Enterprise Architecture and Compliance News

Get your free copy of the 2017 Cloud Security Spotlight Report, sponsored by (ISC)². With more than 1,900 responses from cybersecurity professionals, this report reveals

User Rating: 0 / 5

Star InactiveStar InactiveStar InactiveStar InactiveStar Inactive

 Annotated News Update from the Leader in Information Security Training, Certification and Research - June 6, 2017, Vol. 19, Num. 45

User Rating: 0 / 5

Star InactiveStar InactiveStar InactiveStar InactiveStar Inactive

Don’t Let The Next WannaCry Surprise You

User Rating: 0 / 5

Star InactiveStar InactiveStar InactiveStar InactiveStar Inactive

User Rating: 0 / 5

Star InactiveStar InactiveStar InactiveStar InactiveStar Inactive

User Rating: 0 / 5

Star InactiveStar InactiveStar InactiveStar InactiveStar Inactive

One early morning in August 2015, on my birthday, I decided to give myself the gift of backing up everything I needed to survive the complete loss or hijacking of my digital life. Given four decades of "don't forget your scarf", and "do you have enough money for a cab?" and "may I confirm your AV is operational and up to date?", it seemed like a perfect day to focus all my attention on me. "Do you have a backup for all of your data?"

It's a tradition. I'm my own best mother each year, on my birthday.

User Rating: 0 / 5

Star InactiveStar InactiveStar InactiveStar InactiveStar Inactive

Congressional Cybersecurity Caucus News Round-Up

The Congressional Cybersecurity Caucus News Round-Up is a collection of the major news stories in cybersecurity policy. The Congressional Cybersecurity Caucus is co-chaired by Congressmen James Langevin and Michael McCaul. If your Member is interested in joining the Caucus or if you would like to be removed from the Caucus distribution list, please e-mail Nick Leiserson (This email address is being protected from spambots. You need JavaScript enabled to view it.) with Rep. Langevin or Brandon Batch (This email address is being protected from spambots. You need JavaScript enabled to view it.) with Chairman McCaul.

User Rating: 0 / 5

Star InactiveStar InactiveStar InactiveStar InactiveStar Inactive

Fishing for solutions?

User Rating: 0 / 5

Star InactiveStar InactiveStar InactiveStar InactiveStar Inactive

What is FIDO? FIDO is the World’s Largest Ecosystem for Standards-Based, Interoperable Authentication
BETTER SECURITY FOR ONLINE SERVICES, REDUCED COST FOR THE ENTERPRISE, SIMPLER AND SAFER FOR CONSUMERS

User Rating: 0 / 5

Star InactiveStar InactiveStar InactiveStar InactiveStar Inactive

It is time to begin planning for the 2017 SF ISACA Fall Conference, and we’re looking for new volunteers to join the team. Since our first conference in 2001, it has grown into the Northern California’s premier event for IT Audit, Security, Risk, Compliance, Privacy, Operations, and Governance professionals. We need people like you to continue growing that legacy. There are many areas to get involved with including many “one-time tasks,” and every volunteer is greatly appreciated.  

User Rating: 0 / 5

Star InactiveStar InactiveStar InactiveStar InactiveStar Inactive

SAY GOODBYE to PRIVACY - or in our own words, FCC Are You Out There?

User Rating: 0 / 5

Star InactiveStar InactiveStar InactiveStar InactiveStar Inactive

People often ask me "what are good sites to bone up on security and technology?".  I say, "the opposite of stupid talk is BrightTalk".  Bookmark the B

User Rating: 0 / 5

Star InactiveStar InactiveStar InactiveStar InactiveStar Inactive

Just for laughs, here's a legal holiday greeting, as crafted by the wonderful law students of Cornell. 

User Rating: 0 / 5

Star InactiveStar InactiveStar InactiveStar InactiveStar Inactive

Here's the latest information from OCEG

User Rating: 0 / 5

Star InactiveStar InactiveStar InactiveStar InactiveStar Inactive

The target is now the weapon

User Rating: 0 / 5

Star InactiveStar InactiveStar InactiveStar InactiveStar Inactive

Same problem: Serializing complex data is hard

User Rating: 0 / 5

Star InactiveStar InactiveStar InactiveStar InactiveStar Inactive

This is an iframe.  The SANS site uses cookies.  Please identify the important content from this frame and then go directly to the SANS site for more information.

