NORTH AMERICA EMEA ASIA
All programs BankAudit 2013 InfoSec World Conference & Expo 2013 SuperStrategies Conference & Expo 2013 The Conference on Big Data Security
All programs The Audit Directors & Managers Symposium The MIS Audit Leadership Institute The MIS CAE Master's Program
 
     Conferences            >      Seminars            >      Symposia            >      Webinars      Online Self Study      Training Weeks      In-House Training      Certificate Programs>      Exhibiting Info      Ways to Save      Request Info      Event Downloads      White Papers      Call for Instructors      Contact MIS      Site Map
Internal Audit IT Audit Info Security
Internal Audit IT Audit Info Security
   
Workshops

Workshops-at-a-Glance

Saturday, April 13
9:00 AM – 5:00 PM One Day 8 CPEs
W1 Project Management for Security
Bill O'Connell, Senior Director, Security Programs, Automatic Data Processing, Inc. (ADP)
Many technology projects have a technical focus but lack attention to the human element. To succeed, the security project needs to be treated not as just another technology, but as an agent of organizational change. This workshop will highlight the attributes and benefits of good project management in the context of delivering effective security projects and programs. Ultimately, it will show how the discipline of project management can help us as security practitioners better improve our organization's security posture.
This workshop will cover:
•The project management lifecycle
•The three project constraints (scope, schedule and budget) and how to manage them
•How to manage resources in a matrix environment
•Effective ways to work with non-security practitioners (Finance, HR, Legal, Audit, external third parties, etc.)
•Building a business case and project charter
•Key steps to creating and managing a project plan
•How to manage projects that span organizations and domains
•Addressing soft issues such as politics, culture and competing priorities
•A toolkit for successfully deploying security projects

Saturday, April 13 and Sunday, April 14
9:00 AM – 5:00 PM Two Days 16 CPEs
W2 (ISC)2 Seminar: Business Continuity and Disaster Recovery Planning
Adam Gordon, Instructor, New Horizons Learning Center
This workshop discusses the Business Continuity Management (BCM) and Disaster Recovery Planning (DRP) process and how to use decision trees to select, design and -prioritize backups, storage, -replication, power and facilities. We will discuss the common pitfalls and mistakes that organizations make, using real-world examples. The main focus will be to provide attendees with the core knowledge, understanding and actionable plans to implement or improve existing BC&DRP and the role of VMware in disaster recovery.
This workshop will cover:
•BCP
•Scoping and planning BCM projects
•Business organization analysis
•Assembling a BCM planning team
•Legal and regulatory requirements
•Assessing business impact
•Establishing a continuity strategy DRP
•Classifying and understanding disaster
•Establishing a recovery strategy
•Developing a recovery plan
•Training for and documenting DRP
•Testing and maintaining DRP
•Maintenance tasks
•Using Decision Trees to Design DRP
•Applications to protect
•Priorities and levels of protection
•Recovery sites
•Designing backups and storage
•Design replication, power and facilities VMware vCenter SRM
•VMware high availability
•VMware dynamic resource scheduler
•VMware dynamic power manager
•VMware fault tolerance
•VMware consolidated backup
•VMware data recovery

Two Days 16 CPEs
W3 Securing and Auditing Virtualized Environments DEMO
Alan Sugano, President, ADS Consulting Group
In this two-day workshop you will focus on vSphere and Hyper-V security and audit. You will start with virtualization basics, hardware virtualization considerations and different versions of ESX. You will then review Hyper-V and best practices for securing a Hyper-V environment. Case studies using a combination of live demonstrations and exercises will reinforce important security and audit factors to consider when dealing with a virtualized environment.
This workshop will cover:
•Virtualization basics of VMware vSphere
- Virtualization basics
- ESX basics
- ESX hardware considerations
- ESX backup
- ESX hardening
- vCenter security
- Back-up strategies
- Potential hypervisor attacks
•Hyper-V Security
- Hyper-V basics
- Hyper-V hardware considerations
- Hyper-V backup
- Hyper-V snapshots
- Hyper-V on Server Core
- Hyper-V clustering
- Hyper-V hardening
•A vSphere case study to apply everything learned in the class in a real-world scenario

Prerequisites: A working knowledge of operating system security, networking concepts, and associated logical access controls is assumed.

