var _gaq = _gaq || []; _gaq.push(['_setAccount', 'UA-35754314-2']); _gaq.push(['_setDomainName', 'securityeverafter.com']); _gaq.push(['_trackPageview']); (function() { var ga = document.createElement('script'); ga.type = 'text/javascript'; ga.async = true; ga.src = ('https:' == document.location.protocol ? 'https://ssl' : 'http://www') + '.google-analytics.com/ga.js'; var s = document.getElementsByTagName('script')[0]; s.parentNode.insertBefore(ga, s); })();

Saturday, June 22, 2013

Augusta ISSA Chapter Meeting

Next week I have the privilege to speak at the Augusta ISSA chapter meeting on June 25th. I will talk about the 20 Security Controls and how they can be implemented in any organization.

This presentation will introduce the 20 Security Controls and provide real examples of how they can be implemented by leveraging existing tools and capabilities. Attendees will be equipped to implement the 20 Security Controls in their own environments. The focus of the presentation will be on initiating a continuous monitoring program based on this framework to detect attacks and closely monitor the security of any network.

The meeting will be held at Georgia Regents University (formerly known as Augusta State) in Room UH-170 of University Hall on Tuesday, June 25th. The format for the meeting will be social/networking with free Pizza from 6:30-7:00PM followed by the presentation starting at 7:00PM. 


To register for the event, visit http://augustaissa.eventbrite.com

No comments:

Post a Comment