User Rating: 0 / 5

Star InactiveStar InactiveStar InactiveStar InactiveStar Inactive
 
Published on Mar 29, 2017, by FIDO Alliance: 

The rapid expansion of the Internet of Things has fostered convenience and connectedness for consumers. It has also opened the door for creative hackers. Recently, hackers used hundreds of thousands of common internet-connected devices in consumers’ homes, without the owners’ knowledge, to launch a DDoS attack that temporarily brought down crucial parts of the internet’s infrastructure.

User Rating: 0 / 5

Star InactiveStar InactiveStar InactiveStar InactiveStar Inactive

Add Any Public Compliance Regulations into MetricStream GRC with the UCF Mapper™ and you get GRC Magic.

User Rating: 0 / 5

Star InactiveStar InactiveStar InactiveStar InactiveStar Inactive

User Rating: 0 / 5

Star InactiveStar InactiveStar InactiveStar InactiveStar Inactive

OMG Announces Two New Sponsors of Compliance GRID ProjectInferware and Phoenix to contribute to development of project to address global regulatory compliance management challenges

User Rating: 0 / 5

Star InactiveStar InactiveStar InactiveStar InactiveStar Inactive

As explained by Wikipedia The California Air Resources Board, also known as CARB or ARB, is the "clean air agency" in the government of California.

User Rating: 0 / 5

Star InactiveStar InactiveStar InactiveStar InactiveStar Inactive

EU Officials Reach Agreement on Text of New Privacy Law

The Real NewsSOPACARB, the Environment

User Rating: 0 / 5

Star InactiveStar InactiveStar InactiveStar InactiveStar Inactive

EPA Proposes First Carbon Pollution Standard for Future Power Plants /Achievable standard is in line with investments already being made and will inform the building of new plants moving forward

User Rating: 0 / 5

Star InactiveStar InactiveStar InactiveStar InactiveStar Inactive

Supported by STI International: http://www.sti2.org

User Rating: 0 / 5

Star InactiveStar InactiveStar InactiveStar InactiveStar Inactive

Ding Dong the witch is dead, the wicked witch, the wicked witch.... If you've got a mental munchkin voice narrating this article, for dignity's sake, stop it. Use your own voice.

User Rating: 0 / 5

Star InactiveStar InactiveStar InactiveStar InactiveStar Inactive

Happy Birthday, Lilly! (Or why is half the world's wealth owned by 8 men?)

User Rating: 0 / 5

Star InactiveStar InactiveStar InactiveStar InactiveStar Inactive

This area of the site is under heavy construction.  You can learn about CSA efforts from the website source, and you should also join the LinkedIn CSA community.

User Rating: 0 / 5

Star InactiveStar InactiveStar InactiveStar InactiveStar Inactive

Bi-Monthly (ISC)2 Meeting Announcement

User Rating: 0 / 5

Star InactiveStar InactiveStar InactiveStar InactiveStar Inactive

AdobeStock 62005320 exposed

August 4th, 2017

(ISC)2 East Bay Summer Conference - Cyber Health, Privacy and Automation

Sponsor Venue - (Thank You Allgress)

Directions to Allgress

111 Lindbergh Ave F, Livermore, CA 94551

ISC2EBChlogo

This one day security track includes 8 speakers and three guided product events offering 10 CPE for full attendance. (ISC)2 Chapter events facilitate lively discussion and opportunities to extend the presenter wisdom to our real needs in keeping Bay Area companies both competitive and safe. 

https://isc2-eastbay-chapter.org, LinkedIn (https://www.linkedin.com/company-beta/18029024), facebook (https://www.facebook.com/profile.php?id=100007293649437&pnref=lhc.unseen)

register today early bird

(This 1 day event counts towards 10 hours of Continuing Professional Education or 16 CPEs.)

Friday, August 24 - Cyber Health, Privacy, and Automation in HIPAA Regulated Environments

Regulations

  • Security Lessons for Implementing the HITRUST Framework
  • Examining HIPAA - HITECH Title 45 C.F.R. § 164 
  • What is specifically meant by breach notification rule 
  • What are the regulatory nuts and bolts of cyber health?
  • How are political trends working for or against us?