Sunday, April 14
9:00 AM – 5:00 PM One Day 8 CPEs
W4 Using Google to Find Vulnerabilities in Your IT Environment
Francis Brown, Managing Partner, Stach & Liu, LLC
Google, Bing and other major search engines have indexed and made searchable a wide variety of vulnerabilities on the Web, from exposed password files to SQL injection points. This has not gone unnoticed by hackers. In this workshop, you will gain an understanding of the magnitude of this threat, as well as the importance of being proactive in addressing it. You will be introduced to a slew of new tools and techniques that will allow you to leverage Google, Bing, SHODAN and many more open-search interfaces to track down and eliminate information disclosures and vulnerabilities.
This workshop will cover:
•Search-engine hacking – primary attack methods
- Google hacking and Bing hacking
- Toolkit overview:
Diggity toolset, Maltego, theHarvester, FOCA, and more
•Footprinting target organization networks and applications
- Identifying applications, URLs, hostnames, domains, IP addresses, emails and more
- Port scanning networks passively via Google
- DNS data mining via DeepMagic search engine
•Data loss prevention tools and techniques
•Cloud hacking via Google
- Targeting cloud implementations via search engines
•Adobe Flash hacking via Google and Bing
•Open-source code vulnerabilities
•Finding sensitive information disclosures on third-party sites
- Facebook, Twitter, YouTube, PasteBin
- Cloud document storage (Dropbox, Google Drive, etc.)
•Malware and search engines
- Understanding how search engines are used to distribute malware to users
•Advanced defense tools and techniques
- Search-engine hacking alerts, intrusion detection systems (IDS), dashboards, trending, and intelligence for your organization

One Day 8 CPEs
W5 Mobile Computing Security
Jerod Brennen, CISSP, CTO & Principal Security Consultant, Jacadis
Mobility poses many security-related challenges (anonymous connections, "always on" connections, clear text network traffic, wireless networks, and many more), most of which are seldom fully addressed. This workshop will go through the technical, procedural and administrative solutions available to protect your organization and help you securely embrace mobile computing. It will also include class exercises to evaluate a real-life mobile computing policy and to apply forensics procedures to capture and preserve evidence from mobile devices.
This workshop will cover:
•Risks in using wireless networks and control measures to counter them
•Security steps to protect handheld devices
•Exposures in mobile-device applications and appropriate control measures
•Procedures for mobile device forensics
•Auditing mobile computing environments
•Products and product features that mitigate mobile computing-related risks
To get the most out of this workshop a fundamental knowledge of networking and network security is helpful.

Wednesday, April 17
1:30 PM – 5:00 PM Half Day 4 CPEs
W6 Developing Information Security Policies and Standards
Sandy Bacik, CISSP, ISSMP, CISM, CGEIT, Manager, Global Information Security and Enterprise Architecture, Lord Corporation
With constant enterprise risk and various regulatory requirements, a formalized information security policy architecture is needed. In this workshop you will learn how to review what exists, implement what you need, and continue business without interruptions.
This workshop will cover:
•Differences between policies, guidelines, standards, processes and procedures
•How to develop standards and process architecture to support the organization
•How to gain support for implementing security standards and processes

Half Day 4 CPEs
W7 Securing SharePoint
David Totten, CISSP, PMP, SharePoint MCT, SharePoint Consultant, Fast Track IT Consulting LLC
As with SharePoint administration in general, security setup in SharePoint is handled by different people at different levels. IT administrators determine which authentication and security policies are in effect, site collection administrators and site owners manage the content authorization. Both are equally important, and proper security controls must be in place in order to establish a secure SharePoint environment.
This workshop will cover:
•Practical solutions on how to overcome various security threats in SharePoint
•SharePoint's major security features
•Third-party security integration features
•Proper security architecture and placement design
•SharePoint deployment models
•How to detect security loopholes and mistakes in SharePoint configurations and setup
•How to leverage SharePoint to improve security requirements with vendors
•How SharePoint governance strategies can help enforce security standards

Half Day 4 CPEs
W8 Industrial Espionage: Strategies for Protecting Your Intellectual Property
Michael Podszywalow, CISSP, CISM, CISA, CEH, Founder and Security Consultant, SpyByte, LLC
In this workshop you will gain insight into the use of both technical and non-technical tools for industrial spying, including low-tech gadgets, social engineering methods, key loggers, cyber tools, and other measures. You will also reinforce your knowledge through scenario-based activities that show how thieves capitalize on weak security practices to penetrate organizations.
This workshop will cover:
•Key indicators of espionage activities
•The surprising success of low-tech methods for intelligence gathering
•Live demonstrations of some information-gathering tools
•Recommendations for security awareness training to build resiliency
•Legal considerations and the misappropriation of trade secrets
•How to improve operational, technical and physical security controls to reduce information leakage

