Presentations are posted
Thanks for the great meeting!
April 14th, 2015
Ed Vasko, Terra Verde Services
Presentation: “Do you know where your Information Security gaps really are”
Tina Slankas, ACTIC
Presentation: Land Where Unicorns Run Free
Charisse Castagnoli, Websense
Presentation: “Behind the Security Predictions Door”
Mike Lombardi, Vertigrate
Presentation: “Forensics and Humpty Dumpty”
Chapter Business, ISSA Phoenix Chapter
Presentation: “AZCWR update”
Responsible to actively promote, maintain and validate the availability, integrity, and confidentiality of the organization information assets in compliance with company security policies, standards and best practices. Responsible for identifying, purchasing and implementing the appropriate security tool set to assess the company’s infrastructure and applications environment. Responsible for implementation and administration of the process that tracks the active status and access level for Administrator, Service, and 3rd party, accounts. Oversee the implementation and administration, in collaboration with Other Information Technology (IT) teams, of security tool sets including network and host based intrusion detection systems, vulnerability analysis scanning tools; Syslog server, wireless network intrusion detection system, anomaly detection and reporting. Conduct enterprise wide vulnerability assessment scheduling, communications, report generation and problem resolution. Consult with IT personnel on findings to identify technical, procedural or people related vulnerabilities. Assist auditors with their vulnerability scanning requirements and validate internal security documentation is relevant and up to date.
Responsible for identifying, investigating, and reporting on various network security events, including: APT hunting, malware investigations, and improper usage. Once an investigation has been performed the Cyber Security Investigations team works with the other information security teams to prevent future incidents, improve the speed of detection, and reduce the time required to perform a thorough investigation.
The Internal Audit Group (IAG) is a worldwide function with 200 team members and offices in 7 countries. We are comprised of assurance and risk professionals with diverse backgrounds including internal controls, consumer compliance, technology, operational risk, financial accounting and banking operations. The IAG organization consists of 14 audit teams aligned with the business units and staff groups along with a professional practice and quality assurance team and a reporting and regulator relations team. All teams report into the General Auditor who reports directly to the American Express Company Audit and Risk Committee and administratively to the Chairman and Chief Executive Officer.