Skip Ribbon Commands
Skip to main content

Title

September 2012 Meeting

Date

9/13/2012 12:20 PM

Topic

A Security Model that Works for You!

Keynote Speaker

Jeri Hale, Director of Architecture, Process Assurance and Security - UT Dallas

Location

Brookhaven Country Club​

Location Detail

​3333 Golfing Green Dr

Farmers Branch, TX 75234


Event Detail

Using role-based roles, permission-based permissions, web services, LDAP, dynamic role rules, and other technologies, UTD accomplished a security model that provides appropriate access and is easily auditable. Even more important, the model enables administrators and role grantors to assign roles and row permissions in ONE PLACE (Enterprise Portal) to grant appropriate access throughout the computing cloud.

Objectives:  Attendees will:
• Learn how this type of model can benefit their organization in role assignment.
• Learn what to look for when auditing roles and permission granting controls.

Presentation Method:  Group-Live
Program Level:  Basic
Category:   Specialized Knowledge & Applications
Prerequisites/Advance Preparation:  None
Recommended CPE Credits:  1.0
Time:  12:20 p.m. – 1:20 p.m.

Come early for the pre-luncheon session, then stay for the post-luncheon session.

Lunch registration begins at 11:15 AM.  Lunch is served at 11:45 AM.

 

Pre-Lucheon Session

Topic:  OWASP Top Ten

Speaker:  Matt Parsons, CISSP, MSM, CWASE - McAfee

Time:  10:30-11:20 AM

Content:  Matt will provide a demonstration of OWASP Top Ten Web Application Security Vulnerabilities with actual hacking examples. His presentation will cover such vulnerabilities as SQL injection and XSS.  Discussion, hands on exercise and question and answer session.

Objectives:
Attendees will take away:
• What are the Top Ten Security Vulnerabilities?
• What are the hackers looking for?
 
Pre-Luncheon registration begins at 10:00 AM. 
 
Presentation Method:  Group-Live
Program Level:  Basic 
Category:   Specialized Knowledge & Applications
Prerequisites/Advance Preparation:  None
Recommended CPE Credits:  1.0
Time:  10:30 a.m. – 11:30 a.m.
Registration Fees: No charge for registered or paid luncheon attendees. Without the luncheon, the fee to attend this session is $30.00.

Post-Luncheon Session

Topic:  Auditing Application Security
Speaker:  Todd McCavit, Director - Protiviti
Time:  1:30-2:30 PM
Content:  Strong application security is one of the most visible and important IT control layers and this presentation will cover key concepts for Auditing Application Security.   We will cover concepts such as administrator access, default accounts, segregation of duties, developer access, documentation, training, security administration processes, and security change management processes.  These concepts will include both the large ERP applications and custom built applications. In addition we will address tools that are available to help increase the coverage and speed of auditing applications.​
 
Objectives:
• What are the key concepts that I need to understand when auditing Application Security?
• What tools are available to increase coverage and speed of auditing?
Presentation Method:  Group-Live
Program Level:  Basic 
Category:   Specialized Knowledge & Applications
Prerequisites/Advance Preparation:  None
Recommended CPE Credits:  1.0
Time:  1:30 p.m. – 2:30 p.m.
Registration Fees: No charge for registered or paid luncheon attendees. Without the luncheon, the fee to attend this session is $30.00.
 
Click the link below to register.
 

Registration Link

http://www.cvent.com/d/rcq20g/

Attachments

Created at 8/12/2012 7:49 PM by Jeff Kromer
Last modified at 9/5/2012 11:42 AM by Jeff Kromer

©ISACA North Texas Chapter 

P.O. Box 25026

Dallas, TX 75225-1026

Chapter Board of Directors

Contact the Board

Chapter Information

Get Involved!

Frequently Asked Questions

Sign In

Website Resources

Event Calendar

Chapter News

Conference Presentations

Job and Internship Announcements

About the Website

Privacy Policy

Careers Administration

Contact the Webmaster

Leadership Share