Download presentation
Presentation is loading. Please wait.
Published byLindsey Byrd Modified over 8 years ago
1
You Are Not Alone: Pooling Regional Resources to Enhance Information Security Training Kris Monroe, CISA, CISSP Information Security Officer Ithaca College
2
INTRODUCTION How organizations in Rochester, NY pooled their resources to develop an effective security awareness and training conference. Suggested community resources to leverage How to engage those resources 2
3
BRIEF HISTORY The Rochester Security Summit is a collaboration of area organizations and the Rochester Chapter of the Information Systems Security Association (ISSA). History of the Summit Started in 2006 Fostered by Rochester Chapter of the Information Systems Security Association, University of Rochester and local organizations. Planning Committee includes over 30 people from higher education, business, education, and area organizations. The Summit features speakers and panels to help educate area security and IT professionals, business managers, organizations and the community on how to protect information systems and data. 3
4
SUMMIT AREAS OF FOCUS The conference focused on the following areas over the years: Technical Professional Track Business Professional Track Software Professional Track Providing education opportunities for executives, CFO, CIO/CSO, business managers, security professionals, IT managers, technical specialists, help desk staff, or developer. 4
5
SUGGESTED COMMUNITY RESOURCES Work with local or national security awareness groups, professional societies (e.g., ISSA, ISACA, InfraGard, OWASP, SANS, IEEE security & privacy group), College/University security groups or student groups (e.g., ACM student chapters, & student security groups) and K-12. Leverage October National Cyber Security Month (NCSAM) 5
6
ROCHESTER SUMMIT COLLABORATORS Area collaboration partners have included: The Rochester Chapter of the Information Systems Security Association (ISSA), The Rochester Chapter of the Information Systems Audit and Control Association (ISACA) Rochester Open Web Application Security Project (OWASP) Chapter Rochester Institute of Technology University of Rochester Information Technology Office Rochester Cyber Safety and Ethics Initiative Area businesses and organizations 6
7
HOW TO ENGAGE Join Security Organizations Attend Meetings Introduce Yourself Get Involved 7
8
RESOURCE LINKS OWASP http://www.owasp.org/index.php/Category:OWASP_Chapter http://www.owasp.org/index.php/Category:OWASP_Chapter ISSA https://www.issa.org/Chapters/Chapter-Directory.html https://www.issa.org/Chapters/Chapter-Directory.html ISACA http://www.isaca.org/Content/NavigationMenu/About_ISACA/Chapte rs/Chapters_by_Region.htm http://www.isaca.org/Content/NavigationMenu/About_ISACA/Chapte rs/Chapters_by_Region.htm Infragard http://www.infragard.net/chapters/index.php http://www.infragard.net/chapters/index.php NCSAM http://www.staysafeonline.org/content/about-ncsam http://www.staysafeonline.org/content/about-ncsam Rochester Security Summit http://rochestersecurity.org http://rochestersecurity.org 8
Similar presentations
© 2024 SlidePlayer.com Inc.
All rights reserved.