ºÝºÝߣshows by User: NEOISF / http://www.slideshare.net/images/logo.gif ºÝºÝߣshows by User: NEOISF / Tue, 20 Jul 2010 21:13:05 GMT ºÝºÝߣShare feed for ºÝºÝߣshows by User: NEOISF Whose afraid of the big bad wolf /slideshow/whose-afraid-of-the-big-bad-wolf-4800286/4800286 whoseafraidofthebigbadwolf-100720211315-phpapp01
Let’s see if you have a picture in your head of auditors. Do see you them, sitting there in the darkness, with a maniacal look on their faces. They pour over your documentation and configuration files just hoping to find the red meat. If there is anything juicy they will find it and feed off it at your expense. Is this the image you have of auditors? Perhaps you were burned during an audit, or just didn’t have a very good experience at the auditor’s hands. With a bit of explanation, your next audit doesn’t have to be so stressful and adversarial. Maybe, just maybe, you can walk away with some value to help improve what you do that you hadn’t thought of before. Starting from the beginning, we will walk through why IT auditors exist and what role they play in the organizations risk management process. Since we all can relate to risk, maybe we can find the common ground and start to derive value from what auditors provide. Given the right amount of attention and care, organizations can ultimately benefit from IT and Audit working together. Plus you will sleep better at night knowing the bogeyman is just a myth. Speaker Bio Jeff Kirsch is an IT auditor by day and ghostnomad, an infosec geek alter ego, every chance he can get. Always trying to learn new things drives him to find better ways to help others learn about technology. His passion for technology also drives him to help those in technology understand auditors and the audit process.]]>

Let’s see if you have a picture in your head of auditors. Do see you them, sitting there in the darkness, with a maniacal look on their faces. They pour over your documentation and configuration files just hoping to find the red meat. If there is anything juicy they will find it and feed off it at your expense. Is this the image you have of auditors? Perhaps you were burned during an audit, or just didn’t have a very good experience at the auditor’s hands. With a bit of explanation, your next audit doesn’t have to be so stressful and adversarial. Maybe, just maybe, you can walk away with some value to help improve what you do that you hadn’t thought of before. Starting from the beginning, we will walk through why IT auditors exist and what role they play in the organizations risk management process. Since we all can relate to risk, maybe we can find the common ground and start to derive value from what auditors provide. Given the right amount of attention and care, organizations can ultimately benefit from IT and Audit working together. Plus you will sleep better at night knowing the bogeyman is just a myth. Speaker Bio Jeff Kirsch is an IT auditor by day and ghostnomad, an infosec geek alter ego, every chance he can get. Always trying to learn new things drives him to find better ways to help others learn about technology. His passion for technology also drives him to help those in technology understand auditors and the audit process.]]>
Tue, 20 Jul 2010 21:13:05 GMT /slideshow/whose-afraid-of-the-big-bad-wolf-4800286/4800286 NEOISF@slideshare.net(NEOISF) Whose afraid of the big bad wolf NEOISF Let’s see if you have a picture in your head of auditors. Do see you them, sitting there in the darkness, with a maniacal look on their faces. They pour over your documentation and configuration files just hoping to find the red meat. If there is anything juicy they will find it and feed off it at your expense. Is this the image you have of auditors? Perhaps you were burned during an audit, or just didn’t have a very good experience at the auditor’s hands. With a bit of explanation, your next audit doesn’t have to be so stressful and adversarial. Maybe, just maybe, you can walk away with some value to help improve what you do that you hadn’t thought of before. Starting from the beginning, we will walk through why IT auditors exist and what role they play in the organizations risk management process. Since we all can relate to risk, maybe we can find the common ground and start to derive value from what auditors provide. Given the right amount of attention and care, organizations can ultimately benefit from IT and Audit working together. Plus you will sleep better at night knowing the bogeyman is just a myth. Speaker Bio Jeff Kirsch is an IT auditor by day and ghostnomad, an infosec geek alter ego, every chance he can get. Always trying to learn new things drives him to find better ways to help others learn about technology. His passion for technology also drives him to help those in technology understand auditors and the audit process. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/whoseafraidofthebigbadwolf-100720211315-phpapp01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Let’s see if you have a picture in your head of auditors. Do see you them, sitting there in the darkness, with a maniacal look on their faces. They pour over your documentation and configuration files just hoping to find the red meat. If there is anything juicy they will find it and feed off it at your expense. Is this the image you have of auditors? Perhaps you were burned during an audit, or just didn’t have a very good experience at the auditor’s hands. With a bit of explanation, your next audit doesn’t have to be so stressful and adversarial. Maybe, just maybe, you can walk away with some value to help improve what you do that you hadn’t thought of before. Starting from the beginning, we will walk through why IT auditors exist and what role they play in the organizations risk management process. Since we all can relate to risk, maybe we can find the common ground and start to derive value from what auditors provide. Given the right amount of attention and care, organizations can ultimately benefit from IT and Audit working together. Plus you will sleep better at night knowing the bogeyman is just a myth. Speaker Bio Jeff Kirsch is an IT auditor by day and ghostnomad, an infosec geek alter ego, every chance he can get. Always trying to learn new things drives him to find better ways to help others learn about technology. His passion for technology also drives him to help those in technology understand auditors and the audit process.
