» Cyberwatch West event 2/20 6pm Redondo Beach: Don’t be the next TARGET!
Cyberwatch West event 2/20 6pm Redondo Beach: Don’t be the next TARGET!
|February 16, 2014
Posted by CSauthor2
Note: Speaker John Harwell is an IEEE Chair; please see his bio below:
“Hackers have penetrated, taken control of, caused damage to and/or stolen sensitive personal and official information from computer systems at the Departments of Homeland Security, Justice, Defense, State, Labor, Energy, and Commerce; NASA; the Environmental Protection Agency; the Office of Personnel Management; the Federal Reserve; the Commodity Futures Trading Commission; the Food and Drug Administration; the U.S. Copyright Office; and the National Weather Service, according to public reporting.”
Source: The Federal Government’s Track Record on Cybersecurity and Critical Infrastructure, A report prepared by the Minority Staff of the Homeland Security and Governmental Affairs Committee,Sen. Tom Coburn, MD, Ranking Member February 4, 2014
The first meeting of the 2014 Enterprise Program is the month of February and features a presentation on the current hot topic: CYBER SECURITY.
Note the meeting location is at the S Cafe at Northrop-Grumman in Redondo Beach — see below for location link. Note also we continue to use EventBrite for registration and to collect fees. Your payment through EventBrite will be your receipt. If you opt out later and have paid through EventBrite, let us know and we will refund your fee or comp you for a future meeting.
6:00 – 6:30 PM Sign-in, network, refresh yourself, and hear general announcements
6:30 – 7:30 PM Presentation by Speaker
7:30 – 8:00 PM Wrap Up, discussion/debate, and networking
Dennis Wonica & Guido Frassinelli for the Enterprise Program
DON’T BE THE NEXT TARGET!!!!
Eliminate the Bullseye from the Target!
Target Stores were hacked in December 2013 and the account numbers and PINs belonging to some 40 million consumers were compromised. Later, Neiman Marcus and Michaels craft stores announced they were also hijacked. All businesses — micro, mid sized, large, and those doing B2B, B2G or B2C sales — need to be aware of threats to their security in cyber space.
|Original Lock to King Tut’s Tomb
THIS WILL NOT STOP A CYBER BREAK IN
The National Institute of Standards and Technology (NIST) is leading the NICE initiative, including more than 20 federal departments and agencies, to ensure coordination, cooperation, focus, public engagement, technology transfer and sustainability.
Their mission is to bolster formal cybersecurity education programs encompassing kindergarten through 12th grade, higher education and vocational programs, with a focus on the science, technology, engineering and math disciplines to provide a pipeline of skilled workers for the private sector and government.
Many NICE activities are already underway and NIST will highlight these activities, engage various stakeholder groups and create forums for sharing information and leveraging best practices.
Get an overview of the latest info and find out how you or your company can protect both assets and data. Learn about CyberWatch West, primarily sponsored by NSF and what help is available to you through the programs at the Cyber Security Lab.
Go to CyberWatch West here:
John Harwell works as an information security specialist managing the Cyber Security Defense Training Lab for the Computer Science Department at California State University Dominguez Hills (CSUDH) in Carson, CA. He is the staff coach at CSUDH for the National Cyber League for fall 2013. He is volunteer as the Communications Chair of the Executive Committee for the IEEE Coastal Los Angeles Section (CLAS). He is the University Staff Advisor for three student organizations on campus. An Advocate for CyberWatch West, he helps recruit new membership of local High Schools and Colleges in the Southern California Area. John is a veteran who proudly served eight years active duty, of which he spent four in the USAF and then another four in the USMC.
DATE: 20 February 2014
TIME: 6:00 – 8:00 PM
RSVP by: 12:00 Noon 19 February 2014
1 Space Park
Light refreshments served.
- Your business card. Cards will be distributed via e-mail after the meeting.
- Handouts, marketing material about your business for distribution at a table.
- Info about events, meetings of interest to group!
- Your questions!