Announcements

The Dark Web

Date:  September 21st / Time:  3-6 PM followed by a Networking Hour from 6-7

Location:  Federal Reserve Bank of Boston (Address: 600 Atlantic Ave #100, Boston, MA 02210)

Have you heard of the Dark Web, a part of the web providing anonymous access to the Internet, specializing on allowing anonymous hosting of websites? A place where identities and locations of its users stay anonymous and cannot be tracked due to the layered encryption system.  Due to its complexity and high level of encryption, websites are not able to track location of their users as well as the users are not able to get this information about the host. Thus, allowing users to talk, blog, and share files confidentially whichs makes it an ideal place illegal activities such as fraud, hacking, terrorism forums, and media exchange. (source Wikipedia)

Join us to learn more about this underground world, how it can impact us and steps to protect yourself from the its threats.

RSVP Today and we look forward to seeing you there!

Interested in speaking or being a sponsor?  Contact us at events@isc2easternma.org 

Earn CPEs at SecureWorld PLUS Summer School at Boston University July 12-13, 2017

CISM Certification Training – 15 CPE credits

The CISM exam covers four information security management areas, each of which is further defined and detailed through Tasks & Knowledge statements. These areas and statements were approved by the CISM Certification Committee, and represent a job practice analysis of the work performed by information security managers as validated by prominent industry leaders, subject matter experts, and industry practitioners.
Learn more here: https://www.secureworldexpo.com/resources/cism-certification-training

July 12-13 • 9:00 a.m. – 4:00 p.m.
Instructor: Gene Kingsley, Director of Cyber Security Operations, MA Advanced Secure Technologies


Threat Hunting & Analysis Workshop – 7 CPE credits

 

Threat intelligence has become the coin of the realm in fighting cybercrime. However, simply knowing who the bad guys are and what they do is not enough. You must be able to dig for actionable intelligence and apply that explicitly to your environment. Broadly speaking we call that threat hunting. Once you have determined the nature and details of threats to you enterprise you must be able to disseminate them in a manner that is understandable by both humans and machines.
Learn more here: https://www.secureworldexpo.com/resources/threat-hunting-and-analysis

 

July 12 • 8:30 a.m. – 4:00 p.m.

Instructor: Dr. Peter Stephenson, Technology Editor and author of “Threat Hunter” Blog, SC Magazine


Designing and Building a Cybersecurity Program Based on the NIST Cybersecurity Framework – 7 CPE credits

This course provides a detailed plan for designing and building a cybersecurity program based on the NIST Cybersecurity Framework and the 20 Critical Controls.

Part 1: Creating the Model (based on the NIST Cybersecurity Framework)
Part 2: Designing the Program (based on the 20 Critical Controls)
Part 3: Building the Solution (based on Design, Build, Run, and Test Guides)

Learn more here: https://www.secureworldexpo.com/resources/designing-and-building-a-cybersecurity-program-based-on-the-nist-cybersecurity-framework

 

July 13 • 9:00 a.m. – 4:00 p.m.

Instructor: Larry Wilson, CISO, University of Massachusetts, President’s Office

ISACA New England Conference 2017

The ISACA New England Conference will be taking place on June 6th at the Sheraton Framingham & Conference Center. The conference will be broken out into four tracks:

  • Information Security
  • Cyber Security
  • Governance Risk & Compliance
  • IT Audit

For more details and to register, please visit:

http://www.cvent.com/events/isaca-new-england-conference-2017/event-summary-9408523c02e44817b27b7dd4e76de84e.aspx

LinkedIn Group


Feedback Poll

Sorry, there are no polls available at the moment.