Best Practices for choosing an Information Security Product:
Many companies are preparing for long term security solutions for employees. Josh will provide best practices and considerations for products and tools, as well as how to appropriately vet vendors via RFP process. Josh will facilitate discussion of what criteria to judge vendors against when evaluating Information Security technology. This will include approaches to evaluation, such as paper proof of concepts, partner recommendation elimination/qualification, limited proof of concepts and full proof of concept. He will also discuss common tactics seen in the industry that are sometimes used to obfuscate how effective (or not effective) a given product is, and how they are portrayed as a convince for the purchaser/evaluator.
Josh will share what features should be an absolute requirement in any security product, and how to evaluate for these features and what to consider in evaluating the long term prospects of a product.
The overall goal is to provide the audience with a good framework for evaluating Information Security tools and a general understanding of what to look for in any security tool.
Virtual Webinar Meeting Agenda
- Announcements 1:00-1:15 CST
- Speaker 1: 1:15-2:00
- Wrap Up
Please Note: Secured Webinar link will be sent out a few days prior to the event
Joshua Madsen, Manager Network & Security Services, Wings Financial Credit Union
Joshua Madsen attended University of Wisconsin-Eau Claire for hardware engineering, focusing on implementation of hardware based encryption. He then joined the US Army as a Cavalry Scout in forward reconnaissance, direct action, as well as instruction and certification roles, earning the Army Commendation Medal and multiple Army Achievement Medals over multiple deployments and assignment. Upon leaving the military he took additional courses at Metropolitan State university in Computer Forensics, before starting to work for McAfee/Intel Security in 2014 working in SIEM technology, Web Application Protection, Threat intelligence, and forensic evaluation, where he was subject matter expert on DXL/TIE threat intelligence sharing integration. In 2016 he joined Wings Financial Credit union as a Network and Security Engineer, primarily responsible for the SIEM environment and the endpoint protection software. His current role at Wings as Manager-Network and Security services he is responsible for all information security architecture, operations, compliance, and education as well as all network infrastructure and operations, regularly reporting out to the Board of Directors. He lives in woods outside of Northfield with his wife and dogs, and regularly competes in long range and tactical shooting disciplines.
Secure Zoom details will be sent prior to event.
Are non-members and guests welcome at meetings and events?
Yes, we welcome individuals at large from the security community to join us for any of our events. We simply ask that, after experiencing personally the value of our community at two events, individuals consider joining ISSA for the additional benefits that membership provides.
Why do we have to register to attend meetings and events?
Besides assisting the board with planning logistics for our events, registering for meetings and events, then checking in when you attend, provides you with self-service documentation you can print out to support your CPE credits if you are audited.
***Information/image release. By registering for this event, I agree that:
- I am allowing my contact information included in the registration to be shared with MN ISSA and I may be contacted by MN ISSA
- I grant MN ISSA and/or ISSA International the right to use any candid photos or videos taken during the event in future marketing and communication efforts, to include, but not limited to, websites, brochures, advertisements, magazines, newspapers, newsletters, emails, videos and web conferences.