Get an iPad mini, ASUS ZenScreen LED Monitor, or $350 Off with OnDemand Training thru 5/19

Security East 2015

New Orleans, LA | Fri, Jan 16 - Wed, Jan 21, 2015
This event is over,
but there are more training opportunities.

That Is Where the Data Is!

  • David Belangia- Master's Candidate
  • Monday, January 19th, 8:15pm - 8:55pm

The place to get sensitive information relating to people who have access to our country's most sensitive information is the Office of Personnel Management's e-QIP Databases. These repositories provide a single location that contains the complete history and all associated pertinent information for anyone with a security clearance. There was a cascading failure of controls that led to the compromise identified by the New York Times in July 2014. Attackers only require a single vulnerability to obtain a foothold from which to compromise the environment. The concept of defense-in-depth is especially important for protecting sensitive information. Encryption of data at rest and in transit would have rendered the compromise useless by eliminating the ability of the attacker to use the information. All controls could have failed but the reward for the attacker would have been useless with a proper implementation of Control 17: Data Loss Prevention.

Bio: Mr. Belangia has over 25 years of experience in all aspects of information technology. His skills include a technical understanding of the software development life cycle, network design and maintenance, server and desktop support, project management, and cyber security. He has extensive knowledge and experience with Six Sigma, CMMI, FISMA, FIPS, NIST, CNSSI, ITIL, ISO standards and DoE Orders and Manuals, USGCB, STIG, TEMPEST, PMI, and NNSA Administrative Policy (NAP). He has managed and implemented programs including: developing policies, procedures, and standards; providing project management oversight; and implementing processes to support requirements and best business practices. He has extensive experience hosting and responding to audits and assessments. He is a trained Six Sigma Yellow Belt and Champion and has various professional certifications in the cyber security areas.

Bonus Sessions

The following bonus sessions are open to all paid attendees at no additional cost. There are many different types of events that fall into these categories:

  • SANS@Night: Evening presentations given after day courses have ended. This category includes Keynotes.
  • Special Events: SANS-hosted events and other non-technical recreational offerings. This category includes, but is not limited to, Receptions and Information Tables.
  • Master's Degree Presentation: Presentations given by SANS Technology Institute's Master's Degree candidates.
Friday, January 16
Session Speaker Time Type
General Session- Welcome to SANS Paul Henry Friday, January 16th, 8:15am - 8:45am Special Events
Evolving Threats Paul A. Henry Friday, January 16th, 7:15pm - 9:15pm Keynote
Saturday, January 17
Session Speaker Time Type
Continuous Ownage: Why you Need Continuous Monitoring Seth Misenar Saturday, January 17th, 7:15pm - 8:15pm SANS@Night
Enterprise PowerShell for Remote Security Assessment James Tarala Saturday, January 17th, 8:15pm - 9:15pm SANS@Night
Sunday, January 18
Session Speaker Time Type
What Malware? Hunting Command Line Activity Chad Tilbury Sunday, January 18th, 7:15pm - 8:15pm SANS@Night
Monday, January 19
Session Speaker Time Type
Gone in 60 Minutes: Have You Patched Your System Today? David Hoelzer Monday, January 19th, 7:15pm - 8:15pm SANS@Night
That Is Where the Data Is! David Belangia- Master's Candidate Monday, January 19th, 8:15pm - 8:55pm Master's Degree Presentation
Tuesday, January 20
Session Speaker Time Type
Client Access is the Achilles' Heel of the Cloud Bryce Galbraith Tuesday, January 20th, 7:15pm - 8:15pm SANS@Night