<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Salina Olmsted | gt.issa.org - an Information System Security Association Chapter</title>
	<atom:link href="https://gt.issa.org/author/solmsted/feed/" rel="self" type="application/rss+xml" />
	<link>https://gt.issa.org</link>
	<description>Traverse City, MI - ISSA Chapter</description>
	<lastBuildDate>Wed, 23 Oct 2024 11:24:39 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	
	<item>
		<title>Happy Hour April 20, 2023</title>
		<link>https://gt.issa.org/happy-hour-april-20/</link>
		
		<dc:creator><![CDATA[Salina Olmsted]]></dc:creator>
		<pubDate>Mon, 03 Apr 2023 23:06:00 +0000</pubDate>
				<category><![CDATA[Past Event]]></category>
		<guid isPermaLink="false">https://gt.issa.org/?p=798</guid>

					<description><![CDATA[Join us for an evening of networking at The Filling Station Brewery sponsored by Abnormal Security. Please register at https://www.eventbrite.com/e/grand-traverse-issa-happy-hour-tickets-591891853467 We look forward to seeing you there.]]></description>
										<content:encoded><![CDATA[
<p>Join us for an evening of networking at The Filling Station Brewery sponsored by Abnormal Security.</p>



<p>Please register at <a href="https://www.eventbrite.com/e/grand-traverse-issa-happy-hour-tickets-591891853467">https://www.eventbrite.com/e/grand-traverse-issa-happy-hour-tickets-591891853467</a></p>



<p>We look forward to seeing you there.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>November 17, 2022 Meeting</title>
		<link>https://gt.issa.org/november-17-meeting/</link>
		
		<dc:creator><![CDATA[Salina Olmsted]]></dc:creator>
		<pubDate>Thu, 20 Oct 2022 01:55:38 +0000</pubDate>
				<category><![CDATA[Past Event]]></category>
		<guid isPermaLink="false">https://gt.issa.org/?p=778</guid>

					<description><![CDATA[Join us for our November Chapter Meeting. Kenneth G. Hartman will be our guest speaker. Register to attend on Eventbrite: https://www.eventbrite.com/e/grand-traverse-issa-november-meeting-tickets-444909725967 ABSTRACT More than ever, companies are using more of the cloud. They are using more different services from each cloud service provider and more cloud service providers than ever before. However, this migration to [&#8230;]]]></description>
										<content:encoded><![CDATA[
<p>Join us for our November Chapter Meeting.  Kenneth G. Hartman will be our guest speaker.  </p>



<p>Register to attend on Eventbrite: <a rel="noreferrer noopener" href="https://www.eventbrite.com/e/grand-traverse-issa-november-meeting-tickets-444909725967" target="_blank">https://www.eventbrite.com/e/grand-traverse-issa-november-meeting-tickets-444909725967</a></p>



<p>ABSTRACT</p>



<p>More than ever, companies are using more of the cloud. They are using more different services from each cloud service provider and more cloud service providers than ever before. However, this migration to the cloud is fraught with peril. The media is full of examples of companies who got it wrong. The default configuration of most cloud services is insecure, primarily to empower exploration by new users. Before an organization can responsibly store sensitive data in the cloud, it must ensure the environment is adequately secured. Can the cloud be made secure enough? Where does one start with this herculean task? I believe that you can, indeed, be more secure in the cloud. This keynote presentation will cover some of the foundational cloud security practices that leading companies have leveraged to provide a very high level of security assurance. We will cover how to get started on this cloud security journey and then how to take it out of the stratosphere</p>



<p>BIO</p>



<p>Kenneth G. Hartman is an independent security consultant based in Traverse City, Michigan. Ken’s motto is “I help my clients earn and maintain the trust of their customers in its products and services.” Toward this end, he consults on a comprehensive program portfolio of technical security initiatives focused on securing client data in the public cloud. Ken has worked for a variety of Cloud Service Providers in Architecture, Engineering, Compliance, and Security Product Management roles.</p>



<p>As a SANS Certified Instructor for SEC488: Cloud Security Essentials and SEC510: Public Cloud Security: AWS, Azure, &amp; GCP, Ken has also been the co-chair of the 2019 SANS Cloud Security Operations Solutions Forum, the 2019 and 2020 SANS Cloud &amp; DevOps Security Summits.</p>



