**2016 Pittsburgh Tech-Security Conference**
Place: DoubleTree by Hilton Hotel & Suites Pittsburgh- Downtown
1 Bigelow Square
Pittsburgh, PA 15219
Date: Thursday, August 4th, 2016
Click on the following link to register for your free VIP pass:
- VIP passes include Breakfast, Lunch, Conference materials and Entrance into conference sessions and exhibit areas.
- This conference qualifies for CPE credits and Certificates of Attendance.
- Gift Cards, iPads, Kindles and many other door prizes and give aways.
- Featuring (11) IT Security speakers and over 30 exhibits!!
For full conference agenda click on:
Or call Stephanie Lange at 636-778-9495 for more information.
Managing cybersecurity threats in today’s enterprise is a complex undertaking. Cyber threats are evolving at a rapid pace and they require a different approach than we have utilized in the past to neutralize traditional threats. Unfortunately, there is no “one size fits all” solution when it comes to cybersecurity. However, there are excellent frameworks that can be utilized to manage cybersecurity activities and reducing organizational risk. The NIST Cybersecurity Framework has become quite useful for many organizations as they look to mature their cybersecurity practice and combat the ever evolving threats that we face.
In 2014, NIST published the Framework for Improving Critical Infrastructure Cybersecurity, commonly referred to as the NIST Cybersecurity Framework or just the Framework. The Framework consisted of standards, methodologies, best practices, policies, and procedures that align business goals, policy, and technological approaches improve cybersecurity capabilities within an organization.
The Framework is broken into three sections: the Core, the Implementation Tiers, and the Profiles. The core includes categories and subcategories that define controls and activities across five functional areas: Identify, Detect, Protect, Respond, and Recover. The Implementation Tiers helps the organization evaluate their cybersecurity practices against the characteristics listed in the core functions. Finally, the Profiles enables an organization to understand their current capabilities and define their optimal capability state based on their business goals and objectives.
In December of 2015, NIST received RFI responses from participants within the United States and abroad. The participating respondents represented a variety of industries covering both the public and private sectors. The RFI was followed up with a Working Group in April of 2016. Participants in the RFI and Working Group provided feedback on how they utilized the Framework and where they would like to see the Framework further developed. NIST also received praise for how it has collaborated with the private sector in the creation of the Framework and in the future evolution of the Framework.
As a Workshop participant myself, I was absolutely surprised by the variety of participants. I was expecting participants from the Federal government, but the level of engagement across so many different sectors of industry was a pleasant surprise. As a supporter of the Framework since its inception, I see it as a valuable tool for any organization.
At ISM, the Framework is foundational to our internal cybersecurity practice and has become a valuable tool that we utilize to support our customers. The Framework Core provides a set of cybersecurity activities, desired outcomes based on organizational goals and priorities and applicable references to other frameworks, guidelines, and standards that are commonly utilized across the public and private sectors. There is plenty of room for improvement, but I am confident that the partnership between NIST and the private and public sector will continue to produce a valuable tool that can be utilized to improve organizations with mature cybersecurity practices or as a foundation for organizations looking to build a mature cybersecurity practice.
If you would like to learn more about the NIST Cybersecurity Framework or the recent Workshop findings, please use the links below. Should you be interested in learning more about how ISM can help your organization, you can use the Contact Us link in the upper right hand corner of the page.
Workshop Findings: http://www.nist.gov/cyberframework/upload/Workshop-Summary-2016.pdf
NIST Cybersecurity Framework: http://www.nist.gov/cyberframework/
ISM Named Intel Security’s 2016 Small Commercial US Partner of the Year
The Award Highlights ISM’s Outstanding Engagement and Commitment to its Alliance with Intel Security and Customer Outcomes
BOCA RATON, Fla.—May 11, 2016 — International Systems Marketing, Inc. (ISM), announced today that it was named 2016 Small Commercial US Partner of the Year by Intel Security. Intel Security revealed the winners, recognized for 2015 performance excellence in global and local markets, marketing innovation and community service, at its Distinguished Partner Awards reception held during its Americas Partner Summit. The awarded companies were selected for their embodiment of the three foundational pillars of the Intel Security Partner Program: strategic engagement, mutual growth and profitability and driving better customer security outcomes.
