This is a past event

5 people went

Location image of event venue


Presenter - Eric Jeffery, Security Intelligence and Operations Consulting Managing Consultant at IBM.

This discussion covers real-world examples dealing with reactions to cyber security breaches and how tools, processes, and procedures would have either mitigated or completely prevented the attack. You will learn how shifting from the “fire fighter” approach to a methodical, specific and targeted cyber security defense strategy, will change your mindset and daily workflows. Knowing how attacks happen, what they target, why and how empowers organizations into preventing breaches at times while limiting the scope of damage and invasion in other instances.

Participants will gain value in understanding how mainstream attacks occurred, what the organizations impacted failed to do to prevent the breach, and how technology, people and processes can mitigate or prevent such attacks. This information will help you understand where your organization has weaknesses similar to previous victims and can be done to prevent them from happening to you.

See our event page on our website for detailed information on registration, presenter and venue. . $10 fee waived for chapter members.

Membership information:

Please note: Admission to the event is limited to members or other paying attendees that qualify based on their profession within IT and/or CyberSecurity. Attendance is only granted via the chapter website. The chapter reserves the right to deny attendance accordingly.