Central Indiana ISSA Local Chapter Meeting
Next Meeting Thursday, April 12 2018 from 5:30 PM to 8:00 PM (Eastern)
|First Presentation: Advancing without a traditional security perimeter – the new reality of network security||Second Presentation: Security Awareness Training|
Speaker: Kevin Peterson, Director, Network and Security Transformation, Zscaler
Abstract: IT has struggled mightily the past couple of decades to ensure trusted access to business assets on the enterprise network. It’s been a mostly futile battle as criminals and insiders have learned how to leverage that trust to gain virtually unfettered access inside the network. As the business network proliferates outside the security perimeter to encompass the internet and cloud services, it’s time to turn from trusted network access, to verified services consumption. Many IT organizations have relied on virtual private networks (VPN) and network access control (NAC) to give “trusted users” virtually unfettered access to enterprise network resources. As we’ve seen with innumerable network breaches, outside interlopers can exploit that trust factor to gain access, while insiders find cracks in defenses that allow them to tap into enterprise assets they have no rights to. The security model of the cloud era must focus on verified identity of users, their devices, and their roles. In this manner, a verified user only gains access to the application services for which he or she has been authorized. Unless such users have been granted these rights to an application or service, they will never be able to “see it” by navigating the network – this essentially forms a “dark network” that cannot be exploited. In adopting this model, we can focus on the techniques to verify users, whether they are inside or outside the network.
Bio: Kevin Peterson is the director or security and network transformation at Zscaler, where he primarily works with the largest cloud security deployments to ensure that the desired business objectives are achieved. He brings with him the advantage of having lead the security efforts for one of McKesson’s (Fortune 10) major business units (75 software products, managed services…), as well as the company-wide cloud security strategy, ranging from A to Z (Azure to Zscaler!). As a top practitioner and
Speaker: Tim O’Connor, Cybersecurity Liaison, Cadre Information Systems
Abstract: What is Security Awareness, is there a benefit and if so to whom? What differentiates effective Security Awareness? How is Security Awareness different for C-level employees, verses information workers and IT professionals? Time permitting: Discussion on promoting a positive SA posture in
Bio: LinkedIn profile
Dinner Sponsorship: Zscaler
5:30 – 6:00 pm > Networking and Food
6:00 – 6:15 pm > Central Indiana ISSA Introduction and Chapter Business
6:15 – 8:00 pm > Meeting Speaker(s)
8:00 pm > Optional Social Hour
*** Please note that the location for our chapter meetings is Ice Miller LLP, which is located in the OneAmerica Tower in Downtown Indianapolis. Enter the building and take an elevator to the 29th floor. Someone will then direct you to the CI-ISSA meeting.
*** PLEASE ARRIVE BEFORE 6:00 pm. If you arrive after 6:00 pm, the elevators are locked to the 29th floor so please see a Building Security person and ask them for help to access that floor. ***