Loading Events

« All Events

NTXISSA March 18, 2021 Monthly Meeting

March 18 @ 11:30 am - 1:00 pm

Sponsor :

Presentation

Speakers:

Chris Hollenbeck – CSO – Tanium
Chris provides security leadership and operational insight gained from over 20 years in both public and private sector. Chris came to Tanium after almost 7 years of government service at the U.S. Computer Emergency Readiness Team (US-CERT). At US-CERT he designed and built their incident response capabilities, and restructured the team’s focus toward strategic remediation with a goal of building more resilient organizations. Chris believes that breaking the incident response “Groundhog Day” cycle requires an emphasis on IT hygiene. Prior to joining US-CERT, Chris worked for RSA Security as a security engineer and with AOL/Time Warner on their global incident response team. He started his career as a Unix sys-admin at Binghamton University. When not chasing electrons he prefers to be 20-30 meters under the sea.


George Finney – CSO – SMU
George believes that people are the key to solving our cybersecurity challenges. George has worked in Cybersecurity for nearly 20 years and has helped startups, global telecommunications firms, and nonprofits improve their security posture. As a part of his passion for education, George has taught cybersecurity at Southern Methodist University and is the author of several cybersecurity books including No More Magic Wands: Transformative Cybersecurity Change for Everyone. George has been recognized by Security Magazine as one of their top cybersecurity leaders in 2018 and is a part of the Texas CISO Council, is a member of the Board of Directors for the Palo Alto Networks FUEL User Group, and is an Advisory Board member for SecureWorld. George holds a Juris Doctorate from Southern Methodist University and a Bachelor of Arts from St. John’s College and as well as multiple cybersecurity certifications including the CISSP, CISM, and CIPP.


Justin Early – Security Director – BNSF
Security Information Technology Professional, with experience in various industries from the military, communications, health care, and transportation. Managing, developing, and securing programs and departments with an energetic and results-focused momentum. Successes in securing an integral component of the US infrastructure.


Scot Miller – CISO – Mr. Cooper
Scot Miller, CISSP, CISM, is the Senior Vice President and Chief Information Security Officer for Mr. Cooper Group. He serves on the Dallas CISO Board, has presented on advances in Information Security and Technology Governance at consortiums in Florida, Texas, New York, Arizona, and Connecticut, and has been quoted in national magazines and other industry symposiums. Scot built high performing Security and Operations teams from the ground up, and over the past few years, brought HMS’s Security Incident and Asset Management programs to a new level.

Moderated by Nancy Free – WIS Director – NTXISSA
Chief Compliance and Data Privacy Office, Armor Cloud Security

 

Title: Software Supply Chain Risk Management-A Panel Discussion

Abstract:

With the recent SUNBURST malware impacting large government organizations and corporations this long standing risk is top of mind for everyone.
Join us for an exciting discussion around software supply chain risk management. Our panelists from the Technology, Education, Finance, and Transportation sectors will share their strategies and perspectives on evaluating the risk posed by 3rd party applications, services, and APIs.
They will also share how they prioritize these risks and mitigate against future software supply chain disruptions.
Questions:
  • How do you evaluate the risk of your technology supply chain?
    • Historical CVEs? Vulnerability scans of the applications? Different views of SLAs by technology suppliers?
    • Are vendor self-assessment questionnaires an effective measure of security posture at all?
  • Solarwinds isn’t the first and won’t be the last such attack. When the next big one hits a year from now how will reactions differ?
  • With nearly every business producing internal applications as competitive differentiators – what are strategies to avoid being the broken link in your client’s supply chain?
  • How do you respond to the business when they are highly interested in a high risk application/vendor that you would avoid? (Enable the business without being the “no” CISO)
  • How did you respond to the SolarWinds compromise?

Reservation and Payment Information

Register HERE for this Event

You may reserve your spot by registering via the Zoom link in the email we send out or the Register button on this page before 9:00am the day of the meeting.

Cost:

Members registration: FREE

Details

Date:
March 18
Time:
11:30 am - 1:00 pm
Event Category:

Venue

Webinar
TX United States