Central Indiana ISSA Local Chapter Meeting

Next Meeting Thursday, April 12 2018 from 5:30 PM to 8:00 PM (Eastern)

First  PresentationAdvancing without a traditional security perimeter – the new reality of network security Second PresentationSecurity Awareness Training

Presentation Details

First  Presentation: Advancing without a traditional security perimeter – the new reality of network security

Speaker: Todd Harcourt, Sr. Systems Engineer – Zscaler Private Access

Abstract: IT has struggled mightily the past couple of decades to ensure trusted access to business assets on the enterprise network. It’s been a mostly futile battle as criminals and insiders have learned how to leverage that trust to gain virtually unfettered access inside the network.  As the business network proliferates outside the security perimeter to encompass the internet and cloud services, it’s time to turn from trusted network access, to verified services consumption. Many IT organizations have relied on virtual private networks (VPN) and network access control (NAC) to give “trusted users” virtually unfettered access to enterprise network resources. As we’ve seen with innumerable network breaches, outside interlopers can exploit that trust factor to gain access, while insiders find cracks in defenses that allow them to tap into enterprise assets they have no rights to.  The security model of the cloud era must focus on verified identity of users, their devices, and their roles. In this manner, a verified user only gains access to the application services for which he or she has been authorized. Unless such users have been granted these rights to an application or service, they will never be able to “see it” by navigating the network – this essentially forms a “dark network” that cannot be exploited. In adopting this model, we can focus on the techniques to verify users, whether they are inside or outside the network.

Bio: LinkedIn Profile

https://www.linkedin.com/in/todd-harcourt-72b1ba5

Second Presentation: Security Awareness Training

Speaker: Tim O’Connor, Cybersecurity Liaison, Cadre Information Systems

Abstract: What is Security Awareness, is there a benefit and if so to whom? What differentiates effective Security Awareness? How is Security Awareness different for C-level employees, verses information workers and IT professionals? Time permitting: Discussion on promoting a positive SA posture in
various kinds of organizations.

Bio: LinkedIn Profile
https://www.linkedin.com/in/timothy-o-connor-a262957/

Dinner Sponsorship: Zscaler

 


Evening Agenda:

5:30 – 6:00 pm > Networking and Food

6:00 – 6:15 pm > Central Indiana ISSA Introduction and Chapter Business

6:15 – 8:00 pm > Meeting Speaker(s)

8:00 pm           > Optional Social Hour

*** Please note that the location for our chapter meetings is Ice Miller LLP, which is located in the OneAmerica Tower in Downtown Indianapolis.  Enter the building and take an elevator to the 29th floor. Someone will then direct you to the CI-ISSA meeting.

*** PLEASE ARRIVE BEFORE 6:00 pm.  If you arrive after 6:00 pm, the elevators are locked to the 29th floor so please see a Building Security person and ask them for help to access that floor.  ***