Presented by David Nardoni and Jef Dye
on Tuesday, May 31, 2011 from 11:30am - 1:30pm.
Coco's Restaurant and Bakery
RSVP by Monday, May 27 5:00pm toCrystal Lucero
David Nardoni, CISSP, GCIH, EnCE
David is a Director at PricewaterhouseCoopers in Los Angeles, California. He has over 14 years of experience in the information security industry, 8 years in practicing computer forensics investigations, and is a Reserve Police Officer. Mr. Nardoni has taught digital forensics at the University of Southern California (USC) and has lectured on other topics including identity theft, wireless security, and Incident Response. Mr. Nardoni has worked numerous computer based investigations ranging from computer intrusions and malware attacks to identify theft, email fraud schemes, and theft of intellectual property. Prior to joining General Dynamics, Mr. Nardoni was a Senior Manager for a Big 4 consulting firm where he managed one of regional digital forensics labs.
Jef Dye, CISSP
Jef is a Lead Forensics Specialist at General Dynamics Advanced Information Systems in Thousand Oaks California. He has over 12 years of experience as a Systems Engineer specializing in enterprise level architecture and information security for government entities. He has traveled globally investigating network security intrusions, payment card data breaches, monetary theft, and extortion cases. He has participated as a team lead for some of the largest and most sophisticated network breach investigations to date. Recently, he has worked data breach investigations for large companies in the areas of payment card processing, retail, financial and the healthcare industries. Prior to joining General Dynamics, Mr. Dye worked for the Ventura County District Attorney's Office specializing in fraud investigations and is a Licensed Private Investigator in the state of California.
The news is seemingly wrought with stories of network and data breaches. Buzzwords abound at a dizzying pace: viruses, malware, and botnets oh my! Then we learn of something a bit more nefarious; the Advanced Persistent Threat (APT). In our discussion, we will explore APT attacks from the incident responder's point of view. We will discuss examples of how the attacks are carried out and, which containment and remediation actions are effective and which are not. The goal is to provide you, the First Responder, with some basic guidelines, tips, and techniques on dealing with APT events.
Checks or Cash
© 2008 Inland Empire Chapter of ISSA