Hacking and Connecting the Dots!