<p>For the previous decade, up until July 2011, he helped to build a start-up company called Visonex into a profitable, nation-wide dialysis-specific electronic medical record using a software-as-a-service (SaaS) business model. In addition to managing the inception and delivery of multiple product innovations, Ken was responsible for all aspects of assuring the security and privacy of both the internal IT systems and the company’s SaaS offerings. Prior to helping launch Visonex, Ken worked as a corporate Electrical Systems Manager for Kraft Foods where he helped to secure the plant floor automation systems.</p>



<p>Ken holds a BS Electrical Engineering from Michigan Technological University and a Master’s Degree in Information Security Engineering from SANS Technology Institute. Ken has earned the CISSP, as well as multiple GIAC security certifications, including the GIAC Security Expert.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Happy Hour June 9, 2022</title>
		<link>https://gt.issa.org/happy-hour-june-9/</link>
		
		<dc:creator><![CDATA[Salina Olmsted]]></dc:creator>
		<pubDate>Wed, 01 Jun 2022 22:00:55 +0000</pubDate>
				<category><![CDATA[Past Event]]></category>
		<guid isPermaLink="false">https://gt.issa.org/?p=767</guid>

					<description><![CDATA[Join us for an evening of networking at The Filling Station Brewery sponsored by Netskope. Please register at events.netskope.com/grandtraverseissahappyhour. We look forward to seeing you there.]]></description>
										<content:encoded><![CDATA[
<p>Join us for an evening of networking at The Filling Station Brewery sponsored by Netskope.</p>



<p>Please register at <a rel="noreferrer noopener" href="http://events.netskope.com/grandtraverseissahappyhour" target="_blank">events.netskope.com/grandtraverseissahappyhour</a>.</p>



<p>We look forward to seeing you there.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>December 16, 2021 Virtual Meeting</title>
		<link>https://gt.issa.org/december-17-virtual-meeting-2/</link>
		
		<dc:creator><![CDATA[Salina Olmsted]]></dc:creator>
		<pubDate>Fri, 03 Dec 2021 21:46:52 +0000</pubDate>
				<category><![CDATA[Past Event]]></category>
		<guid isPermaLink="false">https://gt.issa.org/?p=765</guid>

					<description><![CDATA[Dan Gregory, VP of Systems Engineering at CBI, will be our guest speaker. The topic will be Zero Trust Network Access. Use the link below to register on Eventbrite and access the meeting space. https://www.eventbrite.com/e/grand-traverse-issa-december-meeting-tickets-221122843377]]></description>
										<content:encoded><![CDATA[
<p>Dan Gregory, VP of Systems Engineering at CBI, will be our guest speaker.  The topic will be Zero Trust Network Access.  Use the link below to register on Eventbrite and access the meeting space.</p>



<p><a href="https://www.eventbrite.com/e/grand-traverse-issa-december-meeting-tickets-221122843377">https://www.eventbrite.com/e/grand-traverse-issa-december-meeting-tickets-221122843377</a></p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>January 21st, 2021 Virtual Meeting</title>
		<link>https://gt.issa.org/january-21st-2021-virtual-meeting/</link>
		
		<dc:creator><![CDATA[Salina Olmsted]]></dc:creator>
		<pubDate>Sun, 01 Nov 2020 17:55:53 +0000</pubDate>
				<category><![CDATA[Past Event]]></category>
		<guid isPermaLink="false">https://gt.issa.org/?p=704</guid>

					<description><![CDATA[Mark your calendars for our first meeting of the new year. Rebecca Herold, CEO of The Privacy Professor consultancy; CEO of Privacy &#38; Security Brainiacs, will be our guest speaker. Remember to register on Eventbrite for quick and easy access to the virtual meeting space. Rebecca will present &#8220;Will Your Office Coffeemaker Bring Down Your Business? [&#8230;]]]></description>
										<content:encoded><![CDATA[
<p>Mark your calendars for our first meeting of the new year.  Rebecca Herold, CEO of The Privacy Professor consultancy; CEO of Privacy &amp; Security Brainiacs, will be our guest speaker.   Remember to register on<a href="https://www.eventbrite.com/e/grand-traverse-issa-january-meeting-tickets-135442160147"> Eventbrite</a> for quick and easy access to the virtual meeting space.</p>



<p>Rebecca will present &#8220;<strong><em>Will Your Office Coffeemaker Bring Down Your Business? Preventing IoT Cybersecurity and Privacy Nightmares</em></strong>&#8220;.</p>



