You Are Not Alone: Pooling Regional Resources to Enhance Information Security Training Kris Monroe, CISA, CISSP Information Security Officer Ithaca College.

Slides:



Advertisements
Similar presentations
Mission The mission of Kappa Omicron Nu is empowered leaders in scholarship, research, and leadership. This mission will enable the organization and chapters.
Advertisements

REN-ISAC Research and Education Networking Information Sharing and Analysis Center AMSAC Update July 10,
Center for Teaching and Learning Vision: The center will foster and sustain faculty development in the pursuit of exemplary practices in teaching and learning.
Introduction to the Higher Education Academy and its Subject Centres Ian Lindsay Subject Centre Academic Advisor HE in FE Foundation degrees: validation,
Cyber Security Technical Panel Kathleen Kramer. Introduction to Cyber Security Panel Vision of the panel is to serve as a hub of AESS cyber security activities,
Cyber Huntsville Briefing to Energy Huntsville Forum 16 August 2012 Rodney L. Robertson, Ph.D. President, Cyber Huntsville Initiative
RIM & IG Professional Resources & Networking Opportunities with ARMA International David M. Fleming, CRM, IGP, CIP, ARMA Pacific Region Director University.
IEEE Computer Society Name Title, IEEE Computer Society The community for technology leaders.
PROFESSIONAL ETHICS ETHICS: Rules of conduct recognized in respect to the actions of persons in the profession CODE OF ETHICS: Governs the behavior of.
1 FDIC Corporate University Aligning Learning With Corporate Objectives March 2006.
SIPR Strategic Research Agenda International research and KTE opportunities West Park Centre, Dundee, 7 October 2011 Alistair Henry (University of Edinburgh)
Parent/Community Involvement Where are we? Where do we want to be? Date: October 7, 2013 Dublin ISD 1.
Certification and Training Presented by Sam Jeyandran.
Breakout Session 2: Awareness and Training. B2: Awareness and Education Identification of constituencies Identification of challenge Inventory of existing.
Information Security Research Program Henry Lee Manager, Security Policy and Research Office of the Chief Information Officer December 2007.
IEEE Member and Geographic Activities Joe Lillie, IEEE Vice President Member and Geographic Activities (MGA) Region 8 Meeting 25 April 2008.
Data Privacy Day 2012 on Campus Jolynn Dellinger Program Manager, Data Privacy Day National Cyber Security Alliance.
Darci L. Graves MPP, MA, MA Senior Health Education and Policy Specialist Health Determinants & Disparities Practice at SRA international, Inc. Bringing.
For those of you interested in pursuing careers specializing in HRM
Department of Transport October 2007 Women in Transport Seminar Consolidated Action Plan Report.
2009 International Education Programs Service Technical Assistance Workshop Arlington, VA February 1-3, 2009 Mark J. Ballam San Diego State University.
A little history… CCCS Consortium Grants Colorado Lumina Initiative, Lumina Foundation A forerunner for the developmental education redesign.
PROJECT OBJECTIVES Identify, procure, and implement software that provided a common system for students, faculty, and staff to enter and measure.
Karen Hutslar, MACRAO Past President Central Michigan University, Registrar Pete Lacey, MACRAO Treasurer St. Clair County Community College, Registrar.
Jeff Recor IAC 2003 FISSEA IA Community Outreach March 2005 Jeff Recor Director, IAC.
(ISC) 2 Announcements and Updates April (ISC) 2 and ISSA Collaboration Announced on April 14, 2014 Collaborating at the chapter level Provide a.
St. Mary’s University Student Chapter IEEE Central Texas Section Fall Planning Meeting September 7, 2013 San Marcos, TX.
12-CRS-0106 REVISED 8 FEB Region 3 – First Year Member Experience November 13, 2014 Presented by: Lee Stogner IEEE Membership
As a Member of INCOSE  Network with ~9,000 Systems Engineering Professionals Internationally  Receive Insight, INCOSE Quarterly Newsletter  Receive.
Moving Forward: Safe and Supportive Learning in Ohio Schools -- Webinar Series April- August 2012.
Talking Points: Youth as Partners in Civic Leadership (YPCL) n Coming together is a beginning…. n Keeping together is progress… n Working together is a.
Collaboration=Success (by the way collaboration is not a bad word)
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation.
MADD/NHTSA REGIONAL LAW ENFORCEMENT LEADERSHIP SUMMIT.
Region 6 Humanitarian Activities Jay Pearlman Chair.
Welcome and Introduction to the Security Task Force Peter Siegel Co-Chair, Security Task Force Chief Information Officer and Vice Provost University of.
ACT-IAC Associates Program Coaches Orientation January 14, 2014.
26 April 2017 Introduction to IEEE
Some “take-home” ideas Summer schools, scholarships exist (from various universities, and Redfern Photonics) to give students a taste of a possible career.
Agenda for SSS General Membership Meeting (Tuesday, September 12, 2000) Accomplishments Treasurer’s Report Executive Council Minutes Director Reports –Member.
OWASP 1 Industry Committee – Recently Completed  InfraGard Presentation to Denver chapter of InfraGard (US critical national infrastructure)  DPC BS.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation.
Technical Activities and Membership Development: Achieving Synergy Doug Zuckerman Vice President – Membership Development
Resources for Meeting Internet Safety Requirements Cheryl Elliott James Madison University Bill Johnsen Virginia Beach City Public Schools Educational.
Strengthening Minority Serving Institutions: HR Best Practices and Innovations November 10, 2015 In Partnership with PeopleAdmin.
SAFE Association UNIQUELY FOCUSED IN A CRITICAL DISCIPLINE ORIGINALLY FOUNDED IN 1956 AS SPACE AND FLIGHT EQUIPMENT ASSOCIATION, SAFE ASSOCIATION IS AN.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
1 GOAL: Provide students with a quality educational experience that enables them to complete their educational goals in a timely fashion. Review and restructure.
Chapter Services Support & Community Building Tools Carole Swaim EAME RCCC, Istanbul, June, 2006 IEEE Communications Society.
2 Overview With active participation from individuals and chapters all over the world, the Information Systems Security Association (ISSA)
AESS BOG Meeting May 3-4, 2013 Ottawa, Canada Larry Chasteen VP Membership.
Higher Education Information Security Council
UNIQUELY FOCUSED IN A CRITICAL DISCIPLINE
Industry Relations Strategic Planning
Strengthening CIO and CISO Collaboration on Security and Privacy
Transportation Professionals Advisory Committee Meeting
Quality Services Subcommittee Meeting
How to Successfully Leverage Professional Associations
OWASP Ireland Limerick Chapter Meeting
IEEE OU Analytics - Introduction
Great Programming for All of Us!

