Image

Closed lunch session

August 18th

  • Closed lunch session
  • members only
  • open discussion Holiday Inn South – French Quarters

Closed lunch session

May 19, 2017

  • Closed lunch session
  • members only
  • open discussion Holiday Inn South – French Quarters

LRita

LRita

  • Special Agent from FBI providing opening session
  • Infragard will be hosting a table, Lima, Ohio

Meeting March 10, 2017

CYBER ATTACK CONTINUUM TABLETOP EXERCISE

BGSU at LEVIS COMMONS

Cyber Attack Continuum 03_10_2017 Final Report

Flip Chart Photos from each Sector

 

Download report here

Meeting – October 28, 2016 – Presenter

Open Meeting held October 28 at BGSU Levis Commons

Brian Schrock presented Bank Card chip and pin technology

Meeting – August 12 – Members Only

Agenda

Call Meeting to Order August 12, 2016

Presentation to past presidents

SA Scott Halbur, FBI – announcements

Presentation

Closed Forum Discussion lead by SA Scott Halbur

Sharing information – not to disclose any company names in repeating the discussion

Next Meeting info

October 28 – Time TBD – Bank Card chip and pin technology

Toledo InfraGard General 2016 Information

Meeting Schedule

2016 Meetings will be held in March, May, August, and October.

April 14, 2016 – Infragard of Toledo had a table and Special Agent provided the closing session at the LRITA conference

Speaker Meeting Agenda:
8:00-8:15 – Check-in
8:15-8:30 – Introductions, housekeeping, TIMA business
8:30-10:00 – Speaker with Q&A

Close Session – members only Agenda:

11:30-11:45 – check in and order lunch (optional)
11:45-12:00 – Introductions, housekeeping, TIMA business
12:00-1:00 – Discussion lead by Special Agent FBI

Meeting on March 11, 2016 – Open Meeting

Running a Threat Based Vulnerability Management Program

Security organizations have no problem finding vulnerabilities on enterprise networks – the volume of security data is constantly growing. The greater challenge is sifting through this data to determine which of these vulnerabilities pose the greatest risk to the business, and prioritizing remediation efforts. Using available threat data and performing attack path analysis enables a strategic, threat-based approach to vulnerability management and remediation.

Presenter – Ryan Whalen

Ryan is the Ohio Sales Engineer at Tenable Network Security, where he works with customers on leveraging Tenable’s products to improve their security programs.  Ryan has worked in the information security industry for over 10 years and has assisted many enterprises in improving their vulnerability management programs.  Prior to joining Tenable, Ryan was an IT Risk Manager at Nationwide Insurance and a principal security consultant at Jacadis (www.jacadis.com).

About Tenable Network Security

Founded in 2002 Tenable is a recognized leader in Vulnerability Management and Continuous Monitoring.  They are best known for the Nessus scanner – the de facto standard for Vulnerability Assessments — with over 1 million downloads and ranked #3 of the Top 125 Network Security Tools (sectools.org).