The Annual Distinguished Partner Awards honors exemplary channel partners that invest in Intel Security solutions, deliver outstanding results, and are aligned with Intel Security’s vision and strategy to provide integrated security technology and services that simplify the Threat Defense Lifecycle. Other areas of consideration include sales, growth, new business performance numbers, investment in enablement activities and participation in events.
“We recognize ISM as a significant member of our partner network. They bring unique value to Intel Security and we’re proud to see them reach such high performance,” said Richard Steranka, senior vice president of global channel operations at Intel Security. “Working together, ISM’s customers experience faster deployment times, reduced costs, easy-to-use management tools, greater protection, and improved compliance, all while leveraging the threat defense lifecycle.”
ISM and other Intel Security’s partners are promoting and accelerating the adoption of security technology and services, critical to protecting consumers, companies and organizations from ever-evolving cyberthreats.
“We are honored to be recognized by Intel Security, a strategic partner of over 10 years, for the impact we have as a dedicated technical resource and strategist for Intel Security,” said Chris Young, President at ISM. “This was truly a team win for both companies and we look forward to continuing to build upon our success and relationship with Intel Security to provide continued value to our customers.”
In total, Intel Security recognized 19 companies for achievements across various verticals and regions. All partners were evaluated making this a prestigious recognition.
ISM is a group of IT security-minded professionals dedicated to helping our customers optimize their security architecture to achieve dynamic and proactive cybersecurity through in-depth business and product knowledge, high quality service deliverables and reliable customer service. As a small business, we have been supporting federal and commercial organizations with their technology needs for over 35 years and have focused on IT security for the past 25 years.
ISM is headquartered in Rockville, Maryland and we have had the privilege of working with and supporting our customers since 1971.
“Our Business Is Securing Your Business”
Pittsburgh, PA – ISM is excited to be hosting, along with our partner Intel Security, an interactive session on Tuesday, May 17, 2016 with guest speaker Justin Forbes from CERT Division at the Software Engineering Institute (SEI) about ‘Operationalizing Threat Intelligence.’ See below for more information and to sign up:
|If you are having trouble reading this email, read the online version.|
ISM is proud to be a sponsor of the 2016 FireEye Government Forum.
Register today for the FireEye Government Forum on April 12th. Hear Opening Keynote Speaker David DeWalt, COB and CEO, FireEye share insights for developing a resilient, adaptive, cyber defense strategy for the government enterprise.
Registration is FREE for government and military personnel.
TUESDAY, APRIL 12, 2016
7:30AM – 3:30PM
1331 Pennsylvania Ave NW
Washington, DC 20004
Chairman of the Board and
Chief Executive Officer, FireEye
DeWalt has served as FireEye Chief Executive Officer since November 2012 and as Board Chairman since May 2012. Before joining FireEye, he was President, Chief Executive Officer, and Director of McAfee, Inc. from April 2007 until February 2011, when McAfee was acquired by Intel Corporation.
Registration is FREE for government and military personnel.
Join ISM at the 2015 ISSA Mid-Atlantic Information Security Conference on Tuesday, September 1, 2015.
Preparing for the Adversary
September 1, 2015 | NIST, 100 Bureau Drive, Gaithersburg, Md.
The Mid-Atlantic ISSA chapters are excited to announce the Mid-Atlantic Information Security Conference, located onsite at the National Institute of Standards and Technology (NIST) facility in Gaithersburg, MD, on September 1, 2015. With a keynote address from Dr. Ron Ross, the conference will feature a variety of presentations and cutting-edge training opportunities, including hands-on demonstrations and workshops.
Why You Should Attend:
- Hear experts in the information security field discuss some of the latest topics in tactics and techniques.
- Attend workshops to get hands on experience with the latest tools and exploits.
- Earn up to 7 CPE hours.
- Enter the Capture the Flag event for prizes.
For questions related to the event, please contact Scott Binder at ScottBinder@issa-dc.org.