<p>New smart technologies are rapidly entering the consumer and business markets, creating new and exciting services, along with new challenges for cybersecurity and privacy professionals. For example, huge amounts of patient data are collected and stored within bio-med devices. Smart toys and digital personal assistants collect, analyze and share data that reveals more about those in associated homes than the home occupants even know about themselves. The smart grid is attaching homes with utilities, smart appliance vendors, PEV owners and others to gain insights into living experiences. Consumers are now walking cash registers, paying for goods by simply being in the vicinity of payment systems. Smart cars and streets transmit data about location, driving habits, and the individuals who are associated. Retailers track the movements of shoppers while digital billboards and mannequins interact with consumers. Drones are live-streaming images within the airspaces where they fly. Vast amounts of data are automatically uploaded to social media sites and cloud servers, where marketing, research and other types of organizations are gobbling it up to data crunch with other data sources to produce vast amounts of new insights into the lives of consumers, patients, along with potential terrorists and crime suspects. Add to this consideration that new smart devices are built to be ubiquitous and unnoticeable.</p>



<p>What are the associated security and privacy risks? Rebecca will offer attendees some cybersecurity and privacy considerations for whenever their organizations ponder the use of IoT devices, as well as when trying to figure out if IoT devices are already within their digital environment. She will also offer some key questions to ask about the use of IoT devices to understand the associated risks, and point to useful resources for identifying requirements for IoT device cybersecurity and privacy risk controls. </p>



<p>Rebecca is founder (2004) and CEO of The Privacy Professor consultancy and CEO of the Privacy Security Brainiacs SaaS services business she founded in 2020 with her son Noah, with over 25 years of systems engineering, information security, privacy &amp; compliance experience. Rebecca has authored 20 books, just finishing the 20th published by CRC Press titled, “Security &amp; Privacy when Working from Home &amp; Travelling.” She has also written dozens of book chapters and hundreds of articles, and has received numerous awards, including being a top 3 Cybersecurity &amp; Privacy Woman Law Professional of 2020, and being named a top female fighting cybercrime in 2019. Rebecca has her own radio/podcast show, Data Security and Privacy with the Privacy Professor on Voice America. Rebecca also serves as an expert witness and has keynoted on 5 continents. Rebecca is a subject matter expert (SME) in the NIST Cybersecurity for IoT Program team, prior to that was a SME member of the NIST Privacy Framework team for 1 ½ years, and led the NIST Smart Grid privacy team for 8 years. Rebecca was Adjunct Professor for the Norwich University MSISA program for 9 years. Rebecca has earned 11 professional certifications (FIP, CDPSE, CISSP, CIPP/US, CIPT, CIPM, CISM, CISA, FLMI, Ponemon Institute Fellow). Rebecca has Masters and Bachelors degrees in Computer Science, Mathematics and Education, and lives in Des Moines, Iowa, USA. </p>



<p>For more information about Rebecca’s career see https://www.linkedin.com/in/rebeccaherold/. rebeccaherold@rebeccaherold.com. www.privacysecuritybrainiacs.com www.privacyguidance.com </p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>December 17, 2020 Virtual Meeting</title>
		<link>https://gt.issa.org/december-17-virtual-meeting/</link>
		
		<dc:creator><![CDATA[Salina Olmsted]]></dc:creator>
		<pubDate>Sun, 04 Oct 2020 20:27:26 +0000</pubDate>
				<category><![CDATA[Past Event]]></category>
		<guid isPermaLink="false">https://gt.issa.org/?p=701</guid>

					<description><![CDATA[Chris Roberts discussed current events and how the Information Security community can do better. ISSA Chapter members can access a recording of the presentation.]]></description>
										<content:encoded><![CDATA[
<p>Chris Roberts discussed current events and how the Information Security community can do better.  ISSA Chapter members can access a recording of the presentation.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>October 22nd, 2020 Virtual Meeting</title>
		<link>https://gt.issa.org/october-22nd-virtual-meeting/</link>
		
		<dc:creator><![CDATA[Salina Olmsted]]></dc:creator>
		<pubDate>Sun, 04 Oct 2020 20:24:38 +0000</pubDate>
				<category><![CDATA[Past Event]]></category>
		<guid isPermaLink="false">https://gt.issa.org/?p=699</guid>

					<description><![CDATA[For our October meeting J. Wolfgang Goerlich, Advisory CISO for Duo Security, presented &#8220;Zero Trust; Past, Present, Future&#8221;. &#8220;Data breaches grab headlines. Good security is steady. While many industries have adopted zero-trust strategies to address challenges of the expanded perimeter, many have been wary of this trend and questioned if it is a fit for [&#8230;]]]></description>
										<content:encoded><![CDATA[
<p>For our October meeting J. Wolfgang Goerlich, Advisory CISO for <a href="https://duo.com/">Duo Security</a>, presented &#8220;Zero Trust; Past, Present, Future&#8221;.</p>



