TASK – February 2011 Monthly Meeting

Speaker 1: Exploiting Open Source Intelligence on the Internet – Jim Mulholland, Security Researcher

Jim Mulholland will be discussing his decade long experience as an OSINT researcher and analyst for the Society for Internet Research. As part of that discussion he will be briefly explaining how personal circumstance beginning with the FLQ crisis in 1970, the introduction of personal computing and the Internet, through the events of 9/11 and the convergence of networking and society, have fundamentally shaped his interest and involvement in cyber security across a range of issues.

9/11 was a watershed event that motivated him to understand how the Internet offered resources for propagating social and economic instability; however, the Internet could also be used in combating those influences.

He became a core researcher conducting “open source intelligence” on the Internet. Initially successes were focused on quelling the propagation of hate across the Internet.

Using the same techniques, he was able to assist in identifying and defeating operational computer networks supporting terrorist acts and planning – with enough precision to collapse insurgency cells in locations as remote as the suburbs of Baghdad.

You are invited to attend a gathering to explore the experience of our speaker James Mulholland and how with nothing more than social cooperation, a dialup connection, and the availability of open source information can be transformed into a highly leveraged security platform with global consequences.

Speaker 2: How Auditors Certify Systems – Jerry Gaertner, Soberman Technology Assurance

IT staff and external auditors frequently fail to agree on how secure a system or network is, and how “auditable” that security actually is. As more and more regulations require data systems to be audited and certified, there is increasing pressure on in-house IT and security groups to be prepared for auditors. Jerry will be providing an auditors perspective on types of system certification, why and when systems must be certified, the standards and approaches used by an auditor, and some of the gotchas that you need to be aware of to fully prepare for a technology audit.

Jerrard (Jerry) Gaertner is the director of Soberman Technology Assurance Inc., the IT governance, security and digital forensics practice of Soberman LLP. The Canadian Institute of Chartered Accountants has designated him a specialist in information systems auditing and information technology. Jerry is also certified in the Governance of Enterprise IT (CGEIT), and as an Information Systems Security Professional (CISSP), Internal Auditor (CIA), Forensic Investigator (CFI) and Information Technology Professional (ITCP).

Source: task

Posted in Events.