South Florida’s November 2014 meeting will be on Thursday, November 20th, 2014 at Nova Southeastern University. The meeting will take place in the Carl DeSantis Building from 5:30pm – 7:30pm, followed by their usual networking hour.
Special mention: Elections will be held at November’s monthly meeting!
2014 Data Breach Investigations Report:
• 50 contributing organizations.
• 63,000+ security incidents.
• 1,367 confirmed data breaches.
• 95 countries covered.
Report Finds Nine Basic Patterns Make Up 92 Percent of Security Incidents: No Organization Is Immune From a Data Breach.
Speaker: Michael Marrochello
Michael’s career spans various roles over a twenty year period. His background is in Cyber Security, Hosting, Business Continuity and Disaster Recovery. Michael spent 12 years in the United States Army and started his technology career with Digital Equipment Corporation on the disaster recovery team.
He built his first Data Center with MCI in 1995. Michael has been on the board of Accredited Continuity Planners (South East Florida) as well as the Miami Electronic Crimes Taskforce (Secret Service).
Throughout his career he has designed and architected high-available, secure, resilient systems. This knowledge has been a key to success on the Cyber Insiders team within Verizon Business. Michael started with MCI in 2000 and has been with Verizon for 6 years. His role on the Cyber Insiders team is critical in presenting Advanced Security Solutions to the growing landscaper of Advanced Threats.
Topic: Leveraging Threat Intelligence to Manage your Risks and Threats
The evolving nature of threats is a top security challenge that organizations face, and targeted attacks are on the rise. Cyber-attacks are increasingly more sophisticated and organized. Adversaries specialize in different aspects of an attack and collaborate to achieve their objectives. To combat these sophisticated attackers, enterprises must also collaborate to create a united defense to beat cyber criminals at their own game. Making effective use of cyber threat intelligence is an important component of an organization’s security program. Cyber threat intelligence can be obtained internally and from external sources. It must be collected, analyzed, shared and leveraged. This talk discusses the evolving threat landscape and how IT security organization need to use intelligence to proactively defend themselves.
Speaker: Stan Wisseman
Nova Southeastern University – Carl DeSantis Building
3301 College Avenue
Fort Lauderdale, Florida 33314