ISACA Harrisburg Chapter - ISACA - Information Systems Audit & Control Association ISACA Harrisburg Chapter - ISACA - Information Systems Audit & Control Association
Main Menu
Vision Statement
Chapter Awards
Career Opportunities
Chapter Board
Send us Feedback
Training Summary
ISACA International
ISACA International Member Benefits
ISACA Harrisburg Event Anncouncements
March Program
Network CyberSecurity
Two-Day Seminar

Please join us for this value priced event covering the much talked about topic of Network CyberSecurity.

Register early to secure your spot.

Date: Thursday, March 12th & Friday, March 13th, 2015
Presenter: Ken Cutler, CISA,CISSP, CISM
Senior Fellow, IT Technical Auditing
CPEs: 16
Location: Valley Green Golf Course
1227 Valley Green Road
Goldsboro, PA. 17319
Local: (717) 938-4200
Member Cost: $195*
Non-Member Cost: $275*
 *Payments via cash,check, and credit card
Registration & Breakfast: 8:00 a.m. - 8:30 a.m.
Program & Lunch: 8:30 a.m. - 4:30 p.m.

Seminar Highlights

CyberSecurity and Control Risks

TCP/IP networking is the lifeblood of modern business applications, but its ancient design and fundamentally insecure network services carries a lot of important risks. As more critical business applications move from centralized legacy systems to distributed systems, the open peer-to-peer architecture concept and poorly tested software leave organizations open to a wide array of CyberSecurity and control risks. In this information-packed workshop, you will review the CyberSecurity and CyberAudit implications of local area network (LAN) and wide-area area network (WAN) infrastructures, uncover the risks in the technologies, and identify cost effective tools for preventing and detecting serious CyberSecurity loopholes.

In this two-day Seminar, Ken will assist attendees in understanding how networks work and where important CyberSecurity control points are located in different network scenarios. He will utilize the OSI and TCP/IP protocol stack models to position different types of CyberSecurity controls and IT audit objectives, and explain key risks and security controls for TCP/IP applications and network appliances. Additionally, Ken will identify tools and techniques for performing useful CyberSecurity risk assessments of network applications of internal and external networks.

About the Speaker

Ken Cutler:

Ken Cutler is a Senior Teaching Fellow with CPEi, specializing in Technical Audits of IT Security and related IT controls. He is the President and Principal Consultant for Ken Cutler & Associates (KCA) InfoSec Assurance, an independent consulting firm delivering a wide array of Information Security and IT Audit management and technical professional services. He is also the Director - Q/ISP (Qualified Information Security Professional) programs for Security University.

An internationally recognized consultant and trainer in the Information Security and IT audit fields, he is certified and has conducted courses for: Certified Information Systems Security Professional (CISSP), Certified Information Security Manager (CISM), Certified Information Systems Auditor (CISA) and CompTIA Security+. In cooperation with Security University, he recently was featured in two full length training videos on CISSP and Security+.

Ken was formerly Vice President of Information Security for MIS Training Institute (MISTI), Chief Information Officer of Moore McCormack Resources, a Fortune 500 company. He also directed companywide IS programs for American Express Travel Related Services, Martin Marietta Data Systems, and Midlantic Banks, Inc. Ken has been a long time active participant in international government and industry security standards initiatives, including: The President's Commission on Critical Infrastructure Protection, Generally Accepted System Security Principles (GSSP), Information Technology Security Evaluation Criteria (ITSEC), US Federal Criteria, and Department of Defense (DOD) Information Assurance Certification Initiative.

Ken is a prolific author on information security topics. His publications include: Commercial International Security Requirements (CISR), a commercial alternative to military security standards for system security design criteria, NIST SP 800-41, "Guidelines on Firewalls and Firewall Policy", of which he was co-author, and Various works on security architecture, disaster recovery planning, wireless security, vulnerability testing, firewalls, single sign-on, and the Payment Card Industry Data Security Standard (PCI DSS). He has been frequently quoted in popular trade publications, including Computerworld, Information Security Magazine, Infoworld, InformationWeek, CIO Bulletin, and Healthcare Information Security Newsletter, and has been interviewed in radio programs My Technology Lawyer and Talk America. Ken received Bachelor of Science degree in Business Administration and Computer Science degree from SUNY Empire State College.

Upcoming Events
Network CyberSecurity
Thursday, March 12th & Friday, March 13th, 2015
Two-Day Seminar
Members: $195Non: $275
CPE's: 16More Info
Previous Events
Verizon Data Breach Report
Cyber Security & Emerging Risks
2014 President's Message
Monthly Online Learning Opportunities: ISACA e-Symposium - Click Here

ISACA-Harrisburg P. O. Box 482, Camp Hill, PA 17001
The Harrisburg Chapter is a not-for-profit organization dedicated to supporting information systems audit, control, and security practitioners through a commitment to education, certification, and professional standards. The Harrisburg Chapter is a not-for-profit organization dedicated to supporting information systems audit, control, and security practitioners through a commitment to education, certification, and professional standards. Our chapter is part of a worldwide association of more than 26,000 professionals in more than 100 countries.

As it is one of the objectives of the ISACA to be a forum for the free expression and interchange of ideas, statements of position or expression of opinion appearing herein are those of the authors, and not by fact of publication those of the Harrisburg Chapter. Likewise, the publication of any advertisement is not to be construed as an endorsement of the product or service being offered unless it is specifically stated in the advertisement.