Whose afraid of the big bad wolf from Northeast Ohio Information Security Forum
]]>
851 2 https://cdn.slidesharecdn.com/ss_thumbnails/whoseafraidofthebigbadwolf-100720211315-phpapp01-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Attacking and Securing WPA Enterprise Networks /slideshow/attacking-and-securing-wpa-enterpris/3770328 neoinfosecforum-attackingandsecuringwpaenterprisenetworks-100418204242-phpapp01
This presentation covers different attacks that can be leveraged against wireless networks using Enterprise (802.1x) authentication. Attendees will learn about and see demonstrations of these attacks, many of which can be used to reveal the credentials used to join the wireless network. The presentation concludes with recommendations on how to defend against these attacks. Matt Neely (CISSP, CTGA, GCIH and GCWN) is the Profiling Team Manager at SecureState, a Cleveland Ohio based security consulting company. At SecureState, Matt and his team perform traditional penetration tests, physical penetration tests, web application security reviews and wireless security assessments. His research interests include the convergence of physical and logical security, cryptography and all things wireless. Matt is also a host on the Security Justice podcast.]]>

This presentation covers different attacks that can be leveraged against wireless networks using Enterprise (802.1x) authentication. Attendees will learn about and see demonstrations of these attacks, many of which can be used to reveal the credentials used to join the wireless network. The presentation concludes with recommendations on how to defend against these attacks. Matt Neely (CISSP, CTGA, GCIH and GCWN) is the Profiling Team Manager at SecureState, a Cleveland Ohio based security consulting company. At SecureState, Matt and his team perform traditional penetration tests, physical penetration tests, web application security reviews and wireless security assessments. His research interests include the convergence of physical and logical security, cryptography and all things wireless. Matt is also a host on the Security Justice podcast.]]>
Sun, 18 Apr 2010 20:42:29 GMT /slideshow/attacking-and-securing-wpa-enterpris/3770328 NEOISF@slideshare.net(NEOISF) Attacking and Securing WPA Enterprise Networks NEOISF This presentation covers different attacks that can be leveraged against wireless networks using Enterprise (802.1x) authentication. Attendees will learn about and see demonstrations of these attacks, many of which can be used to reveal the credentials used to join the wireless network. The presentation concludes with recommendations on how to defend against these attacks. Matt Neely (CISSP, CTGA, GCIH and GCWN) is the Profiling Team Manager at SecureState, a Cleveland Ohio based security consulting company. At SecureState, Matt and his team perform traditional penetration tests, physical penetration tests, web application security reviews and wireless security assessments. His research interests include the convergence of physical and logical security, cryptography and all things wireless. Matt is also a host on the Security Justice podcast. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/neoinfosecforum-attackingandsecuringwpaenterprisenetworks-100418204242-phpapp01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> This presentation covers different attacks that can be leveraged against wireless networks using Enterprise (802.1x) authentication. Attendees will learn about and see demonstrations of these attacks, many of which can be used to reveal the credentials used to join the wireless network. The presentation concludes with recommendations on how to defend against these attacks. Matt Neely (CISSP, CTGA, GCIH and GCWN) is the Profiling Team Manager at SecureState, a Cleveland Ohio based security consulting company. At SecureState, Matt and his team perform traditional penetration tests, physical penetration tests, web application security reviews and wireless security assessments. His research interests include the convergence of physical and logical security, cryptography and all things wireless. Matt is also a host on the Security Justice podcast.
