Date: Thursday, November 13, 2014 - 11:30am - 1:00pm
Location: Creekside Restaurant - Brecksville, OH
Registration: Click Here
Topic(s): Network Security Visualization
Speaker(s): Pete Garvin
Sponsored By: NEO ISSA
Please join us for our November chapter meeting. We are doing a "Lunch-N-Learn" style meeting. So come out, enjoy a free lunch (made possible by our sponsor), and learn something from our speaker. You can read about our sponsors at the end of this message.
Speaker and Presentation Information
Presentation: Using Visualization to Improve Network Security and Performance Insight - Our lives depend on invisible bits of information silently zipping around at light speed. How can we know what's really happening on a network or if someone is stealthily accessing our computers? Most of us don’t know but that's changing. Security cameras are used to watch building entrances. Why not do the same for the virtual entrances to our networks? An intuitive visualization of network activity fills a missing piece in the cyber security puzzle because you know your own network better than anyone. Come join us as we discuss the options for gaining insight into network activity.
Speaker(s): Pete Garvin - Pete Garvin is the CEO of Protectus. His professional experience is mostly split between his current work at Protectus and various roles in his previous work at IBM. Pete has CISSP and SANS GCIH certifications, a master's degree in electrical engineering, and is co-inventor of a patent for secure network tunneling. More information about his current work can be found at http://www.protectus.com.
About Our Sponsors
Please take a moment to read about all of our sponsors. It is with their help that we can provide these meetings to you, free of charge.
Vestige Digital Investigations: http://www.vestigeltd.com
Our Schedule of Upcomminig Events:
|March 13||Greg Stein [Sleeping Well with Your Data in the Cloud: The Legal and Security Aspects of Cloud Computing]||Vestige|
|April 10||Albert School - Mobile Application Security Testing||Open|
|May 8||Damon Hacker and Greg Kelley [Computer Forensics for Employment Issues]||Open|
|June 12||Tom Kopchak [Attacking and Defending Full Disk Encryption]||Open|
|July 10||Jason Samide [How often should your organization conduct a penetration test and what is in scope?]||Open|
|August 14||Matt Riley [PKI: From the Benign and Boring to the Harmful and Esoteric]||CDW|
|October 9||Kimberly K. Ferenchak [Data Breach Insurance]||Open|
|November 13||Pete Garvin [Network Traffic Visualization]||Open|
|December ??||Holiday Party|