austinissa.org
Job bank
http://www.austinissa.org/job-bank
Have you included the following websites in your employment search? And be sure to check out the ISSA Capitol of Texas chapter LinkedIn Jobs page. Website designed by VelocityStorm.
austinissa.org
Sponsors
http://www.austinissa.org/sponsors
Austin ISSA values strong partnerships with global, regional, and local sponsors to increase our ability to meet the educational mission of the chapter. Our ability to serve the Austin security community is greatly improved with the support of our sponsors. Sponsorship packages are renewable per annum. We have multiple sponsorship levels to choose from:. Other: If the Gold or Silver package is not what you are looking for, please contact us. To discuss other options. Website designed by VelocityStorm.
campitconferences.net
Enterprise Risk/Security Management
http://www.campitconferences.net/events/2015/enterprise_risk2.htm
IT PMO/Portfolio Managment, Chicago, IL. IT Infrastructure / Operations Management (Data Center), Chicago, IL. Enterprise Risk/Security Management, Dallas, TX. Enterprise Risk/Security Management, Chicago, IL. IT Leadership Strategies, Chicago, IL. Data Breaches: Defending Against and Responding to, Chicago, IL. IT PMO/Portfolio Management, Dallas, TX. Enterprise Risk / Security Management, Atlanta, GA. Business Intelligence / Analytics Strategies, Chicago, IL. IT Leadership Strategies, Chicago, IL.
gregfoss.com
Greg Foss [dot] com -- About
http://www.gregfoss.com/about.php
Security Researcher and Penetration Tester. Greg is a father to two awesome kids and husband to an amazing wife. He's a native Coloradan who received his bachelor’s degree in Computer Information Systems from Colorado State University - Pueblo. While attending college, he owned and operated a small business where he designed, developed, and administered Web applications for local businesses. Greg is currently working as a Senior Security Research Engineer on the LogRhythm Labs. Threat intelligence team, ...
techjunctionevents.com
Sacramento 2015 - TechJunctionTechJunction
http://techjunctionevents.com/events/sac15
NEXT EVENT: Spokane - October 5th. February 19, 2015. Red Lion Woodlake Conference Center. 8:30am – 4:00pm. Staying up to date with the technology that runs your organization and ensures a secure environment for your data and infrastructure are critical to your business. TechJunction. Helps you meet these needs by providing quality, vendor-neutral educational seminars, drawn from case studies and best practice examples from leaders in the field. Add to iOS or Outlook. Http:/ www.afcea.org. The Associatio...
techjunctionevents.com
Spokane 2015 - TechJunctionTechJunction
http://techjunctionevents.com/events/spk15
NEXT EVENT: Spokane - October 5th. October 28, 2015. 8:30am – 4:00pm. Staying up to date with the technology that runs your organization and ensures a secure environment for your data and infrastructure are critical to your business. TechJunction. Helps you meet these needs by providing quality, vendor-neutral educational seminars, drawn from case studies and best practice examples from leaders in the field. Add to iOS or Outlook. Chief Information and Technology Officer, City of Spokane. Centrify provid...
live-mac-lawyer.sites.rocketmatter.com
Miscellaneous Archives - The Mac Lawyer
http://live-mac-lawyer.sites.rocketmatter.com/category/miscellaneous
A Tribute to My Friend, Finis Price. February 16, 2016. How could this even be possible? I had just spoken to him a few short hours before, and his last words Thanks buddy, you’re the best were still echoing in my ears. I would never hear Benny boy! Is a day that I dread and, if I’m being truly honest, hate. Billy Joel was right when he said only the good die young because there’s not shortage of people who are much worse and who should have gone long before Finis, myself included. Put out anything weekl...
cloudtweaks.com
2015 Cybersecurity Challenges (5 Things To Expect) »
http://cloudtweaks.com/2014/12/2015-cybersecurity-challenges-5-things-expect
2015 Cybersecurity Challenges (5 Things To Expect). December 16, 2014. Every December, security experts begin to release their predictions on what cybersecurity will look like in the coming year. The concept behind predictions is based on a company’s ability to express its expertise in a field both on the business and on the technology end,. Said Barry Shteiman, director of security strategy with Imperva. Etc) demonstrated the need to compensate with security controls where 3rd party components are being...
ithompson.wordpress.com
Tracking down ZeroAccess botnet « Event Log Managment
https://ithompson.wordpress.com/2013/10/29/tracking-down-zeroaccess-botnet
Logs Logs and More Logs. Tracking down ZeroAccess botnet. Normally I focus on the Windows Event Log, but today I’m going to stray into the world of firewall logs. Over the last several months I’ve been helping customers with Proof of Concepts for LogRhythm. A simple Unique Values AIE rule was configured that looked for network connections on the appropriate ports, originating from a single host and trying to communicate with 100 or more unique hosts. Since each infected host attempts to connect to 25...
SOCIAL ENGAGEMENT