Click here to see the show ...
Click here to see the show ...
Wednesday / June 6th / Crowne Plaza in Foster City
Conference web site: http://cornerstonesoftrust.com
CALL FOR SPEAKERS ... MORE INFO ...
Paper proposal submission -
Selected speakers notified: 03 Apr 2012
Draft presentation due: 01 May 2012
Final presentation due: 22 May 2012
Jan 13, 2012 / UPDATE : Concerns growing that draft cyber bill gives DHS controversial authorities, MORE INFO
Feb 9, 2012 / UPDATE: Witnesses at a House subcommittee hearing highlighted lingering disagreement over just how to reduce cyber threats. READ MORE
HEARING - Communications & Technology Subcommittee Hearing on "Cybersecurity: Threats to Communications Networks and Private-Sector Responses"
UPDATE: Feb 14, 2012 - Another view of things ... Is the real threat being blown out of proportion, possibly saddling us with an expensive and overreaching cyber-industrial complex. ? READ MORE
UPDATE: Mar 2, 2012 - Senate Republicans Introduce Cybersecurity Information-Sharing Bill. READ MORE
UPDATE: Feb 17, 2012 - Senator John McCain (R-Az) says "Cybersecurity Bill Ineffective Without NSA Monitoring the Net"; READ MORE
Thursday / March 1, 2012
05:30PM - 07:00 PM
To attend you will need to register for the RSA event. Registration is FREE but you do need to register for at least the RSA Conference 2012 EXPO Pass. This pass will provide access to the InfraGard meeting, the EXPO exhibit floor and Keynote addresses.
You can register for the conference through a variety of ways. RSA has provided the SF Bay InfraGard chapter FREE EXPO passes, MORE INFO ...
We will be meeting in VIP Room North Room 120 at the Moscone Center. Don't forget to provide yourself enough time to complete the RSA registration and badging process. The meeting is open to all, InfraGard member or not.
AGENDA: Social Engineering: Hacking the Social Systems of Humanity / By: William Tarkington Security Maven at Brocade
Topics being covered: Overall Social Engineering Methodology, Specific Social Engineering skills, Human Behaviors that make those skills effective, and finally suggestions on how to minimize the risk of your human population.
> Leslie Lambert on "The Shifting Threat Landscape and Mobile Device Security"
> Jeff Fenton on "Security and Other Issues Regarding the Use of Mobile Devices."
Director Clapper's prepared statement (.pdf)...
SEC Disclosure Guidance
America the Vulnerable: Inside the New Threat Matrix of Digital Espionage, Crime, and Warfare
Joel Brenner, a former Director of Counterintelligence in the office of the Director of National Intelligence. goes behind the headlines to explore America's next great battleground: digital security. An urgent wake-up call that identifies our foes; unveils their methods; and charts the dire consequences for government, business, and individuals. MORE at Amazon.com ...
Auditing Cloud Computing: A Security and Privacy Guide
The auditor's guide to ensuring correct security and privacy practices in a cloud computing environment provides necessary guidance to build a proper audit to ensure operational integrity and customer data protection, among other aspects, are addressed for cloud based resources. The book includes a chapter written by SF Bay InfraGard member and Member of the chapter's Board of Directors, Jeff Fenton! MORE at Amazon.com