Share

Live Webinar January 14th, 2016 1:00 PM – 2:00 PM EST
Duration: 1 Hour Credits: 1 PDU Category C Free
Presented by : O’Reilly

While policy creation and maintenance is a common focus for information security, policies leave a lot of room for implementation and interpretation.

Complying with a good set of security policies does not guarantee that your organization is well-protected against attack. Your organization needs a good operations security team to implement security measures.

In this webcast, Security Professional Ric Messier will identify key points to understanding operations security and the need for a focus on it; details on potential components of a solid operations security plan; understanding the importance of detection and response capabilities in near-real time.

Learn:

  • What Operations Security Is
  • Policy Shortcomings
  • Regulations and Compliance
  • Threats to Operations
  • Operational Protections
  • Detection Capabilities
  • Responding to Threats in Real-Time
  • Feedback Loops

This event is ideal for Technical Security Professionals, Technical Management, Networking Professionals, Systems Administrators, and Executive Management who want a better understanding of the needs of the security team.

Presenter: Ric Messier (LinkedIn profile) GSEC, CEH, CISSP had his first experience on a global network called the BITNET in the early 1980s. Since then he has been hooked on security after unexpectedly exploiting a hole in a mail program on an IBM mainframe. In the 90’s Ric spent several years working on VOIP solutions and quickly became an expert in forensic investigations.  Ric regularly consults to law enforcement on their investigations. Ric lead a team developing a managed intrusion detection system offering at Genuity and provided security expertise to the implementation and use of session border controllers in their VoIP networ . With Ric’s expertise he is the defacto expert in performing penetration tests on products!

PDU Category C (PMBOK 5) documentation details:
Process Groups: Executing
Knowledge Areas: 5 – Scope 11 – Risk

  • 5.2 Collect Requirements
  • 5.3 Define Scope
  • 11.2 Identify Risks
  • 11.5 Plan Risk Responses

As a Category C “Self Directed Learning Activity” remember to document your learning experience and its relationship to project management for your “PDU Audit Trail Folder”

Click to register for:
The Value Of Operations Security

0 0 1.0
Technical Project Management Leadership Strategic & Business Management