2015-2016 Phoenix ISSA Chapter Board of Directors – Nominations
Nominations are open for the Phoenix ISSA Chapter Board of Directors, for 2015-2016
Spring into Q2
The focus of the Q2 meeting was “BYOD.”
Thanks for a great meeting!
The presentations are posted
“Account-Centric Attacks on SaaS Cloud Applications” – Drew Schuil from Skyfence
“Threats to Mobile Devices” – Brett Scott from LiveSquare Security
“Compliance Mandates and BYOD: Audit Ready?” – Ali Pabrai from Ecfirst
“MDM Solutions” – Mike Soto from Fishnet Security
Analyze Information Security related threats and exploits as they pertain to the FTPS environment. Work independently to apply technical skills and expertise to business and/or technical projects. Prepares and reports findings and recommends corrective actions for improvements as necessary. Supports audit and compliance functions upon request. Keep management informed of work activities by providing weekly status reports and/or attending status update meetings.
• Daily; review logs and alerts generated from IT security infrastructure such as network firewalls, web application firewalls (WAF), intrusion detection systems (IDS), user authentication systems, Internet filters, vulnerability scanning systems, email systems, network devices, etc and identify any potential relevant security issues.
• Make key determinations on a case by case basis as to the severity, threat and scope of any given security related event.
• Investigate security issues and resolve in accordance with company policy. Document all activities in a tracking system.
• Make recommendations for enhancements to existing security tools and practices, as well as for new security tools and practices.
• Function as a liaison with staff to determine project requirements, goals, implementation schedules etc. as it relates to security.
• Proactively identify potential threats or breeches of security and research and resolve violations. Assist in developing corresponding security controls and procedures.
• Aid in the maintaining of the Company’s security tools.
• Maintain professional and technical knowledge by attending educational workshops, reviewing professional publications, establishing personal networks and participating in professional societies.
• Assists in the development of security policies, procedures and guidelines.
• Other appropriate duties as assigned.