Membership Meeting 12/19/2018

posted in: Blog, Meetings | 0

ISSA Central MD Chapter Meeting Presentation: 2018-12-19-Meeting-Presentation.pdf

Speaker Presentation: Human Securty Officer

Topic: Creating a Human Security Officer

While everyone acknowledges that users are the top security vulnerability, they rely upon awareness to solve the problem, despite the fact that awareness is far from perfect. To solve this problem in a coordinated way, what is required is not an awareness manager, but a Human Security Officer who is responsible for looking at human vulnerabilities and determining the optimal way to mitigate the vulnerability through a combination of process and technology. As opposed to trying to tell people what not to do, the HSO implements technology that reduces the likelihood of attacks reaching users, and creates business processes that tells users how to do their jobs correctly. Awareness programs are then implemented to inform people how to do their jobs correctly. This presentation will cover the implementation of a Human Security Officer.

Speaker: Ira Winkler, CISSP, President of Secure Mentem

He is considered one of the world’s most influential security professionals, and has been named a “Modern Day James Bond” by the media. He did this by performing espionage simulations, where he physically and technically “broke into” some of the largest companies in the World and investigating crimes against them, and telling them how to cost effectively protect their information and computer infrastructure. He continues to perform these espionage simulations, as well as assisting organizations in developing cost effective security programs. Ira also won the Hall of Fame award from the Information Systems Security Association, as well as several other prestigious industry awards. Most recently, CSO Magazine named Ira a CSO Compass Award winner as The Awareness Crusader.

Ira is also author of the riveting, entertaining, and educational books, Advanced Persistent Security, Spies Among Us and Zen and the Art of Information Security. He is also a columnist for ComputerWorld, and writes for several other industry publications.

Share