2015 Tuesday Pre-Conference Sessions & Agenda

Transcription

2015 Tuesday Pre-Conference Sessions & Agenda
PRE CONFERENCE WORKSHOPS AT-A-GLANCE
CYBER WARFARE TRAINING AND THREAT SIMULATION (PRESENTED BY BLACKFIN SECURITY)
DATE: Tuesday, May 12, 2015
TIME: 8:00 am - 4:00 pm
EMERGING ISSUES IN IT AUDITING (PRESENTED BY DELOITTE)
DATE: Tuesday, May 12, 2015
TIME: 8:00 am - 4:00 pm
INTRODUCTION TO MALWARE ANALYSIS (PRESENTED BY KORELOGIC SECURITY)
DATE: Tuesday, May 12, 2015
TIME: 8:00 am - 4:00 pm
OPEN FAIR TRAINING (PRESENTED BY CXOWARE AND THE OPEN GROUP)
DATE: Tuesday, May 12, 2015
TIME: 8:00 am - 4:00 pm
SECURITY LEADERSHIP ROUNDTABLE (PRESENTED BY E&Y)
DATE: Tuesday, May 12, 2015
TIME: 1:00 pm - 4:00 pm
----------------------------------------------------------------------------------------------
PRE CONFERENCE WORKSHOP DESCRIPTIONS
CYBER WARFARE TRAINING AND THREAT SIMULATION (PRESENTED BY BLACKFIN SECURITY)
DATE: Tuesday, May 12, 2015
TIME: 8:00 am - 4:00 pm
SPEAKER:
Alex McCormack, Security Architect, Blackfin Security
SESSION DESCRIPTION:
During this course, enjoy a full immersive day of cyber warfare training and simulation exercises. The training will be split into
two sessions consisting of security training and hands-on threat simulation exercises. Attendees will be required to bring a
laptop to the event to participate in the live environment and final security challenge. During the morning session, attendees
will received cutting-edge training on Web Application Security covering tactics and skills needed to test the defenses of most
modern internet applications. After lunch, participants will compete head-to-head against each other in a Capture the Flag
(CTF) style security competition modeled after real-world attack scenarios in a Threat Simulation Environment. The CTF event
will allow you to test out your newly-learned security skills, while scoreboards give you a “play by play” as you navigate through
the challenge. The instructor will be available to answer any questions, and help you understand how to properly use the
techniques you learned in the morning session.
LEARNER OBJECTIVES:
Expect to walk away with knowledge and understanding in the following areas:

Web application security fundamentals

Network and application reconnaissance

Data exfiltration

Exploit application misconfigurations




Credential compromise and discovery (password cracking)
Privilege escalation
SQL injection
Remote exploitation of Microsoft operating system components
SPEAKER BIO:
Alex McCormack is a Security Architect with Blackfin Security. At Blackfin, Alex assists in the design and implementation of
Capture the Flag competitions and training events. Alex has designed CTF challenges since 2013 and given training since 2012.
Prior to joining Blackfin, Alex worked in Incident Response and Malware Analysis. Alex has a BS in Computer Science from the
Georgia Institute of Technology and holds the GREM and GCIH certifications. Alex can be reached at [email protected],
@amccormack, or amccormack.net
EMERGING ISSUES IN IT AUDITING (PRESENTED BY DELOITTE)
DATE: Tuesday, May 12, 2015
TIME: 8:00 am - 4:00 pm
SPEAKER:
Clayton Smith and Rhonda Willert, Senior Managers, Deloitte & Touche, LLP
SPREADSHEET CONTROL PROGRAM ASSESSMENT
SESSION DESCRIPTION:
During this course, you will learn about the four cornerstones of an effective spreadsheet control environment and current
issues currently in the marketplace.
LEARNER OBJECTIVES:
Expect to walk away with knowledge and understanding in the following areas:

Background knowledge of spreadsheet programs

Learn about the various types of governance models in place to support a spreadsheet program

People supporting a framework and common approaches to implementing the appropriate supporting teams

Identify and describe the process that is following for appropriate spreadsheet control.