Thursday, April 18
9:00 AM – 5:00 PM One Day 8 CPEs HANDS-ON
W9 Advanced Social-Engineering Attacks and Pentesting Tricks
David Kennedy, OSCE, OSCP, CISSP, ISO 27001, GSEC, MCSE, Founder, Principal Security Consultant, TrustedSec, LLC; former CISO, Diebold Corporation
The Social-Engineer Toolkit (SET) is an open-source standard for penetration testers to assess the effectiveness of their overall education and awareness programs. It is designed to achieve both sophisticated and targeted attacks while leveraging human vulnerabilities. This workshop breaks down every aspect of the Social-Engineer Toolkit and allows the attendees to customize attacks in order to bypass effective security controls and make an almost unstoppable attack. SET has been featured on the BBC, the History Channel and a number of other media outlets. It is used by penetration testers across the world.
This workshop will cover:
•How to obfuscate payloads in order to circumvent security controls
•Bypassing security measures to achieve a successful attack
•Customizing your attacks to be effective
•Crash course into Python and developing custom payloads
•Craft attacks that contain multiple attack avenues
•How to have a 99% effectiveness rate on penetration tests
Pre-requisite Knowledge: This course is for those with a basic understanding of Metasploit, Linux, and BackTrack.
Laptop Requirements: Students must have a virtual machine or computer with the latest BackTrack Linux distribution. Students must also have a Windows XP or Windows 7 machine that can be fully patched to perform the social-engineering attacks on.

One Day 8 CPEs
W10 Data Loss Prevention: A Practical Workshop
George J. Dolicker, CISSP, CISA, former Chief Information Security Officer, Lenovo
In this full-day workshop you will learn first-hand how to develop a comprehensive data-loss prevention program. In hands-on exercises you will start with risk management techniques to identify what information requires the protection of DLP services, and how much protection it requires. You will evaluate the balance of a security posture that allows you to gain maximum business advantage from your information assets. Then you will develop skills determining the flow of business-critical information, identifying likely loss points, and how to apply reasonable and prudent preventatives.
This workshop will cover:
•Policy
•Data classification
•Escape vectors
•The time-value of information
•Human factors
•Finding the weakest link
•Plan Bs

Thursday, April 18 and Friday, April 19
9:00 AM – 5:00 PM
Two Days 16 CPEs HANDS-ON
W11 Identifying Advanced Persistent Threat (APT) Tactics, Techniques, and Procedures (TTP)
Stephen Windsor, CEO and Co-Founder, Maddrix; Ronald L. Shaffer Jr., CTO and Co-Founder, Maddrix
The major concerns of many security administrators and analysts is not knowing that their enterprise environment is compromised. The APT and other threat actors have become masters at infiltrating the enterprise and hiding in plain sight. They use the rules of your network to accomplish their mission. Threat actor TTPs are developed to blend into the environment, making it difficult for analysts and responders to grasp the complexity of a compromise if anything is detected. This intensive workshop will focus on understanding the TTPs of sophisticated adversaries, the type of malicious code used, and where to look for the malicious code. Participants will be working from a virtual image that has been compromised and will walk through how to identify and analyze malicious activity.
This workshop will cover:
•A look at the TTPs of the APT and other sophisticated threat actors
•A brief overview of the Microsoft Windows artifacts
•How to analyze Microsoft Windows artifacts
•How to identify persistent locations used by APT threat actors
•How to identify non-signature based malicious code
•Tips and tricks for dynamic and static analysis of malicious code
•Getting the most out of free digital forensic and malicious code analysis tools
Laptop Requirements: Students will be provided a virtual image that has been prepared specifically for this workshop. Students must bring their own laptop running Windows XP Pro (SP2+), Windows 7 or Apple iOS, with a VMware Player or VMware Workstation installed (Fusion for Mac). The laptop must have a working CD/DVD drive and USB port. Students must also bring a USB thumb drive. You must have a working knowledge of VMware and be comfortable configuring the imported image. Students must also be comfortable navigating the Microsoft Windows operating system.

 Follow Us on Twitter

Platinum Sponsors

Gold Sponsors

Global Education Sponsor

Association Sponsors

Media Sponsors