Current Newsletter

  

 

 

Please be aware of the Crescent Club's Dress Code:

"Dress code throughout the Club is business casual. Jackets for gentlemen are required for dining on Saturday evenings. Ladies should wear appropriate corresponding attire.
Tennis shoes, athletic attire and shorts are not permitted in the Club at any time. Jeans are allowed ONLY in Bar9 as long as they are not torn and are Club appropriate
."

Hello All!!!

Our monthly ISACA meeting we will be held on Wednesday, October 11, 2017 from 7:30am- 9am at the Crescent Club, 6075 Poplar Avenue . Please register by Tuesday, October 10, 2017 to secure your seat.

 Click here to register be sure to login first, then click on this month's event or Send your RSVP to This email address is being protected from spambots. You need JavaScript enabled to view it.

We are always looking for speakers, so if you know anyone who might be interested or if you yourself would be interested in speaking we welcome the opportunity to learn. Remember you do get CPE for presenting .

Also, if you have ideas for meeting topics please feel free to contact me with your ideas. Your help would be greatly appreciated.

Thank you and hope to see you there!

Susan Ross
434-5780

 

Meeting Details

 

CPE:  1

   

Date: Wednseday,

October 11, 2017

Topic:  Positioning and Measuring Capabilities to Reduce Risk 

 

 

Place:

 6075 Poplar Avenue, Memphis TN  38119. 

Agenda:

                      7:30 - 9am

 

 

Speaker:

 

    Tim Treat,  Cyber Operations and Defense Professional

 

 

 

 

Cost:

$25

 

About the Speaker/Topic

 

Session Title: 

Positioning and Measuring Capabilities to Reduce Risk

Our industry understands the capabilities required to protect and enable organizations. In addition, we know how to work with IT and security teams to position the capabilities in architecture. Professionals should consider deliberately using a model that separates architecture into three areas shown in Figure 1, and align prevention and control capabilities with the cyber-attack chain (Gartner version). It doesn’t matter what area of architecture we discuss in the field, the capabilities to protect and enable organizations are pretty much the same. Positioning prevention and control capabilities such as Application Control, User Control, Intrusion Prevention, File Inspection Sandbox, and Segmentation are critical.

 

Prevention Architecture                                              Figure 1: Prevention Architecture Capabilities to Protect and Enable Organizations

When IT and security professional work closely together fielding capabilities from Figure 1, we gain more confidence that we are actively reducing risk. We do this by measuring capability adoption to continuously improve Visibility, Attack Surface Reduction, Prevention of the Known, and Detection (then Prevention) of the Unknown for all areas of architecture. All IT and security professional should expect vendors to help measure and improve prevention capability adoption on a regular basis. Doing so allows our teams to create high confidence configuration and operational metrics that provide consistent evidence of attack surface reduction and reduced risk. This allows us to take action that scales capability measurement and operational environment activities so we understand the near real-time risk for critical systems.

 

 

  

 

Tim Treat, Cyber Operations and Defense Professional

Tim Treats focus at Palo Alto Networks is explaining the Next-Generation Security Platforms relevance and transformational prevention to protect enterprises from attacks. He has over 21 years of experience in Network Operations and Defense. Tim began his career in the United States Air Force as a communications electrical engineer. In the Air Force, he led global fixed and deployed organizations performing Engineering and Installation, Combat Communications, Network Operations and Security Operations. After transitioning from active duty, Tim spent four years working with commercial industry at Mandiant. The experience he gained leading federal and commercial Network and Security Operations provides an in-depth understanding of challenges faced by governments and industry verticals. Tim uses his experience to help organizations incorporate enterprise resilience, prevention and protection into Global Enterprise Operations and Defense cohesion strategies. 

    

 

 

 Article:

 

 

 

 

ISACA News

 

To renew online, please login to www.isaca.org with your personalized login credentials.
This will place you at the "My ISACA" area of the web site where a link to "My Renewals"
is provided in the left-hand navigation menu. You will also have the opportunity to renew
your certification during this process. For login assistance, please visit
www.isaca.org/login .

 

Membership Department
ISACA International
This email address is being protected from spambots. You need JavaScript enabled to view it.
+1.847.253.1545 ext. 771

 

Certification Department
ISACA International
This email address is being protected from spambots. You need JavaScript enabled to view it.
+1.847.253.1545 ext. 772

 

 Job Postings

 

 

 

 

 

 

 

Future Meeting Dates

 2017

 

 

October 11th 

 

Additional Training

 

ISACA International will be hosting an e-Symposium go to their web site at
the following link
www.isaca.e-symposium.com. Please note that individuals
can earn three (3) CPE credits for participating in the e-Symposium
.