Capitol of Texas Chapter
August—Securing Your Company During a Merger

Rick Handley, IT Security Manager at Schlumberger, disclosed the steps he took when the company he worked for acquired a smaller company. He approached the acquisition by using the following processes: How to get budget (“never let a potential incident go to waste!”), How to best deploy personnel capabilities and resources and, Being open to…

Configuring Mobile App Security Test Protocols

Sponsored and provided by – NowSecure Learn how to strategize and protect your organization on the mobile front Register Here Mobile is different from web, so testing the security of mobile apps requires a different protocol from that of web apps. Join this half-day training to learn how to build a consistent and scalable mobile app…

Hacker Carpet Bomb

Hacker Carpet Bomb Tuesday, September 18, 2018 11:30 am – 1:00 pm Register Here Andy demonstrates real-world attacks that organizations see daily. Andy has hours of simulated attacks to share and will present as many exploits and attacks as possible during the chapter meeting. Simulated attacks include stealing hashes off the wire with Responder &…

July Recap – Defending the Industrial Cloud

Brett Young, an ICS Security Lead at Leidos, gave a rousing presentation on defending the industrial cloud. He showed us the Purdue Enterprise Reference Architecture model and briefly explained how the IEC/ISA 62443-3-2 standard is used to document attributes for each defined zone and conduit. A copy of his presentation is available here for ISSA…