October is National Cyber Security Awareness Month
Abdullah Yar, Dajsha Perrin
Vice Chair – Strategic Partnerships
Cybersecurity Threats and Opportunities in Latin America
Mary Ellen Randall IEEE Humanitarian Activities Committee
Nominee Region Director Elect/Delegate Elect
ISACA IN 2019 Robin Lyons WHAT’S NEXT, NOW Technical Research Manager
October is National Cybersecurity Awareness Month
Presentation transcript:

You Are Not Alone: Pooling Regional Resources to Enhance Information Security Training Kris Monroe, CISA, CISSP Information Security Officer Ithaca College

INTRODUCTION  How organizations in Rochester, NY pooled their resources to develop an effective security awareness and training conference.  Suggested community resources to leverage  How to engage those resources 2

BRIEF HISTORY  The Rochester Security Summit is a collaboration of area organizations and the Rochester Chapter of the Information Systems Security Association (ISSA).  History of the Summit  Started in 2006  Fostered by Rochester Chapter of the Information Systems Security Association, University of Rochester and local organizations.  Planning Committee includes over 30 people from higher education, business, education, and area organizations.  The Summit features speakers and panels to help educate area security and IT professionals, business managers, organizations and the community on how to protect information systems and data. 3

SUMMIT AREAS OF FOCUS  The conference focused on the following areas over the years:  Technical Professional Track  Business Professional Track  Software Professional Track  Providing education opportunities for executives, CFO, CIO/CSO, business managers, security professionals, IT managers, technical specialists, help desk staff, or developer. 4

SUGGESTED COMMUNITY RESOURCES  Work with local or national security awareness groups, professional societies (e.g., ISSA, ISACA, InfraGard, OWASP, SANS, IEEE security & privacy group), College/University security groups or student groups (e.g., ACM student chapters, & student security groups) and K-12.  Leverage October National Cyber Security Month (NCSAM) 5

ROCHESTER SUMMIT COLLABORATORS  Area collaboration partners have included:  The Rochester Chapter of the Information Systems Security Association (ISSA),  The Rochester Chapter of the Information Systems Audit and Control Association (ISACA)  Rochester Open Web Application Security Project (OWASP) Chapter  Rochester Institute of Technology  University of Rochester Information Technology Office  Rochester Cyber Safety and Ethics Initiative  Area businesses and organizations 6

HOW TO ENGAGE  Join Security Organizations  Attend Meetings  Introduce Yourself  Get Involved 7

RESOURCE LINKS  OWASP   ISSA   ISACA  rs/Chapters_by_Region.htm rs/Chapters_by_Region.htm  Infragard   NCSAM   Rochester Security Summit  8