Ethical Hacking - Demo and Discussion Seminar (3 Cpes)

Total Page:16

File Type:pdf, Size:1020Kb

Ethical Hacking - Demo and Discussion Seminar (3 Cpes)

Off-Line The SC Midlands Chapter of the Information Systems Audit & Control Association CHAPTER 54 January 2009 **President’s Letter** Happy New Year! For those of you who would like to get started on getting your CPEs out of the way early, we are beginning the New Year In This Newsletter: with a full day training for 8 CPEs. A favorite speaker, Ken Cutler is Important Dates – Page 1 returning on January 22, 2009 to discuss “Remote Access and Mobile Computing Security and Audit.” Several spots are still available, so President’s Letter – Page 1 hurry and register now! March Meeting Details – Page 2 Our Chapter is in a period of transition. It is important that we begin to plan for our growing membership. Our growth rate last year was 23% Member Incentives – Page and this year it is 19% and we have not reached the second half of the 3 year yet. We are moving toward being a large chapter. The board is responding to the request for members to register and pay online for our chapter’s events. Beginning in March, all registration will be online. If your company needs to use Accounts Payable to process payments, this will be even easier. A single registration for all of your company’s employees that will attend training will be possible. Then a single bill will print out to be delivered by you to your accounts payable. Individuals will be able to pay by check (to be mailed) or by credit card. Important Date(s): th The new system will print out receipts, send confirmations and send our March 19 – Ethical Hacking Discussion, Kevin Beaver meeting reminders. We will be able to announce and register for several events at once. We anticipate this will help out members in their education planning and improve management of the chapter’s events.

We are looking for a speaker for the month of May. Those of you with loads of IT experience should consider this as a great opportunity to step up and provide some training for the rest of us! Speakers receive 1.5 CPEs for each hour that they speak and a great gift certificate. If you are interested in taking this on, or would like to participate in a round table discussion on a particular topic, please email me as soon as possible. Topics of major interest are Active Directory, Database Security, and Fraud Detection, but that is just a start on the request list. Please volunteer yourself!

Additionally, we have members who have requested a CISA workshop here in Columbia. Would you like to teach a section? ISACA headquarters provides the power points, you just have to fill in the discussion, and field questions. Again, please volunteer yourself! It is a shame to keep sending our members to Charlotte to train to become a CISA.

Looking forward to the rest of the ISACA Year!

Sue Rusher [email protected] OFF-LINE P a g e 2

Ethical Hacking - Demo and Discussion Seminar (3 CPEs) Instructor: Kevin Beaver, CISSP Date: March 19, 2009 Time: 2:00 pm to 5:00 pm Location: TBD

About Kevin Beaver Kevin Beaver, CISSP is an independent information security consultant, author, expert witness, and speaker with Atlanta-based Principle Logic, LLC. He has over two decades of experience in IT and specializes in performing information security assessments.

Kevin has authored/co-authored seven books on information security including the highly-successful “Hacking For Dummies”, “Hacking Wireless Networks For Dummies”, Laptop Encryption For Dummies, and “Securing the Mobile Enterprise For Dummies” (all by Wiley) as well as “The Definitive Guide to Email Management and Security” (Realtimepublishers.com) and “The Practical Guide to HIPAA Privacy and Security Compliance” (Auerbach). He has written over 200 articles, performed over three dozen webcasts, and is a regular contributor to SearchSoftwareQuality.com, SearchSQLServer.com, SearchDataBackup.com, SearchEnterpriseDesktop.com, and Security Technology Executive magazine.

Kevin has presented at seminars and conferences over 100 times and is consistently a top-rated speaker. He is also the creator and producer of the IT audio book series Security On Wheels and its associated blog providing security learning for IT professionals on the go. Kevin earned his bachelor’s degree in Computer Engineering Technology from Southern College of Technology and his master’s degree in Management of Technology from Georgia Tech.

Course Description Ethical hacking is used by few and feared by many yet can be one of the most beneficial tools any organization can have in the quest for information security. In this seminar, noted information security consultant and author Kevin Beaver will cover the essentials needed for finding the security vulnerabilities that really matter. Starting out, Kevin will outline the technical and operational security weaknesses he’s seeing in the field. He’ll discuss the issues that are easily-exploited and the ones we shouldn’t be wasting our time on as well ones that are often overlooked. He’ll then share the essential elements of a successful ethical hacking program and show how the techniques can be incorporated into the security auditing process in order to increase the value of higher-level audits. Finally, Kevin will introduce and demonstrate some neat, useful, and otherwise must-have security testing tools that will help take the pain out of the security testing process and ensure you get the highest payoff for your efforts.

Course Cost $70 – Members $85 – Affiliate Members $95 – Non Members $30 – Students

Registration Process Registration and payment is required in advance for the seminar. All registration will be done online. If you pay by check there is an option to do so with instructions for where to mail the check. However, you must use this registration process online. OFF-LINE P a g e 3

Member Get a Member Contest! With your help, ISACA will continue to expand its unsurpassed network of peers through the 2009 Member-Get-A-Member (MGAM) campaign. We are asking all chapters to continue promoting this exciting opportunity to existing ISACA members. As a chapter, you can participate in the following ways:

 You can download the “Intro to ISACA” video here. Please remember to use the MGAM website (www.isaca.org/mgam) to initiate e-mail invitations to member prospects, as it ensures that you will receive full credit for recruiting each new member.

 To participate in the contest we have posted a link on your chapter web site to the ISACA Member- Get-A-Member campaign (www.isaca.org/mgam).

The Member-Get-A-Member program will be available through 15 April 2009. Prizes for the campaign are:

 GRAND PRIZE (US$ 1,000)—For the member who recruits the most full-dues* paying new members.  SECOND PRIZE (US$ 500)—For the member who recruits the second highest number of full-dues* paying new members.  RANDOM DRAWING (US$ 500)—One randomly selected winner will be chosen. Each member will receive one entry in the drawing for each full-dues*paying new member recruited. * Full-dues paying members are those who pay US$ 130 + local chapter dues (if applicable) + the new member fee. Any questions about the MGAM campaign should be directed to [email protected]. Thank you in advance for your support of this year’s campaign!

ISACA Member Benefit Highlight IT Governance and Process Maturity: This new report, complimentary to members-only, uses the process control objectives of the COBIT framework for complete coverage of IT governance. The report includes robust benchmark information, using data from a field study, to provide a means for an organization to answer the question, ‘How do we compare with our peers?’ Go to www.isaca.org/downloads to request your copy now.

Join or renew your ISACA membership today by going to www.isaca.org.

Recommended publications