Central Indiana ISSA Local Chapter Meeting
Next Meeting Thursday, April 12 2018 from 5:30 PM to 8:00 PM (Eastern)
|First Presentation: Advancing without a traditional security perimeter – the new reality of network security||Second Presentation: Security Awareness Training|
Speaker: Todd Harcourt, Sr. Systems Engineer – Zscaler Private Access
Abstract: IT has struggled mightily the past couple of decades to ensure trusted access to business assets on the enterprise network. It’s been a mostly futile battle as criminals and insiders have learned how to leverage that trust to gain virtually unfettered access inside the network. As the business network proliferates outside the security perimeter to encompass the internet and cloud services, it’s time to turn from trusted network access, to verified services consumption. Many IT organizations have relied on virtual private networks (VPN) and network access control (NAC) to give “trusted users” virtually unfettered access to enterprise network resources. As we’ve seen with innumerable network breaches, outside interlopers can exploit that trust factor to gain access, while insiders find cracks in defenses that allow them to tap into enterprise assets they have no rights to. The security model of the cloud era must focus on verified identity of users, their devices, and their roles. In this manner, a verified user only gains access to the application services for which he or she has been authorized. Unless such users have been granted these rights to an application or service, they will never be able to “see it” by navigating the network – this essentially forms a “dark network” that cannot be exploited. In adopting this model, we can focus on the techniques to verify users, whether they are inside or outside the network.
Bio: LinkedIn Profile
Speaker: Tim O’Connor, Cybersecurity Liaison, Cadre Information Systems
Abstract: What is Security Awareness, is there a benefit and if so to whom? What differentiates effective Security Awareness? How is Security Awareness different for C-level employees, verses information workers and IT professionals? Time permitting: Discussion on promoting a positive SA posture in
Bio: LinkedIn Profile
Dinner Sponsorship: Zscaler
5:30 – 6:00 pm > Networking and Food
6:00 – 6:15 pm > Central Indiana ISSA Introduction and Chapter Business
6:15 – 8:00 pm > Meeting Speaker(s)
8:00 pm > Optional Social Hour
*** Please note that the location for our chapter meetings is Ice Miller LLP, which is located in the OneAmerica Tower in Downtown Indianapolis. Enter the building and take an elevator to the 29th floor. Someone will then direct you to the CI-ISSA meeting.
*** PLEASE ARRIVE BEFORE 6:00 pm. If you arrive after 6:00 pm, the elevators are locked to the 29th floor so please see a Building Security person and ask them for help to access that floor. ***