Learn about the types of technologies that are in place to support a spreadsheet program
IDENTIFYING AND TESTING INFORMATION PRODUCED BY THE ENTITY (“IPE”) RELEVANT TO GENERAL IT CONTROLS
SESSION DESCRIPTION:
The content in this course is based on requirements for audits performed in accordance with the standards of the Public
Company Accounting Oversight Board (PCAOB) and integrated audits performed in accordance with the standards of the AICPA.
Refer to the Information Produced by the Entity Guidefor additional guidance related to this topic. This course will provide
learning on how to identify and test Information Produced by the Entity (IPE) relevant to General IT Controls (GITCs)
LEARNER OBJECTIVES:
Expect to walk away with knowledge and understanding in the following areas:

Identify relevant standards and firm guidance pertaining to IPE

Obtain an understanding and identify GITC IPE

Describe the steps to plan and perform tests of GITC IPE
WORKING PAPER RELIANCE AND INTEGRITY
SESSION DESCRIPTION:
Walk away with a deeper knowledge of testing and documenting internal controls testing. Documenting the results of our
testing in a meaningful way to enable other parties to rely on working papers is a key element to being an effective internal
auditor.
LEARNER OBJECTIVES:
Expect to walk away with knowledge and understanding in the following areas:

Design of controls

Design factors

Documentation considerations

Information produced by the entity

Test of controls

Risk associated with the control

Test of operating effectiveness

Plan the Nature, Timing, and Extent, and Perform Tests of Operating Effectiveness

Risk Based Approach: Planning & Timing

Performing tests of operating effectiveness of controls
COBIT 5 ASSESSMENT
SESSION DESCRIPTION:
During this course, enjoy a detailed breakdown or how to conduct a COBIT 5 assessment.
LEARNER OBJECTIVES:
Expect to walk away with knowledge and understanding in the following areas:

Background on COBIT 5

COBIT 5 assessment approach

Identifying key resources

Understanding the project guide
SPEAKER BIOS:
Clayton Smith and Rhonda Willert are Senior Managers within the Advisory practice at Deloitte & Touche, LLP. Together they
have more than 25 years of IT experience with extensive knowledge of IT audit testing methodologies. Clayton can be reached
at [email protected] and Rhonda can be reached at [email protected].
INTRODUCTION TO MALWARE ANALYSIS (PRESENTED BY KORELOGIC SECURITY)
DATE: Tuesday, May 12, 2015
TIME: 8:00 am - 4:00 pm
SPEAKER:
Tyler Hudak, Security Consultant, KoreLogic Security
SESSION DESCRIPTION:
Due to the prevalence and business impact of malware, security professionals increasingly need the skills necessary to analyze
worms, bots and trojan horses. This one day course will walk attendees through the concepts, techniques and processes for
analyzing malware.
Students will take a “from-the-wild” malware sample in a hands-on environment and learn how to analyze its characteristics
and behavior to determine what it does and the risk it presents.
PREREQUISITES:
No previous experience in malware analysis is necessary as this course is designed for those who have never performed it
before. However, an understanding of malware is recommended, and students must be experienced with Windows and a
virtual machine (e.g. Taking snapshots, etc.)
CLASS REQUIREMENTS:
Students will be required to bring their own laptops for the class. Laptops will need a VMWare Workstation (NOT VMWARE
PLAYER) or VirtualBox installation with an install of Windows (XP or higher) as the guest OS prior to the class. All other tools will
be provided.
LEARNER OBJECTIVES:
In the course, students will learn:



Techniques for statically and dynamically analyzing malware.
How to safely analyze malicious programs.
Methods for setting up an effective malware analysis lab.
SPEAKER BIO:
Tyler Hudak is a security consultant for KoreLogic Security and has extensive real-world experience in malware analysis and
incident handling for Fortune 500 firms. He has worked numerous cases involving malware compromises and brings his front
line experience and proven techniques to bear in the training. He is also the lead developer of MASTIFF, the first open-source
static analysis framework used to quickly analyze malware.
OPEN FAIR TRAINING (PRESENTED BY CXOWARE AND THE OPEN GROUP)
DATE: Tuesday, May 12, 2015
TIME: 8:00 am - 4:00 pm
SPEAKERS: Chad Weinman, Director of Integration Services, CXOWARE and Jim Hietala, Vice President, Business Development
and Security, The Open Group
SESSION DESCRIPTION:
The Open Group and CXOWARE are partnering to provide a one day training on the Open FAIR risk analysis methodology. Prerequisites: a general understanding of security and risk concepts is a useful background to this training.
LEARNER OBJECTIVES:

