Say

Top Drawer module

Publish up to six modules in this position with 6-columns layout. Choose from 6 module styles. Add icons and badges too using the Warp framework module settings!

What!

Top Drawer module

Publish up to six modules in this position with 6-columns layout. Choose from 6 module styles. Add icons and badges too using the Warp framework module settings!

Upcoming Events

  • Tue 19 .
    Jul

    Sponsor:

    Attivo Logo

    Attivo Networks is the leader in dynamic deception technology, which in real-time detects intrusions inside the network, data center, and cloud before the data is breached. Not reliant on signatures, Attivo uses high-interaction deception techniques to lure BOTs/APTs to reveal themselves, provides actionable alerts, and the forensics to shut down cyber-attacks.

     

    Speaker:

     Ed Pagett

    Ed Pagett

     

    Bio:

    Edward Pagett, Sr. Vice President and Chief Information Security Officer – MAXIMUS

    Ed Pagett leads the global information security function for MAXIMUS. Ed has more than 20 years of experience in information security, risk management, and information technology. Ed previously served as Chief Security Officer of Black Knight Financial Services, Chief Information Security Officer of Lender Process Services, and Corporate Information Security Officer of The First American Corporation. Ed has also functioned as principal & practice director for several information security and technology consultancies providing services to Fortune 500 organizations. Ed participates on several governing bodies for security industry forums and is an executive member of several security service/product advisory boards.

    Ed earned a B.S. in Information and Computer Science from the University of California at Irvine and holds multiple industry certifications including the CISA, CISM, CRISC and CISSP.

     

    Topic:

    3 Key Ways to Start Measuring the Success of your Security Program

     

    Abstract:

    Our industry as a whole talks about the rapidly changing threat landscape, the innovation in both technology and our strategies that is needed to appropriately respond, the risk management processes needed to prioritize our efforts, etc. I agree with it all. What we have somehow missed in this reality that there is sound, basic, essential practices that still need to be practiced with diligence if we are going to succeed.

    In this session we will discuss effective vulnerability management (both network/host vulnerability management and application vulnerability management) with emphasis on effective communication tools (metrics, reporting, and business risk alignment).

    Tuesday, 19. July 2016 - 11:30 till 13:30
    July Chapter Meeting (Boulder)
  • Tue 19 .
    Jul

    Sponsor:

    Attivo Logo

    Attivo Networks is the leader in dynamic deception technology, which in real-time detects intrusions inside the network, data center, and cloud before the data is breached. Not reliant on signatures, Attivo uses high-interaction deception techniques to lure BOTs/APTs to reveal themselves, provides actionable alerts, and the forensics to shut down cyber-attacks.

     

    Speaker:

     Ed Pagett

    Ed Pagett

     

    Bio:

    Edward Pagett, Sr. Vice President and Chief Information Security Officer – MAXIMUS

    Ed Pagett leads the global information security function for MAXIMUS. Ed has more than 20 years of experience in information security, risk management, and information technology. Ed previously served as Chief Security Officer of Black Knight Financial Services, Chief Information Security Officer of Lender Process Services, and Corporate Information Security Officer of The First American Corporation. Ed has also functioned as principal & practice director for several information security and technology consultancies providing services to Fortune 500 organizations. Ed participates on several governing bodies for security industry forums and is an executive member of several security service/product advisory boards.

    Ed earned a B.S. in Information and Computer Science from the University of California at Irvine and holds multiple industry certifications including the CISA, CISM, CRISC and CISSP.

     

    Topic:

    3 Key Ways to Start Measuring the Success of your Security Program

     

    Abstract:

    Our industry as a whole talks about the rapidly changing threat landscape, the innovation in both technology and our strategies that is needed to appropriately respond, the risk management processes needed to prioritize our efforts, etc. I agree with it all. What we have somehow missed in this reality that there is sound, basic, essential practices that still need to be practiced with diligence if we are going to succeed.

    In this session we will discuss effective vulnerability management (both network/host vulnerability management and application vulnerability management) with emphasis on effective communication tools (metrics, reporting, and business risk alignment).

    Tuesday, 19. July 2016 - 17:00 till 19:00
    July Chapter Meeting (Downtown Denver)
  • Wed 20 .
    Jul

    Sponsor:

    Attivo Logo

    Attivo Networks is the leader in dynamic deception technology, which in real-time detects intrusions inside the network, data center, and cloud before the data is breached. Not reliant on signatures, Attivo uses high-interaction deception techniques to lure BOTs/APTs to reveal themselves, provides actionable alerts, and the forensics to shut down cyber-attacks.

     

    Speaker:

     Ed Pagett

    Ed Pagett

     

    Bio:

    Edward Pagett, Sr. Vice President and Chief Information Security Officer – MAXIMUS

    Ed Pagett leads the global information security function for MAXIMUS. Ed has more than 20 years of experience in information security, risk management, and information technology. Ed previously served as Chief Security Officer of Black Knight Financial Services, Chief Information Security Officer of Lender Process Services, and Corporate Information Security Officer of The First American Corporation. Ed has also functioned as principal & practice director for several information security and technology consultancies providing services to Fortune 500 organizations. Ed participates on several governing bodies for security industry forums and is an executive member of several security service/product advisory boards.

    Ed earned a B.S. in Information and Computer Science from the University of California at Irvine and holds multiple industry certifications including the CISA, CISM, CRISC and CISSP.

     

    Topic:

    3 Key Ways to Start Measuring the Success of your Security Program

     

    Abstract:

    Our industry as a whole talks about the rapidly changing threat landscape, the innovation in both technology and our strategies that is needed to appropriately respond, the risk management processes needed to prioritize our efforts, etc. I agree with it all. What we have somehow missed in this reality that there is sound, basic, essential practices that still need to be practiced with diligence if we are going to succeed.

    In this session we will discuss effective vulnerability management (both network/host vulnerability management and application vulnerability management) with emphasis on effective communication tools (metrics, reporting, and business risk alignment).

    Wednesday, 20. July 2016 - 11:30 till 13:30
    July Chapter Meeting (Denver)

Subscribe

Sign up to receive news
about our upcoming events

 

Recent Posts

View recent blog posts about
industry trends and events

View Blog