That Is Where the Data Is!
- David Belangia- Master's Candidate
- Monday, January 19th, 8:15pm - 8:55pm
The place to get sensitive information relating to people who have access to our country's most sensitive information is the Office of Personnel Management's e-QIP Databases. These repositories provide a single location that contains the complete history and all associated pertinent information for anyone with a security clearance. There was a cascading failure of controls that led to the compromise identified by the New York Times in July 2014. Attackers only require a single vulnerability to obtain a foothold from which to compromise the environment. The concept of defense-in-depth is especially important for protecting sensitive information. Encryption of data at rest and in transit would have rendered the compromise useless by eliminating the ability of the attacker to use the information. All controls could have failed but the reward for the attacker would have been useless with a proper implementation of Control 17: Data Loss Prevention.
Bio: Mr. Belangia has over 25 years of experience in all aspects of information technology. His skills include a technical understanding of the software development life cycle, network design and maintenance, server and desktop support, project management, and cyber security. He has extensive knowledge and experience with Six Sigma, CMMI, FISMA, FIPS, NIST, CNSSI, ITIL, ISO standards and DoE Orders and Manuals, USGCB, STIG, TEMPEST, PMI, and NNSA Administrative Policy (NAP). He has managed and implemented programs including: developing policies, procedures, and standards; providing project management oversight; and implementing processes to support requirements and best business practices. He has extensive experience hosting and responding to audits and assessments. He is a trained Six Sigma Yellow Belt and Champion and has various professional certifications in the cyber security areas.
The following bonus sessions are open to all paid attendees at no additional cost. There are many different types of events that fall into these categories:
- SANS@Night: Evening presentations given after day courses have ended. This category includes Keynotes.
- Special Events: SANS-hosted events and other non-technical recreational offerings. This category includes, but is not limited to, Receptions and Information Tables.
- Master's Degree Presentation: Presentations given by SANS Technology Institute's Master's Degree candidates.