Current Financial Fraud Trends

ALL attendees must RSVP and must present receipt for lunch

Note: Our host request we park at the rear of the building. There is ample parking available

Born and raised in Huntsville, Jonathan is a graduate of the University of Alabama. He has worked for Redstone Federal Credit Union for the past twenty-seven years serving in a variety of roles. He is currently serving as Assistant Vice President of Security and Investigations and has held that role since 2009.

Jonathan is current member and former Chapter Chair of ASIS International. He has served the Huntsville Area Crime Stoppers program for the past seventeen years and is a former Board President. A 2014 graduate of the FBI Birmingham Citizen’s Academy, he currently serves as the Alumni Association’s Executive Vice President.

A buffet lunch is offered for $15 (must show receipt)

All attendees must RSVP no later than February 29.

Earn 1 hour continuing education unit.

The Faces of Cybersecurity Threats

ALL attendees must RSVP and must present receipt for lunch

Note: Our host request we park at the rear of the building. There is ample parking available

Shane Hammett is a former DHS cybersecurity threat professional and senior policy advisor with over 17 years of experience in the field. Shane has provided Federal, Commercial, and State & Local Government organizations with policy and architecture guidance. Shane has also provided oversight into technical programs for state fusion centers throughout the southeast. He has worked with governors to better understand risk mitigation technics and provided clarity to homeland security directors on critical infrastructure efforts throughout his career. Shane has been a visionary on complex and technical matters of bridging the public/private information sharing initiatives.

Cost to attend is $15 and includes a buffet lunch.

Earn 1 hour continuing education unit.

FBI Cybersecurity Mission

ALL attendees must RSVP and must present receipt for lunch

Mr. Good was appointed Deputy Assistant Director of the FBI’s Cyber Intelligence, Outreach, and Support Branch in March 2015. In this position, Mr. Good supports the Cyber Division’s mission to identify, pursue, and defeat cyber adversaries targeting global U.S. interests by overseeing efforts to enhance strategic partnerships and intelligence coordination. Prior to this role, Mr. Good was senior Special Assistant to the Deputy Director, providing support and guidance on a range of matters related to the day-to-day oversight of the Bureau’s activities and 36,000 employees. Cost to attend is $25 and includes a buffet lunch provided by Ted’s BBQ.

This event is open to members of the Huntsville InfraGard chapter, members of the Birmingham/Huntsville FBI Citizen’s Academy Alumni Association, and others by invitation. Advance tickets are required. Please bring your paper ticket with you to the event.

The Future of Data Assurance

ALL attendees must RSVP (with or without lunch)

CHANGE IN LOCATION
CSC, Bridge Street, Huntsville, Alabama.

Many industry leaders state that it is time to move away from the traditional “castle and moat” mentality and transition towards self-protecting, self-governing data. In this discussion, we will explore the why there is such a need, how that new approach might look, and what the benefits would be to both corporations and consumers.

Bradley Lide is a security professional with over 35 years of management and field experience in both the IT and physical security industries, in both enterprise and retail environments. As Director of Business Enablement for SertintyONE, he is responsible for understanding the client’s critical data requirements and providing innovative solutions to maintain control and integrity of that data.

Bradley is a long-time member of InfraGard, having served as President of his local InfraGard chapter as well as on InfraGard’s National Board of Directors.

Make sure you RSVP by August 31st at 10:00am and don’t forget to mark your lunch order. Lunch starts at 11:30am.

Comprehensive Risk Modeling in a Cyber Dominant Operational Environment

ALL attendees must RSVP (with or without lunch)

Note: Our host request we park at the rear of the building. There is ample parking available.

The evolution and growth of the “cyber” or the “wired world” we live in, along with all its physical, virtual, and human elements present both tremendous opportunity as well as formidable threats. The consequences of not understanding, not seeing, or acting on the resultant complexities of this “risk environment” can be unforgiving, even devastating. The threats are real, persistent, and pervasive; accordingly, understanding the strategic and comprehensive paradigm of risk is an essential prerequisite to effectively protecting, investing, and even growing an organization. The dynamic of today’s operational environment, accelerated by global virtualization, make the stakes of not getting the risk picture correct, higher and higher. New liabilities and the potential for cascading events beyond our ability to control must be anticipated rather than reacted to. Risk mitigation and resiliency planning becomes central to a successful strategy. In contrast, the neglect or relegation of risk modeling to a legacy checklist approach may leave an organization unprepared and fatefully vulnerable to catastrophic consequence. Informed decision-making become crucial to building resiliency against critical areas of risk. This presentation highlights the basic risk paradigm, the complexities added to and by the cyber environment, and some of the critical decision elements and order of approaching it.

Make sure you RSVP by August 3rd at 10:00am and don’t forget to mark your lunch order.

HIPAA Compliance & The Irreversible Damage of Healthcare Breaches

ALL attendees must RSVP (with or without lunch)

Note: Our host request we park at the rear of the building. There is ample parking available.

Troy McCartney is the lead information security professional for F1 Solutions. His focus and passion for information security has been essential to F1’s development of IT compliance management plans for its customers in the Government, Healthcare, Financial, Utility, Legal, Banking and Retail industries. For each of these industries, he routinely performs risk assessments, risk management planning, vulnerability assessments, vulnerability management planning, proactive phishing campaigns, and security-awareness training.

Since 1998, F1 Solutions has served North Alabama, and has become one of the most respected and trusted IT solution providers in the region. F1 is recognized by the Healthcare community for its stellar service and emphasis on securing patient data.

Make sure you RSVP by April 6th at 8:00am and don’t forget to mark your lunch order.

DFARS New Cyber Rule on Unclassified Controlled Technical Information (UCTI)

ALL attendees must RSVP (with or without lunch)

Learning Objectives:

  • Introduction to DFARS requirements: Definition, Safeguarding, Reporting
  • Effects on Prime and Sub Contractors
  • Understanding Unclassified Technical Information (UCTI)
  • Level of Effort in order to implement NIST SP800-53 controls
  • Reporting requirements
  • Benefits of Implementation

Background:
On November 18, 2013, the Department of Defense (DoD) issued a final rule, effective the same day, amending the Defense Federal Acquisition Regulation Supplement (DFARS) to impose requirements for safeguarding unclassified controlled technical information residing on contractor information technology systems and databases.

The responsibility to label and identify UCTI as well as verification of DFARS compliance falls on the government. But how the government will verify implementation is still undefined.

Unpatchable Cyber Vulnerabilities

Cyber attacks are increasing, both in number and in scope. However, an increasing number of these are now affecting devices that cannot be patched. In this talk, Mr. Lee will discuss several examples of significantly harmful vulnerabilities that affect consumer routers, tablets, and mobile phones. Not only are the effects of these attacks harmful, but these devices are no longer supported by the manufacturer, so they cannot be patched to fix the problems. These unpatchable vulnerabilities are not just a problem for home users. Corporations will feel the effects when these devices are brought into corporate networks under BYOD policies and connected to corporate VPNs.

After the presentation, we will spend a few minutes discussing what topics we would like to hear about in 2015. So come prepared with what topics you would like to learn and the names of any speakers you would like to hear.