Alamo ISSA Quarterly Meeting

Maggiano’s Little Italy – The RIM 17603 I-10, San Antonio, TX 78257 Noon until 4:30 PM


Alamo ISSA and ISACA Meeting on August 21st, 2018

Maggiano’s Little Italy – The RIM 17603 I-10, San Antonio, TX 78257 Noon until 4:30 PM

Sponsored by Optiv

Link to tickets for the event!

Benefits of attending Alamo ISSA Quarterly Meetings:

  • All of the Alamo ISSA Quarterly Meetings give you the opportunity to earn 3 CPE’s toward your certifications.
  • Network with other information security professionals in the area.
  • Lunch is included with your ticket.
  • After the meeting, a mixer sponsored by Cisco will be held until 6:30 PM in Maggiano’s Bar area.

Speaker: Crystal Trawny, Service Delivery Manager, IAM Practice, Optiv

Bio: Crystal has over 10 years of experience in Identity and Access Management (IAM) projects. She is knowledgeable in Identity & Access Management policies and operational support and has successfully delivered projects across various industry verticals such as financial services, energy, healthcare, technology, and manufacturing.

Title: Developing a Comprehensive Identity Strategy

Abstract: New levels of technology integration and disruptions from Internet of Things (IoT), cloud and mobility are challenging traditional enterprise security and forcing us to think in new ways about Identity Management. IAM projects are becoming more complex and more critical to meeting compliance requirements and protecting your organization from a breach. If your organization is like most, you’ve made IAM investments that address a specific user community, application or business process. With the shortage in IAM expertise and the growing needs of the business, how can you successfully migrate those tactical projects to a strategic IAM program that enables the business and makes you more secure? This presentation will discuss a suggested Identity Framework and what components are necessary to develop a comprehensive, IAM strategy for your organization.


Speaker: Jesse Oranday, Frost Bank

Bio: Jesse Oranday is the lead Red Hat System Administrator for Frost Bank. With over 30 years of experience in the IT field as a Unix Administrator, Jesse has worked on HPUX, Solaris, IRIX and Linux based platforms. His recent focus has been the implementation of automation processes in support of application deployment and security compliance in a standardized environment.

Title: Roadmap to Red Hat Standardization: Your mileage may vary

Abstract: With year after year growth in the number of Red Hat systems at Frost, the implementation of automated deployments for applications and core builds became a requirement, not a goal. Additionally, the emergence of several fast-paced Agile teams necessitated the change in the System Admin role from active project team member to centralized support. This discussion will cover the use and issues with deployment of software tools like Red Hat Satellite, Jenkins, Chef, Centrify and Lieberman ERPM in an enterprise environment from the System Admin perspective.


Speaker: Rob Kraus, Senior Director, Global Threat Intelligence Center Operations, NTT Security

Bio: Rob is currently responsible for coordination and facilitating operations and key projects within NTT Security’s Global Threat Intelligence Center (GTIC). Rob is a Certified Information Systems Security Professional (CISSP), specializing in vulnerability research, malware analysis, threat intelligence, web application security assessments, external and internal penetration testing, and social engineering. Rob is also the author of the Seven Deadliest Windows Attacks and Co-Author for the Seven Deadliest Network Attacks books, part of Syngress Publishing’s Seven Deadliest Attack Series.

Title:  NTT Security 2018 Global Threat Intelligence Report Key Findings and Highlights

Abstract: Cybercrime remains a pervasive threat; attractive and lucrative in its ability to generate profits with minimal risk of attribution or interdiction. Barriers to entry are reducing due to the diversification of illicit subscription services, automated software toolkits, and vast online criminal support forums. Cybercriminal ingenuity continues to mature, making the most of attack opportunities arising from new technology adoption. In this presentation, we explore the findings of the NTT Security Global Threat Intelligence Report and provide insights to guide your security investment decisions aligned with your industry sector, geographic profile, and risk appetite. We share notable insights into the evolving and emerging threat landscape, including ransomware, threat intelligence, industry targeting, and compliance regulations observed during the past year.


Techno Security & Digital Forensics Conference
September 17-19, 2018 – San Antonio, TX

Hyatt Regency San Antonio – 123 Losoya Street – San Antonio, TX 78205

This conference provides a unique education experience that blends together the digital forensics and cybersecurity industries for collaboration between government and private sectors. Primary topics include Audit/Risk Management, Forensics, Investigations, Information Security, and Sponsor Demos. Connect with leading suppliers, explore the latest tools, and discover solutions to challenges in cybersecurity and digital forensics. For full details, visit  

Texas Cyber Summit – October 12th-14th, 2018