BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//J Wolfgang Goerlich - ECPv6.8.2.1//NONSGML v1.0//EN
CALSCALE:GREGORIAN
METHOD:PUBLISH
X-WR-CALNAME:J Wolfgang Goerlich
X-ORIGINAL-URL:https://jwgoerlich.com
X-WR-CALDESC:Events for J Wolfgang Goerlich
REFRESH-INTERVAL;VALUE=DURATION:PT1H
X-Robots-Tag:noindex
X-PUBLISHED-TTL:PT1H
BEGIN:VTIMEZONE
TZID:America/Detroit
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20150308T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20151101T060000
END:STANDARD
END:VTIMEZONE
BEGIN:VEVENT
DTSTART;TZID=America/Detroit:20151015T180000
DTEND;TZID=America/Detroit:20151015T200000
DTSTAMP:20260503T100355
CREATED:20151014T170403Z
LAST-MODIFIED:20151014T170403Z
UID:283-1444932000-1444939200@jwgoerlich.com
SUMMARY:ISSA Motor City
DESCRIPTION:ISSA Motor City Chapter Meeting – Thursday\, October 15\, 2015 \nThursday\, October 15\, 2015\nFollow the signage upon entering the VisTaTech Center at Schoolcraft College in Livonia. Food and Refreshments will be provided. \n6:00PM – 8:00PM\nRSVP to Secretary@motorcityissa.org \nPresentation: Pickpocketing: Lessons Learned From Payment Apps and Wallets \nWhen asked why he robbed banks\, Willie Sutton famously answered “because that’s where the money is.” It is no surprise that criminals followed the money to online payment systems and digital wallets. This talk will look at several such crimes\, analyzing security failures at Starbucks\, Apple\, Google\, WeChat\, and more. Amid the encryption and tokenization and PCI DSS compliance\, somehow\, criminals still manage to eke out a living defrauding consumers. (And by eke\, we mean the estimated $3 trillion dollar cybercrime industry.) This talk will review emerging payment systems and describe the fraud and the flaws. With that as a framework\, we will propose first principles for securely designing new systems that avoid the pickpocketers. \nBio: Wolfgang Goerlich – Strategist\, CBI
URL:https://jwgoerlich.com/event/issa-motor-city/
LOCATION:VisTaTech Center at Schoolcraft College\, 18600 Haggerty Hwy\, Livonia\, MI\, 48152\, United States
END:VEVENT
BEGIN:VEVENT
DTSTART;VALUE=DATE:20151009
DTEND;VALUE=DATE:20151010
DTSTAMP:20260503T100355
CREATED:20150805T132317Z
LAST-MODIFIED:20151005T132456Z
UID:238-1444348800-1444435199@jwgoerlich.com
SUMMARY:GrrCon
DESCRIPTION:GrrCON is an information security and hacking conference that provides the Midwest InfoSec community with a fun atmosphere to come together and engage with like minded people. We keep GrrCON small with around 1\,000 attendance to allow us to provide those things other events leave out. Whether you are a Fortune 500 executive\, security researcher\, industry professional\, student\, or a hacker of “flexible” morals you will find something for you at GrrCON. \nPunch and Counter-punch Part Deux: Web Applications\n2:00 PM to 2:50 PM \nApplications today account for 75% of all attacks on corporate resources. Whether injection\, XSS\, poor crypto or the general ignorance of secure coding techniques\, applications need our help! In “Punch and Counter-punch Part Deux”\, Wolfgang and NerdyBeardo present a poorly secured application and how to properly utilize secure coding techniques to defend it. Our attacker demonstrates active attacks against the application including using SQL Injection\, Cross Site Scripting\, CSRF\, and Broken Crypto. Our Defender will walk through a threat model utilizing STRIDE and show how threat model mitigation’s translate to code. Demonstrations will be written in C# however concepts will work with any programming language. All code will be made available on github.
URL:https://jwgoerlich.com/event/grrcon/
LOCATION:MI
END:VEVENT
BEGIN:VEVENT
DTSTART;VALUE=DATE:20151008
DTEND;VALUE=DATE:20151009
DTSTAMP:20260503T100355
CREATED:20150805T131951Z
LAST-MODIFIED:20151005T132254Z
UID:236-1444262400-1444348799@jwgoerlich.com
SUMMARY:SIRACon 2015
DESCRIPTION:Society of Information Risk Analysts annual conference will be held in the loft and auditorium spaces of the Madison Building\, winner of a 2015 “Outstanding Building of the Year” Award from the International Building Owners and Managers Association. The Quicken Loans family of companies acquired the Madison Building in 2011 and completely renovated it\, attracting new businesses and energy to our bustling urban core. Check out photos of the space at www.eventsatmadison.com. The Madison Building is located at 1555 Broadway in the heart of downtown Detroit. \nChange Culture\, Change Risk\n10:40am – 11:20am \nPeople performing contentiously and consistently is a lofty goal. Information Risk Management gives us the process to follow. Controls frameworks gives us the standards to set and meet. Yet it is the people who ultimately decide our security posture. In this presentation\, we will introduce culture frameworks. Culture frameworks provide a means to accelerate building a risk management program. For programs that are maturing\, culture provides a means to communicate and drive behaviors. To illustrate this point\, case studies will be shared that illustrate the challenges and successes of applying culture management to a risk program. Attendees will leave with new insights into how to leverage the people aspect of Information Risk Management.
URL:https://jwgoerlich.com/event/siracon-2015/
LOCATION:MI
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Detroit:20150718T080000
DTEND;TZID=America/Detroit:20150718T170000
DTSTAMP:20260503T100355
CREATED:20150702T135220Z
LAST-MODIFIED:20150713T162515Z
UID:81-1437206400-1437238800@jwgoerlich.com
SUMMARY:Security Culture Conference
DESCRIPTION:The Security Culture Conference 2015 takes place in beautiful Oslo in June – the best time to enjoy the city of Oslo\, the beaches\, the food\, the vikings and so much more! \nUsing Oslo as the setting scene\, the Security Culture Conference 2015 focus on building security culture using best practice. The speakers have extensive experience from building security culture using the Security Culture Framework (https://scf.roer.com)\, and will be sharing their experiences through talks and workshops. \n  \n 
URL:https://jwgoerlich.com/event/security-culture-conference/
LOCATION:Unnamed Venue\, Oslo\, Norway
ATTACH;FMTTYPE=image/png:https://jwgoerlich.com/wp-content/uploads/2015/07/2015-07-02_0951.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Detroit:20150715T080000
DTEND;TZID=America/Detroit:20150716T170000
DTSTAMP:20260503T100355
CREATED:20150702T134917Z
LAST-MODIFIED:20150702T134917Z
UID:79-1436947200-1437066000@jwgoerlich.com
SUMMARY:CSA Nordic Summit
DESCRIPTION:CSA Nordic Summit and Summer Conference 2015\nTaking place June 15th-16th in beautiful Oslo\, you get to experience world-class speakers like Raj Samani\, Rik Fergusson and Ramsés Gallego\, a fantastic three-track program\, lots of perks and extras\, and a hard-hitting rock-festival-party in the evening! \nSome of the highlights of the program: Jim Reavis\, the CEO of Cloud Security Alliance gives a keynote on cloud security. The Cumulus-Project runs a half-day workshop (free for all participants) on certification of clouds services. A full-day track of e-health and government in joint-operation with IKT-Norge.
URL:https://jwgoerlich.com/event/csa-nordic-summit/
LOCATION:Vulcan Arena\, Oslo\, Norway
END:VEVENT
END:VCALENDAR