January 2016 Meeting

Dallas Chapter Monthly Meeting – Joint Meeting with ISACA

Date: January 14, 2016

Location: Renaissance Richardson Hotel

Address: 900 E. Lookout Dr., Richardson, TX 75082

Time: 10:30am to 2:30PM

Early Registration cost (deadline January 11): $35 – Members and $45 – Non Members

Late Registration cost/ Walk-ins: $45 – Members and $55 – Non Members


Title: Latest Trends in Cyber-Security

Speakers: Lucas Morris, Crowe Horwath


  • An understanding of basic security and infrastructure concepts
  • The flow of how many attacks actually happen
  • Some new Cyber-Security frameworks
  • Practical tasks that can be done to help increase your security

Course Description:

Over the past few years, the number of major breaches at organizations and in the news has been increasing rapidly.  Furthermore, Security has become a major topic in both the boardroom and for upper management.  This talk with first provide an overview of security concepts and provide information on some common ways breaches happen.  Second, we will then share some new frameworks that organizations can use to assess their risks and some practical recommendations to improve their security.

Lucas Morris is a senior manager at Crowe Horwath responsible for leading application security assessments and penetration testing services. Lucas focuses on helping clients develop more secure environments through penetration testing and technology reviews. His free time is often spent developing new tools, methodology, and research for the Crowe Center for Cyber Security.

No prerequisites required

CPEs Offered: 1

Lunch Session:

Title: Deficit of Qualified Security and IT Auditing People – Building a Pipeline of Talent

Speakers: John South, Chief Security Officer – Heartland Payment Systems

John South leads the company’s security and IT compliance programs which encompass the protection of sensitive data through risk and threat modeling and compliance with internal as well as industry and regulatory obligations.  South currently serves on the Board of Directors of the Financial Services Information Sharing and Analysis Center and on the Board of Advisors of the Payment Card Industry Security Standards Council.

Prior to joining Heartland in September 2009, South held information security leadership roles for a variety of companies including Convergys and Alcatel-Lucent, where he led Alcatel’s European information security operations.

Outside of the corporate world, South is an adjunct professor at the University of Dallas where he teaches a course on the legal and compliance implications of security.  Additionally, South has been an active participant with the United States Secret Service North Texas Electronic Crimes Task Force. He is also the founding president of the FBI’s North Texas InfraGard Program, and is a member of the ISSA and the ISACA.

South has also been awarded the 2011 Information Security Executive (ISE) of Year Award for the Central United States and the ISE Central Executive of the Decade Award, both by The Executive Network, and was designated a 2012 Computerworld Premier 100 IT Leader.  In 2013, South was designated the CSO of the Year by SC Magazine.  He holds CISSP, CISA and ITIL Service Manager designations.

Objective: Anyone who has tried to hired qualified security personnel realizes that finding good talent is difficult at best, particularly in the DFW area.  The lack of qualified candidates goes beyond the fact that the size and complexity of security has grown tremendously, though that fact is certainly a contributing factor.  This talk will argue that the lack of quality science education in the United States has been a major factor creating this deficit of talent.  In addition, current practices of attracting qualified candidates from other companies has led to some predatory behaviors and driven up the cost of hiring new candidates.  We will explore factors that may remedy this lack of talent and reduce the cost of adding new personnel.

Attendees will learn to:

  • Understand the size of our deficit in qualified security personnel
  • Explore the factors that have led to this deficit and that will increase the problem further
  • Explore remedies and timelines to remediate the problem

No prerequisites required

CPEs Offered: 1

Post Meeting:

Title: Cyber Incident Response

Speakers: Paul Fletcher, Security Evangelist – Alert Logic

Paul Fletcher has over 20 years of experience in information technology and security. Prior to joining Alert Logic, Fletcher advised executive level leadership in the energy, retail, and financial sectors regarding emerging security threats and mitigation strategies. Additionally, he has worked with Fortune 50 organizations, the Department of Defense, and critical infrastructure organizations to implement risk management plans and security solution designs. His other specialties include network security, customer data integrity, application security, forensics investigation, threat intelligence, and incident response. Fletcher holds a Bachelor of Science degree and is a Certified Information Systems Security Professional (CISSP).

No prerequisites required

Objective: As organizations continue to navigate the onslaught of cyber-attacks, a mature and battle-tested incident response program becomes a business imperative. This presentation provides the audience with a strategic approach to incident response, which encompasses more than just having a plan.  The audience will learn how to clearly define roles and responsibilities for the incident response team, including vendors and partners.  Those that attend this session will learn the core components of a cyber incident response plan, along with multiple options and methods to test the strength of their team by practicing before a live cyber-attack happens.

  • Core components of a cyber incident response plan
  • Multiple options and methods to test the strength of their team by practicing before a live cyber-attack happens.

CPEs Offered: 1

Event CPE Details:

  • Number of CPE hours: 3
  • Prerequisites Required: None
  • Advanced Preparation: None
  • Delivery Method: Group-Live
  • You must sign in at the conference to receive CPE credit.
  • An online CPE certificate will be available to print after you have completed the online evaluation survey.

Leave a Reply


Subscribe to Our Newsletter

Register below to receive updates, news, and breaking Chapter developments via periodic e-mail notes.

Event Calendar

IIA Meetings, Conferences, and Seminars

December 2015

    Upcoming Events:

    • No events.

Audit Links

Dallas IIA