April 2017 Chapter Meeting

Summary

Topic: Cyber Risks & Controls

Presentation: A Voluntary Risk-Based Cybersecurity Framework - FTC-proofing Your Organization
Jacques Lucas, Sr. Security Architect, Terra Verde and Anthony Dezilva, Sr. Security Architect, Cybertrails

In the complaints against many companies, the FTC alleged that cybersecurity controls were deficient or absent to ensure that companies are taking reasonable steps to identify vulnerabilities and threats to determine the risk to consumers' personal information.  A wide-ranging list of companies have been impacted, including CVS Caremark, Petco Animal Supplies, HTC America, TRENDnet, Accretive Health, Cbr Systems, Dave & Buster's, Frankling Budget Car Sales, and ASUSteK Computer.  We will review a framework that aligns with industry trends as compliance is shifting from reactive compliance to proactive.

Presentation: Changing Threat Landscapes and New Technology Outlook
Jeff Cornelius, Executive Vice President - ICS Solutions, Darktrace

The scene of cyber security is changing.  In the first stage of cyber attacks, we saw classic compromises - data was stolen or a website was embarrassingly defaced.  However, the new generation of cyber threats are not necessarily targeting data alone.  Today's most sophisticated attacks are playing a longer game - one that is silent and stealthy.  This wave of attackers may now aim to disrupt or undermine the very integrity of data and are targeting all manner of companies and industries.  If your customer data has been stolen, you'll eventually find out, but how do you ever find out about the attacker that is already in your midst and navigating your systems?

This new generation of cyber threats requires a fundamentally new approach to cyber defense.  Based on unsupervised machine learning and probabilistic mathematics developed by scientists from the University of Cambridge, new 'immune system' technologies are capable of learning a 'pattern of life' by modeling the behaviors of each user, device, and network.  Rules and signatures are simply not sufficient on their own to combat these evolving attacks.  Self-learning technologies are the key to solving the crisis created by this new of cyber attacks.

 



 

Details

  • When

  • Thursday, April 27, 2017
    5:30 PM - 8:00 PM

  • Where

  • ASU West - UCB Rooms 265/266
    4701 W Thunderbird Rd
    Glendale, Arizona 85306
    USA

  • Capacity

  • 90 (14 remaining)

Additional Information

  • CPE: 3
  • Lunch provided
  • Deadline for registration: End of the day on Monday, April 24, 2017

Outlook Outlook
iCal iCal
Google Google
Yahoo! Yahoo!
MSN MSN
Top