October 2011 is National Cyber Security Awareness Month & National Stop Bullying Month
The month of October has been designated as National Cyber Security Awareness Month and National Stop Bullying Month. SecurityOrb.com plans to publish security tips on how to protect yourself, your information, and your computing devices as well as provide useful information on how to deal with cyber bullying.
We will take questions on both our Facebook and Twitter pages and answer them for you.
National Cyber Security Awareness Month
- Personal Security on Social Networking Sites
- Smart Phone Security
- Best Practices for Creating a Password
National Stop Bullying Month
DerbyCon 2011 Review
DerbyCon is a new hacker’s conference held this past weekend in Louisville, Kentucky. Hans Bosch (@hans_bosch ) of NY, a SecurityOrb.com (@SecurityOrb) contributor had the opportunity to attend and shared some positive notes with me about the conference.
Hans stated, “The hacker space was the spot early on Friday night with fire breathing ponies igniting the alley way while attendees shared greetings and stories since their
last encounter”. Hans also discussed the many informative presentations he attended at the conference but stated, “One of my favorite talks was presented by int0x80 (of Dualcore)”. int0x80’s presentation titled, “Anti-Forensics for the Louise” reviewed clever techniques to protect your OS from forensic analysis, these were not just discussions about encrypting your hard drive, but simple yet ingenious ways of preventing unauthorized access to your device. For example, one can remove the kernel from the hard drive, booting from a USB device and modifying the MBR to clean house when not booted correctly.
Hans also stated, the conference was held in a convenient location that offered other types of attractions, such as bars, restaurants, shop and even bowling at 4th Street Live. In addition to the above-mentioned venues, gambling on the casino boat was nice as well.
A Twitter post today also provided information the organizers of DebryCon raised $13,617.00 for Johnny Long’s organization, HackersforCharity which places computer classrooms in some of the world’s poorest countries in Africa.
In fact, I reviewed many positive tweets on Twitter over the weekend as well as today about the conference, presentations, presenters and new friendships. A tweet by @dualcoremusic, who provided entertainment for the Rapid 7 after-hours party, stated, “@Derbycon is a must-attend next year.” and I certainly plan too…
Congratulations to the DerbyCon organizers, staff and attendees for a successful event…
Join SANS’ Lance Spitzner for a free lunch-n-learn, downtown Chicago Tue, 27 Sept. on how to secure the HumanOS.
Lunch & Learn Presentation:
Securing The Human
Speaker: Lance Spitzner
Tuesday, September 27
12:00pm – 1:00pm
Organizations have traditionally invested most of their security in technology, with little e!ort in protecting their employees. As a result, many attackers today target the weakest link – the human. Awareness, not just technology, has become key to reducing risk and remaining compliant. This high-level talk designed for management explains why humans are so vulnerable, how they are being actively exploited, and what organizations can do about it.
Hands-on immersion training programs, including:
Security Essentials Bootcamp Style
Hacker Techniques, Exploits, and Incident Handling
Foundations of Auditing Information Systems
Network Forensics
Implementing and Auditing the
Twenty Critical Security Controls – In Depth
Project Management and Effective Communications
for Security Professionals and Managers
GIAC
You are invited to a special
FREE
Lunch & Learn
presentation.
LO C AT ION :
JW Marriott Chicago
151 West Adams
Chicago
DATE :
Tuesday, September 27
12 Noon – 1:00pm
R S V P :
Please RSVP by September 26
to George King at
Check out the flyer here
Digital Forensics and E-Discovery – Free Seminar
Join government and industry experts at the Digital Forensics and E-Discovery Federal Executive Briefing, tomorrow at the Willard Hotel in Washington D.C.
Hear real-world examples of how digital forensics tools are being used to support cybercrime investigations while meeting requirements for evidence protection and chain of custody.
Visit the Event Website for Additional Information
| Session 1 – Opening Keynote Applying Digital Forensics to Fight Cybercrime |
|
![]() |
Martin Novak Program Manager, National Institute of Justice, Office of Justice Programs, Department of Justice |
| Session 2 – Case Study How to Bridge E-Discovery and Forensics – Agency Experience |
|
![]() |
Jeremy Christianson Computer Forensics Manager, Legal Technology Services, U.S. Commodity Futures Trading Commission |
![]() |
Chad Papenfuss Litigation Support Manager, Bureau of Consumer Protection, Federal Trade Commission |
| Session 3 – Technology Brief Digital Media Evidence and Integrity |
|
![]() |
John Penn Senior Computer Scientist, Adobe |
| Session 4 – Technology Insights Discussion Digital Forensics and Incident Response |
|
![]() |
Michael Robinson Senior Digital Forensic Analyst, Harris |
NOTE: This event is open to military and government personnel, government contractors, and systems integrators only. Due to the request of our sponsor, we reserve the right to decline any registration.
Register Here
EC-Council Announces New CISO Certification: C|CISO
C|CISO is ideal for those who:
aspire to attain the highest regarded title within the information security profession – CISO,
already serve as an official CISO, or perform CISO functions in their organization without the official title.
The C|CISO designation is the recognition of your knowledge and achievements, and will award you with professional acknowledgement and propel your career.
C|CISO benefits
Independent validation of competency and experience in crucial CISO disciplines
Senior executive level business knowledge benchmark
Peer and Industry level recognition
Increased value of your information security role
Increased credibility, confidence and promotability
Access to the C|CISO community.The C|CISO certification recognizes an individual’s accumulated skills in developing and executing an information security management strategy in alignment with organizational goals.
The C|CISO equips information security leaders with the most effective toolset to defend organizations from cyber attacks.
C|CISOs are certified in the following domains:
Governance (Policy, Legal & Compliance)
IS Management Controls and Auditing Management (Projects, Technology & Operations)
Management – Projects and Operations
Information Security Core Competencies
Strategic Planning & Finance
Achieving a C|CISO Certification will differentiate you from others in the competitive ranks of senior Information Security Professionals. C|CISO will provide your employers with the assurance that as a C|CISO certified executive leader, you possess the proven knowledge and experience to plan and oversee information security for the entire corporation.
C|CISO is a unique designation that has been designed in cooperation with industry leaders to identify a solid blend of functional and executive IT Job Roles and skill requirements.
For more information on the C|CISO check here





