Menu

Monthly Meeting - August 27, 2018

 

SOC for Cybersecurity and Evolving SOC 2 Reporting

Download the Slide Deck Here

Presenters: Phil Nemmers & Robb Ullrich

 

Description:

Ernst & Young LLC will be presenting on the Service Organization Control report process. 

Bios:

Phil Nemmers, Partner Cybersecurity

Phil is a Partner in the Cybersecurity practice with over 30 years of experience supporting clients across various sectors including financial services, health care, telecommunications, retail, consumer products, and aerospace and defense.

Phil is responsible for overseeing EYs compliance and regulatory-related activities
impacted by cybersecurity risk; including:

  • The growing impact of cyber risks on external audits, internal audit activities, and
    third-party attestation activities
  • EY’s outreach activities with various federal regulators across key sectors and
    the legislative branch.

Phil is a Certified Public Accountant, a Certified Information Systems Auditor, and a
Certified Information Technology Professional

Robb Ullrich, Manager
FSO Advisory Services

Robb Ullrich is a Manager in the Financial Services Office - Advisory Services practice of Ernst & Young LLP. He has over eight years of experience in providing IT assurance, service organization control (SOC)
reporting, and advisory services to a broad range of large and middle-market and privately held clients in primarily the insurance, financial services, technology, and healthcare industries.

He has coordinated numerous projects relating to SOC reporting (including both pre-assessment and attestation), cyber security, and IT risk management and assurance, where he has worked with clients to develop effective means to assess, control, monitor, and measure current and emerging IT and cyber risks. Robb has experience in managing large internal control-related projects and currently serves as the engagement
manager on 18 annual SOC 1 and SOC 2 examinations, which focus extensively on the assessment and testing of application controls, IT general computer controls, and alignment with cyber security frameworks. A majority of his clients operate using both mainframe and distributed systems.

Where:

Holmes Murphy & Associates 
2727 Grand Prairie Pkwy 
Waukee, IA 50263

We will meet at the new Holmes Murphy building on Grand Prairie Parkway in Waukee.  Please check in at the security desk at the front entrence and follow the signs to the auditorium. 

If you can't physically attend, you can use our webcast. Below is the information for connecting.

Monthly ISSA Chapter Meeting

Please join my meeting from your computer, tablet or smartphone. https://global.gotomeeting.com/join/247310853You can also dial in using your phone. United States +1 (872) 240-3412 Access Code: 247-310-853

 

Read more...

Monthly Meeting - July 23, 2018

 

The Intelligence Cycle and How to Integrate Cyber Threat Intelligence intoYour Organization

Register for Monthly Meeting

Presenters: Matt Heit

 

Description:

Matt will be discussing the Intelligence Cycle and how to integrate intelligence into cyber operations. He will explain how to develop business requirements for intelligence and how to fulfill those requirements with actionable intelligence that your team can use to defend your organization. Matt will demonstrate how to create a functioning cyber threat intelligence program and the reasons why many programs fail to provide any intelligence value.

Bios:

Matt Heit

Matt Heit is a retired U.S. Navy Senior Chief Petty Officer and current Senior Information Security Analyst at FBL Financial Group. He has served in the roles of Intelligence Manager and Cyber Team Director providing expert cyber intelligence for over 20 years to the U.S. Navy, U.S. Marine Corps, U.S. Cyber Command, and the NSA. Matt and his family recently moved to Iowa where he is enjoying civilian life and light traffic.

Where:

FBL Financial
5400 University Ave
West Des Moines, IA 50266

Read more...

Monthly Meeting - June 25, 2018

 

Leveraging Internal Audit as a Security Tool

Register for Monthly Meeting

Presenters: Chris Garza and Matthew White

 

Description:

This talk will discuss factors that can build the relationship between the internal audit and information security functions to improve the effectiveness of a company's information security posture. The discussion will reference research done on the topic and real-world experiences.

Bios:

Chris Garza

Chris is a Senior Staff IT Auditor at FBL Financial Group, Inc responsible for performing internal IT audits. Prior to this role he was a Senior Associate at KPMG responsible for performing external IT audits. Chris holds the CISA and CPA certifications. He has a bachelor's degree in Accounting and Management Information Systems from the University of Iowa and is currently enrolled in the Information Assurance master's degree program at Iowa State University.

