Jobs    Everything

Select a Metro Area
When:
February 20, 2014 @ 5:30 PM – February 20, 2014 @ 7:00 PM America/New York Timezone
2014-02-20T17:30:00-05:00
2014-02-20T19:00:00-05:00
Where:
Carl De Santis Building, Knight Auditorium
Carl DeSantis Building
Nova Southeastern University, Davie, FL 33314
USA
SFISSA - February Meeting @ Carl De Santis Building, Knight Auditorium  | Davie | Florida | United States

You’re invited

Please join us for the February Meeting:
We are launching a new format for monthly meetings!
  •  Learn 3 ways to improve your InfoSec Posture
  •  Two GREAT speakers!
  •   ISSA International Conference News
  •   MORE

SPEAKER 1

Topic: DDoS Attack Landscape – Gaming

 The online video gaming infrastructure supports hundreds of millions of online gamers — Comscore estimated that online gaming communities had amassed 671 million users worldwide by April 2013, with 145 million gamers playing on a daily basis. The availability and accessibility of online gaming infrastructures and devices creates opportunities for malicious actors to use freely available underground tools to launch Distributed Denial of Service (DDoS) attacks against gaming consoles, and steal gaming network login credentials from legitimate users. A history of malicious behavior follows the online video gaming industry and denial of service attacks occur frequently and keep evolving.

Chris Arisso of Prolexic will be giving a presentation on new threats and attacks from the last 60 days, including Gaming companies.

Speaker Bio:

Chris Arisso,  Solutions Architect for Prolexic Technologies, specializes in delivering best in class protection against Distributed Denial of Service (DDoS) attacks. A network specialist, he has fifteen years of experience in Internet technologies, both building and managing a number of sophisticated networks for fortune 500 enterprises, and internet service providers. Today, Chris applies his network expertise, and Internet security knowledge to ensure the necessary infrastructure is in place to protect businesses against the latest threat landscape.

SPEAKER 2

Topic: Insider Threats

Dealing with Insider Threats:  New Defensive Tactics 

The term insider threat is one that garners a lot of attention. Defined, the insider threat is the threat that someone who has been given proper access will use it improperly. In plain English, it’s the potential that someone who you have given house keys will steal from your house. The vast majority of IT security spend is focused on keeping the unauthorized out and keeping data in. Yet we continue to hear about insider-driven fraud, leaks, and breaches. A new approach is called for – one that is proven to work but not widely applied.

Speaker Bio:

Mike Tierney is SpectorSoft’s Chief Operating Officer.  Responsible for the day-to-day operations of the company, Mike also works extensively on product strategy and product marketing.  Prior to joining SpectorSoft Mike managed a team of product managers, and was ultimately accountable for a large portfolio of products focused on desktop administration and security, identity management, and data access control.