Attacking and Securing WPA Enterprise Networks from Northeast Ohio Information Security Forum
]]>
20704 7 https://cdn.slidesharecdn.com/ss_thumbnails/neoinfosecforum-attackingandsecuringwpaenterprisenetworks-100418204242-phpapp01-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
How Google Was Pwned: In-Depth Look into the Aurora Attacks /NEOISF/how-google-was-pwned-indepth-look-into-the-aurora-attacks howgooglewaspwned-100309212115-phpapp02
Presented at the February 2010 meeting of the Northeast Ohio Information Security Forum by Josh Kelley, Enterprise Security Analyst for a Fortune 1000 company.]]>

Presented at the February 2010 meeting of the Northeast Ohio Information Security Forum by Josh Kelley, Enterprise Security Analyst for a Fortune 1000 company.]]>
Tue, 09 Mar 2010 21:21:10 GMT /NEOISF/how-google-was-pwned-indepth-look-into-the-aurora-attacks NEOISF@slideshare.net(NEOISF) How Google Was Pwned: In-Depth Look into the Aurora Attacks NEOISF Presented at the February 2010 meeting of the Northeast Ohio Information Security Forum by Josh Kelley, Enterprise Security Analyst for a Fortune 1000 company. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/howgooglewaspwned-100309212115-phpapp02-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Presented at the February 2010 meeting of the Northeast Ohio Information Security Forum by Josh Kelley, Enterprise Security Analyst for a Fortune 1000 company.
How Google Was Pwned: In-Depth Look into the Aurora Attacks from Northeast Ohio Information Security Forum
]]>
1130 4 https://cdn.slidesharecdn.com/ss_thumbnails/howgooglewaspwned-100309212115-phpapp02-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Dont Get Caught With Your Layers Down /slideshow/dont-get-caught-with-your-layers-down/3229275 dontgetcaughtwithyourlayersdown-100219194331-phpapp01
From our February 2010 meeting. Given by Steve Jaworski and Bryan Young. Implementing security features already included with your Layer 2 and 3 infrastructures can provide your organization additional protection. This presentation will focus on features your vendors should or should be providing you. Topics covered in this presentation include Access-lists, Arp Inspection, DHCP Snooping, 802.1x, private VLANS, MAC Address security, routing security, and other various topics. Tools to test or attack each of these topics will also be discussed.]]>

From our February 2010 meeting. Given by Steve Jaworski and Bryan Young. Implementing security features already included with your Layer 2 and 3 infrastructures can provide your organization additional protection. This presentation will focus on features your vendors should or should be providing you. Topics covered in this presentation include Access-lists, Arp Inspection, DHCP Snooping, 802.1x, private VLANS, MAC Address security, routing security, and other various topics. Tools to test or attack each of these topics will also be discussed.]]>
Fri, 19 Feb 2010 19:43:21 GMT /slideshow/dont-get-caught-with-your-layers-down/3229275 NEOISF@slideshare.net(NEOISF) Dont Get Caught With Your Layers Down NEOISF From our February 2010 meeting. Given by Steve Jaworski and Bryan Young. Implementing security features already included with your Layer 2 and 3 infrastructures can provide your organization additional protection. This presentation will focus on features your vendors should or should be providing you. Topics covered in this presentation include Access-lists, Arp Inspection, DHCP Snooping, 802.1x, private VLANS, MAC Address security, routing security, and other various topics. Tools to test or attack each of these topics will also be discussed. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/dontgetcaughtwithyourlayersdown-100219194331-phpapp01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> From our February 2010 meeting. Given by Steve Jaworski and Bryan Young. Implementing security features already included with your Layer 2 and 3 infrastructures can provide your organization additional protection. This presentation will focus on features your vendors should or should be providing you. Topics covered in this presentation include Access-lists, Arp Inspection, DHCP Snooping, 802.1x, private VLANS, MAC Address security, routing security, and other various topics. Tools to test or attack each of these topics will also be discussed.
Dont Get Caught With Your Layers Down from Northeast Ohio Information Security Forum
]]>
809 4 https://cdn.slidesharecdn.com/ss_thumbnails/dontgetcaughtwithyourlayersdown-100219194331-phpapp01-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
https://cdn.slidesharecdn.com/profile-photo-NEOISF-48x48.jpg?cb=1522895546 NEOISF is a professional organization for people interested in information security. Members are in the information security, networking, system administration/engineering, and IT industry who are either involved in or interested in the information security field. http://www.neoisf.org/ https://cdn.slidesharecdn.com/ss_thumbnails/whoseafraidofthebigbadwolf-100720211315-phpapp01-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/whose-afraid-of-the-big-bad-wolf-4800286/4800286 Whose afraid of the bi... https://cdn.slidesharecdn.com/ss_thumbnails/neoinfosecforum-attackingandsecuringwpaenterprisenetworks-100418204242-phpapp01-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/attacking-and-securing-wpa-enterpris/3770328 Attacking and Securing... https://cdn.slidesharecdn.com/ss_thumbnails/howgooglewaspwned-100309212115-phpapp02-thumbnail.jpg?width=320&height=320&fit=bounds NEOISF/how-google-was-pwned-indepth-look-into-the-aurora-attacks How Google Was Pwned: ...