Participants will develop an understanding of the Open FAIR risk taxonomy, including the various components of risk

Participants will learn the differences between qualitative and quantitative risk analysis, and where each is
appropriate

Participants will learn about measurement and calibration, and how to develop confidence in risk measurements

Finally, Participants will learn to work with available data, and to pick the right abstraction levels at which to perform
risk analysis

Participants will also learn about the Open FAIR certification program for risk analysts
SPEAKER BIOS:
Chad Weinman, Director of Integration Services, CXOWARE. Chad Weinman is a dynamic & motivated professional who is
passionate about risk. He has helped dozens of clients on risk program design & adoption, been a speaker for industry
conferences, and has facilitated over 75 training seminars on risk. Chad is the Director of Integration Services for CXOWARE, a
leader in the quantification of information & security risk. He jokingly claims to have the best job in his organization as he is
able to continually analyze risk and works daily with clients domestic and abroad. Chad is a leading expert in Factor Analysis of
Information Risk (FAIR), a framework for the quantification of risk (Quantification can and should be done). Chad is originally
from the Ohio in the US. @chadweinman. Jim Hietala, VP, Security, The Open Group
Jim Hietala, Open FAIR, CISSP, GSEC, is Vice President, Business Development and Security for The Open Group, where he
manages the business team, as well as security and risk management programs and standards activities, He has participated in
the development of several industry standards including O-ISM3, O-ESA, Risk Taxonomy Standard, Risk Analysis Standard, and
O-ACEML. He also led the development of compliance and audit guidance for the Cloud Security Alliance v2 publication.
Jim is a frequent speaker at industry conferences. He has participated in the SANS Analyst/Expert program, having written
several research white papers and participated in several webcasts for SANS. He has also published numerous articles on
information security, risk management, and compliance topics in publications including CSO, The ISSA Journal, Bank Accounting
& Finance, Risk Factor, SC Magazine, and others.
An IT security industry veteran, he has held leadership roles at several IT security vendors. Jim holds a B.S. in Marketing from
Southern Illinois University.
SECURITY LEADERSHIP FORUM (PRESENTED BY E&Y)
DATE: Tuesday, May 12, 2015
TIME: 12:00 pm - 4:00 pm
PARTICIPATION CRITERIA*:
Security Leadership Roundtable participants are required to be executive/senior-level information security professionals
reporting directly to the CEO, CFO, CIO or the equivalent. In companies with more than 200 employees, the Security Executive
Exchange attendance is open to qualified executive direct reports of the organization’s CISO. Individuals should be responsible
for information security at the corporate or enterprise level within their organizations, be interested in discussing sensitive
security issues with their peers, and be willing to share professional experiences. * Participants will be reviewed to ensure
qualifications are met and may not be permitted to participate if you don't meet the qualifications
JOB TITLE REQUIREMENTS:

CISOs and CSOs

Security Directors

IT Audit Leadership team

Senior Compliance Executives
Security Leadership Roundtable participants employed by a company that sells a security product or service must meet the
following additional requirements:



The organization must have a clear separation between the internal security or research practitioner and those
involved in sales, marketing or product management.
The organization must have a minimum of 200 employees or a minimum of 2 direct reports to the participant.
The attendee must certify that he or she is not involved with the sales, marketing or product management of security
products or offerings.
SESSION DESCRIPTION:
Join us at the 2015 RMISC Security Leadership Forum for an afternoon of peer discussion and industry insight. This session is
open to security leaders, such as CISOs, Security Directors, and others in leadership positions in their organizations. The
afternoon will start with an insightful discussion from E&Y experts that will inform attendees on current industry trends . Next,
leaders will participate in roundtable discussions with their peers to learn about each other's best practices and help provide a
common body of knowledge to the leadership community. After completing the roundtable discussions, the group will provide
their insights back to the group so that all can share in the insights gained. The roundtable groups will be kept small in order to
ensure that all group members can participate in the discussion. Please come join us for some quality time and interaction with
your peers.