This message was sent to ##Email##
|
May 18, 2017 |
| | | |
|
|
|
Thank you for a great IAPSC Annual Conference!
|
    |
IAPSC
Attendees at last week's IAPSC Annual Conference in Austin, Texas enjoyed excellent presentations, quality networking opportunities, and an exhibit hall full of top security vendors. Pictured, IAPSC members Mitch Fenton, Kelly Klatt, and their wives enjoy the networking reception on Sunday evening.
A big thank you to the Conference Committee for planning this year's fantastic program:
- Conference Chair: Rene Rieder, Jr.
- Mark Bennett
- Lynda Buel
- Jackson Chambers
- Mitch Fenton
- Jim Francis
- Frank Pisciotta
- J. Kelly Stewart
- Lee Struble
New Members enjoy their first IAPSC Conference
|
    |
IAPSC
IAPSC was also pleased to welcome 7 new members attending the conference, pictured, left to right, are: (top row) Eric Grist, Michael Glasser, Bruce Mills, Pete Van Beek, (bottom row) Les Nichols, Pat Fanning (and not pictured, Scott Soltis).
Promoted by
|
|
|
 |
Welcome New IAPSC Board of Directors
|
    |
IAPSC
Pictured above is newly elected IAPSC President Alan Brockbank thanking now Past President Harold Gillens for two years of exceptional leadership of the association.
During the Annual Conference on May 9, IAPSC members participated in the Annual Business Meeting, which included the Board of Directors election. Thank you to the Nominating Committee for facilitating this year's election process — Chair: John Hatcher, Mark Bennett, and Russell Kolins.
Please join us in welcoming your new IAPSC Officers for the 2017-2018 term:
... and your new IAPSC Directors for the 2017-2019 term:
David Aggleton, Mark Bennett, William Birks, and Leslie Cole will be continuing their current terms as Directors for 2016-2018.
IAPSC
Registration is now open for this popular seminar: Sunday, September 24, 2017 in Dallas, prior to the ASIS 2017 Seminar & Exhibits. Register Now.
This unique, one-day intensive program will show you how launch a new security consultant practice or jump-start an existing one. Learn from a faculty of seasoned consultants how to develop and market yourself as a security consultant and how to avoid the expensive mistakes that can sabotage your success. The program is filled with practical information that will save you time, money, and frustration. Take home a comprehensive workbook of sample proposals and reports that give you a clear advantage when competing for a security consulting assignment.
 |
|
HID Global® is the leading provider of products and services that help organizations manage secure identities. Visit our Consultant Corner to join our growing community. MORE
|
|
IAPSC
Fri., May 19 @ 9 a.m. PDT — Forensics and Security Management
Fri., June 16 @ 9 a.m. PDT — Security Design and Engineering
Fri., July 21 @ 9 a.m. PDT — Cybersecurity
These monthly member meetings facilitate member relationship-building across areas of specialty and interest. They provide new opportunities for IAPSC members discuss current topics, best practices and guidelines, challenges, and trends in the industry. It's easy and FREE to participate from your computer or your phone. Sign up now online here or by contacting iapsc@iapsc.org.
Fortune
Recently, the world saw one of the largest and most distributed cyberattacks in history. Known as WannaCry or WannaCrypt, the ransomware has infected more than 230,000 computers in 99 countries, according to Eyerys. Ransomware encrypts data on devices, blocking a user's access to the data until a fee is paid. This downtime can be life-threatening and extremely costly if the ransomware targets health care facilities or critical infrastructure. Considering this danger, the timing of President Donald Trump's executive order on cybersecurity, couldn't be better.
READ MORE
ABC News
President Donald Trump's homeland security adviser said that the malware that has infected 300,000 computers in 150 countries is "in the wild," but so far has not infiltrated U.S. government systems.
Tom Bossert, assistant to the president for homeland security and counterterrorism, said three variants of the malware have been discovered and the U.S. government was closely monitoring the situation with officials in Britain.
READ MORE
Texas Public Radio
Texas law enforcement are now getting a big assist from the federal government. Texas is the first and only state to get access to a massive Department of Homeland Security biometric database through a pilot program.
U.S. Homeland Security's Patrick Nemeth says that for years, the Texas Department of Public Safety would find crime-scene prints that didn't match any with the FBI database.
READ MORE
Biz Edge
Many CIOs feel that their organizations are ill-prepared to deal with the many new risks associated with digitalization.
Gartner analysts say these concerns are well-founded.
"As most industries evolve, their risk management approaches fail when they encounter previously unknown hazards," said Gartner research vice president Robert A. Handler.
"In an IT context, digitalization represents a point of rapid evolution, and it will create new risks."
It is critical that CIOs and program, project and portfolio leaders evolve their risk management approach for a digital age.
READ MORE
CIO
Even though larger cloud providers offer security and implementation guidelines, companies still face significant risks and challenges when deploying secure applications to the cloud. A new class of security-focused cloud platforms promises to bridge this gap, bringing best-practices and regulatory compliance with the convenience of platform as a service.
READ MORE
Security Intelligence
All that's missing is an "e," but a fake WordPress site could fool website admins into letting it take over browser sessions and steal information, researchers warned.
A report from consulting firm Securi first revealed that a fraudulent application program interface domain, called WordPrssAPI, was attempting to steal active cookies to impersonate users, including website admins.
READ MORE
HealthIT Security
Healthcare organizations must ensure that they carefully monitor who is able to access sensitive information, as potential data security threats can occur from either insiders or third-parties.
While working with trusted vendors or business associates is not new for the healthcare industry, failing to manage, control, and monitor sensitive data access could lead to inappropriate access and even a data breach.
READ MORE
Network World
Check Point is investing heavily in educating IT pros about the cloud, not only to promote their own cloud security products but to give potential customers the skills they'll need to keep their jobs as their employers move more and more resources to public cloud providers.
"We try to explain how to be relevant in the cloud," says Itai Greenberg, head of cloud security for Check Point.
A lot of old-school IT security workers need to learn about how cloud infrastructure works, the terminology used, the interconnections between cloud and corporate owned networks and the ins and outs of APIs, among other skills.
READ MORE
CBS News
There is concern about a new wave of global cyberattacks following the recent unprecedented cyberattack, which disabled computer networks in at least 150 countries, including the U.S. The so-called "ransomware" takes computers hostage and demands payment.
The attack was unprecedented, escalating, and is sweeping the globe.
The latest count is more than 200,000 victims, in at least 150 countries, according to Rob Wainwright, director of the European Union Agency for Law Enforcement Cooperation.
READ MORE
Security Intelligence
A computer generation or two ago, IT managers fought a futile uphill battle to prevent rogue PCs from infiltrating the workplace, a battle fought largely in the name of data security. Their thinking was that if IT couldn't manage it, they couldn't secure it. Is history repeating itself with healthcare IoT devices?
Fast forward to the present health care environment. A new generation of digital devices, some authorized and others not, are flooding into hospitals.
READ MORE
|
|
|
|
 7701 Las Colinas Ridge, Ste. 800, Irving, TX 75063
|