Matthew White

Matthew White is an Information Security Vulnerability Engineer at INTL FCStone Inc. responsible for performing vulnerability assessments. Prior to this role he was an Information Security Admin at FBL Financial Group, Inc responsible for being a jack of all trades in Security Operations. Matthew holds the GWAPT and CCNA Cyber Ops certifications. He has an associate’s degree in Network Technology – Telecom/Data Communications from DMACC. He is the former Director of Communications for the Des Moines ISSA chapter and currently serves on the SecDSM board.

Where:

FBL Financial
5400 University Ave
West Des Moines, IA 50266

Read more...

Monthly Meeting - April 23, 2018

[During this meeting we are holding elections for both President and Communications Director. IMPORTANT: If you wish to be considered make sure your membership is current and send me your biography to This email address is being protected from spambots. You need JavaScript enabled to view it. before April 23rd so they can be distributed before voting.]  

 

Cyber Quantitative Risk Analysis – What’s the deal?

Register for Monthly Meeting

Presenters: Aaron Fister

 

Description:

Identify and prioritizing cyber risks is a major concern of the IT industry. With limited budgets and resources, tradeoffs must be made where time and effort is spent. Cyber Quantitative Risk Analysis (CQRA) is an option for modeling of cyber risk. CQRA is made up of two major components. Expert data estimation techniques and the use of a Monte Carlo simulation to model risk. The results of the analysis can then be used to compare and prioritize risks.

This talk will present a fictional example applying the methodology. A brief overview of the estimation technique and modeling method are covered. Strengths and weaknesses as well areas of research and future directions of the methodology are discussed.

Bio:

Aaron Fister

Aaron Fister is currently a Ph.D. student at the University of Oklahoma. His areas of study are public management, risk perception, and data science. He has 15 years of IT and Information Security experience in the financial services, retail, and government sectors and holds the CISSP, CISA, and CISM professional security certifications. He has completed a Bachelor of Science degree from Iowa State University and a Master of Science from the University of Oklahoma. Aaron is a coauthor of the open access textbook Quantitative Research Methods for Political Science, Public Policy, and Public Administration. Aaron has previously taught workshops and classes on statistics, data science, and quantitative text analysis. His research interest is studying how individual and organizational dynamics influence cyber risk.

Where:

FBL Financial
5400 University Ave
West Des Moines, IA 50266

Read more...

Monthly Meeting - March 26, 2018

Continuous Security: Monitoring & Active Defense in the Cloud

Register for Monthly Meeting

Presenters: Eric Johnson

 

Description:

Monitoring and feedback loops from production is a critical tenant in DevOps for measuring performance, runtime errors, statistics, and changes. In the SecDevOps world, security teams can take advantage of DevOps monitoring tools to increase security visibility, identify anomalies, and respond swiftly to real time attacks.

Cloud providers are offering powerful infrastructure, development, and application continuous monitoring services that generate a wealth of data. But, building continuous security monitoring on top of the data can be challenging. Where are the log files? What is the log file format? What security events are captured? How do we display meaningful metrics? Can we detect and defend in real time?

This talk will introduce attendees to a realistic AWS environment’s monitoring and active defense system and discuss real data collected during a war game exercise. Afterwards, we will walk through the postmortem, review the alerts raised during the incident, determine if there were any surprises, and identify opportunities to improve the system. Attendees will walk away with actionable techniques for building an active defense framework to help protect your organization’s cloud resources.

Bios:

Eric Johnson

Eric Johnson is a Principal Security Consultant at Cypress Data Defense where he leads secure software development lifecycle consulting, web and mobile application penetration testing, secure code review assessments, static source code analysis, security research, and security tools development. He also founded the Puma Scan static analysis open source project, which allows software engineers to run security-focused .NET static analysis rules during development and in continuous integration pipelines.

As a Certified Instructor with the SANS Institute, Eric authors application security courses on DevOps, cloud security, secure coding, and defending mobile apps. He serves on the advisory board for the SANS Securing the Human Developer awareness training program, delivers security training around the world, and has presented his security research at conferences including SANS, BlackHat, OWASP, BSides, JavaOne, UberConf, and ISSA.

Eric completed a bachelor of science degree in Computer Engineering and a master of science degree in Information Assurance at Iowa State University, and currently holds the CISSP, GWAPT, GSSP-.NET, and GSSP-Java certifications.

Where:

FBL Financial
5400 University Ave
West Des Moines, IA 50266

Read more...