<p>&#8220;Data breaches grab headlines. Good security is steady. While many industries have adopted zero-trust strategies to address challenges of the expanded perimeter, many have been wary of this trend and questioned if it is a fit for environments. As this session will cover, new strategies remain firmly rooted in tried-and-true best practices admins have followed for decades. The principles of logical segmentation, least-permissive access, economy of mechanism, adaptive policy controls, and strong authentication are simply evolving to accommodate new use cases rather than being replaced. Join this session for a grounded discussion of the unique needs and concerns for IT and IT Security teams based on real-world examples, and how concepts like device trust and context-aware access can improve security design without leaving crucial inherited or legacy systems out in the cold.&#8221;</p>



<p>Prior to his role at Duo Security, Wolfgang led IT and IT security in the healthcare and financial services verticals. He has held VP positions at several consulting firms, leading advisory and assessment practices.</p>



<p>You can follow him on YouTube for more insight on the future of information security. </p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>September 16th, 2020 Virtual Meeting</title>
		<link>https://gt.issa.org/september-virtual-meeting/</link>
		
		<dc:creator><![CDATA[Salina Olmsted]]></dc:creator>
		<pubDate>Wed, 12 Aug 2020 22:39:39 +0000</pubDate>
				<category><![CDATA[Past Event]]></category>
		<guid isPermaLink="false">https://gt.issa.org/?p=690</guid>

					<description><![CDATA[Damian Walters, of Damian Walters &#38; Associates, led the Chapter in a thorough discussion of the top 10 security risks at financial institutions, healthcare organizations, and other businesses engaged in sensitive transaction processes, along with other findings from his over 10 years as an IT Auditor, completing 300 IT compliance audits and security assessments. Learn [&#8230;]]]></description>
										<content:encoded><![CDATA[
<p>Damian Walters, of Damian Walters &amp; Associates, led the Chapter in a thorough discussion of the top 10 security risks at financial institutions, healthcare organizations, and other businesses engaged in sensitive transaction processes, along with other findings from his over 10 years as an IT Auditor, completing 300 IT compliance audits and security assessments.</p>



<p>Learn more at <a href="https://www.damianwaltersassociates.com/about">https://www.damianwaltersassociates.com/</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>June 2020 Virtual Two Part Workshop</title>
		<link>https://gt.issa.org/june-2020-virtual-workshop/</link>
		
		<dc:creator><![CDATA[Salina Olmsted]]></dc:creator>
		<pubDate>Tue, 19 May 2020 00:39:47 +0000</pubDate>
				<category><![CDATA[Past Event]]></category>
		<guid isPermaLink="false">https://gt.issa.org/?p=685</guid>

					<description><![CDATA[Michael Wiley, Director of Cybersecurity Services at Richey May Technology Solutions, led the group in a virtual workshop focused on using Wireshark for Incident Response and Threat Hunting. He also has made the content available on his YouTube channel for those who were unable to attend in person. Check out Michael&#8217;s bio at https://themikewylie.com.]]></description>
										<content:encoded><![CDATA[
<p>Michael Wiley, Director of Cybersecurity Services at Richey May Technology Solutions, led the group in a virtual workshop focused on using Wireshark for Incident Response and Threat Hunting.  He also has made the content available on his YouTube channel for those who were unable to attend in person.</p>



<p>Check out Michael&#8217;s bio at <a rel="noreferrer noopener" href="https://themikewylie.com" target="_blank">https://themikewylie.com</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>May 2020 Virtual Meeting</title>
		<link>https://gt.issa.org/may-2020-virtual-meeting/</link>
		
		<dc:creator><![CDATA[Salina Olmsted]]></dc:creator>
		<pubDate>Mon, 04 May 2020 21:20:51 +0000</pubDate>
				<category><![CDATA[Past Event]]></category>
		<guid isPermaLink="false">https://gt.issa.org/?p=669</guid>

					<description><![CDATA[Join us Thursday, May 7th for a virtual Chapter meeting. The group will host a discussion about the &#8220;new normal&#8221; and present tips on how to protect a dispersed, remote workforce. Contact Chapter Officers for meeting details.]]></description>
										<content:encoded><![CDATA[
<p>Join us Thursday, May 7th for a virtual Chapter meeting.  The group will  host a discussion about the &#8220;new normal&#8221; and present tips on how to protect a dispersed, remote workforce.  Contact Chapter Officers for meeting details.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