Privacy

  • What is the current state of privacy rule
  • How might technology influence or change what we chose to remain private

Automation

  • What are technology limitations based on the security rule?
  • Tools that monitor
  • Process Automation
  • Robots
  • What is the price of automation?
  • How will automation and robotics affect the future of cyber and human health?
8:00 AM - 8:40 AM Registration Please make sure to bring a government issued photo id (Driver license or CA ID card etc.) to gain access to the conference room.
5:15 PM Closing Remarks and Raffle 5:30 - 6:30 PM Speaker Reception

Pricing:

(ISC)2 is happy to accept member ID from its partner professional organizations:

ISACA, ISSA

  • Early Bird Member* $90
  • Early Bird Non-Member* $100
  • Student $45

Registration after August 1st

  • Member $125
  • Affiliate-Member $125

Speaker Bar

 

 

 

More About

1-1 Session Description:

1-2 Sponsoring Organization Featuring Presenters
     

More about

1-2 Session Description:

1`-3 Sponsoring Organization Featuring Presenters
   

 

More About

1-3 Session Description:

1- 4 Sponsoring Organization Featuring Presenters
   

 

More about

1- 4 Session Description:

1-5 Sponsoring Organization Featuring Presenters
   

 

More about

1-5 Session Description:

1- 6 Sponsoring Organization Featuring Presenters
   

 

More About

1-6 Session Description:

1- 7 Sponsoring Organization Featuring Presenters
   

 

More About

1-7 Session Description:

1- 8 Sponsoring Organization Featuring Presenters
   

 

More About

1-8 Session Description:

1- 9 Sponsoring Organization Featuring Presenters
   

 

More About

1-9 Session Description:

Recap and Reception Sponsoring Organizations Featuring Panel Members

How Can Our Vendors Help Us?  Moderator: Robin Basham, CEO EnterpriseGRC

   

 

   

 

   

 

 

 

 

 

 

 

Speaker Reception to Follow

 
Closing Remarks   (ISC)2 East Bay Board Members

PlatinumSponsor

Seclore

Securonix

CyberArk

 

silversponsors

Your company logo could be right here!  
 

goldsponsor

      CISCO Lawrence Livermore Labs Chevron

 

ISC2 is Wicked Serious Security

How to become a member: Please directly contact our Chapter This email address is being protected from spambots. You need JavaScript enabled to view it. – Lokesh Sisodiya and fill out the membership form https://isc2-eastbay-chapter.org/membership/

thankyoueveryone

CISCO

EnterpriseGRCEnterpriseGRC Solutions Chevron

Lawrence Livermore Labs

Allgress

Optiv

(This 1-day event counts towards 10 hours of Continuing Professional Education or 10 CPEs.)

Your friends and colleagues at (ISC)2 East Bay Chapter chapter can't wait to see you. We hope you join us in giving special thanks to the conference committee volunteers, without whom, such events would not be possible. Providing weekly meetings, binding flyers, drafting letters, being a liaison to our gracious speakers, updating and proofing our brochures, and assisting in the overall quality management of the Summer Conference, we acknowledge, Nathan Chung, Atul Kumar, Gordon Shevlin, Vic Bhatia and others as well as all members of the Board of Directors for their added responsibilities in coordinating our conference business, and for all the wisdom provided by the full membership of our board. Your support is greatly appreciated.

Yours Sincerely,

Robin Basham, Conference Director

The (ISC)2 East Bay Chapter Board of Directors

This email address is being protected from spambots. You need JavaScript enabled to view it. – Lokesh Sisodiya
This email address is being protected from spambots. You need JavaScript enabled to view it. – Tom Rogers
This email address is being protected from spambots. You need JavaScript enabled to view it. – Gary DyLina
This email address is being protected from spambots. You need JavaScript enabled to view it. – Ashish Gupta
This email address is being protected from spambots. You need JavaScript enabled to view it. – Lee Neely
This email address is being protected from spambots. You need JavaScript enabled to view it. – Jing Zhang-Lee
This email address is being protected from spambots. You need JavaScript enabled to view it. – Robin Basham

register today early bird

Cyber Health, Privacy, and Automation - August 4th, 2017 - 8:30 AM to 5:30 PM

Thank you to our sponsors Allgress and Securonix, and our ongoing sponsors Optiv and Chevron

User Rating: 0 / 5

Star InactiveStar InactiveStar InactiveStar InactiveStar Inactive

Subcategories