October 10th Chapter Meeting

Bugcrowd, Inc. BugCrowd

Presenters
Grant McCracken – Director of Solutions Architecture
Chloe Messdaghi – Researcher Growth Program Manager
Talk
Learn From My Mistakes: The Major Lessons We’ve Learned In Doing Crowdsourced Security, And How They Apply To You
Come join members of the Bugcrowd team to discuss launching a bug bounty program, what you should keep in mind, and how to work closely with the researcher community to keep your company safe.
LOCATION TBD

September 12th 2019 Chapter Meeting

Title: API Security: When OAuth Is Not Enough
Description:
Attribute Based Access Control (ABAC), OAuth 2.0 and OpenID Connect (OIDC) are complementary standards that can be used individually or in concert to offer comprehensive access control for applications that are built using microservice and API approaches. In this session, we’ll outline a set of examples where security standards work together in addressing requirements that are difficult or impossible to meet by using OAuth or OIDC alone.

Learn how you secure your APIs and Microservices using Externalized Dynamic Authorization.

Key agenda items

  • Covering API security basics
  • Avoiding bad security practices
  • Overcoming OAuth limitations
  • Managing authorization as a microservice

About our Speaker

Jonas Iggbom, the VP of Sales Engineering at Axiomatics, has over 20 years of experience in product management and technical sales in endpoint security and access control. His expertise lies in encryption technologies, keys, certificates, and SSH, as well as access control solutions for privileged and end user accounts, databases, and applications.

Prior to Axiomatics, Jonas worked as the Director of Product Management at Fox Technologies and as a Product Manager at Check Point Software Technologies, both in California. He also held the position of Senior Sales Engineer/Product Manager at Pointsec Mobile Technologies in Chicago and Sales Engineer at their office in Stockholm, Sweden.

Jonas earned his bachelor’s degree in computer science from the Royal Institute of Technology in Kista, Sweden. Along with his expertise in encryption technologies and access control solutions, Jonas is also knowledgeable in intrusion detection, anti-virus, data leakage prevention, content control, and client virtualization.

Thanks to our topic sponsor: Axiomatics authorization solutions are utilized around the world to share sensitive data securely, meet compliance and minimize data fraud. From our offices in Chicago and Stockholm we serve a global customer base within finance, healthcare, insurance, manufacturing, media, pharma, software/high tech and the public sector. Our dynamic authorization suite for applications, databases, Big Data, APIs and Microservices enables a policy-based approach to access control to protect the most critical assets – on premise or in the cloud. Our product suite is built on Attribute Based Access Control (ABAC) in accordance with National Institute of Standards and Technology (NIST) guidelines. For the US Federal Government, Axiomatics is a member of the CDM program and actively participates in the GSA schedule.

Website
http://www.axiomatics.com
LOCATION TBD

June 13th Chapter Meeting

Location: Oracle 5805 Owens Dr, Pleasanton, CA 94588

Time: 7:00 to 9:00 PM

Agenda:

7:00 PM Chapter Announcements, pizza

7:10 PM Meet Garima Gupta represent James Logan, a Union City High School, presenting their interest in earning scholarship, finding internships, engaging in activities that further their path to careers in engineering and technology.

7:25 – 7:30 PM Plan of Action, How ISC2 East Bay organizes for local schools, mechanisms to work in special committee with Chapter Directors for Education and CyberSecurity Awareness and Training.

7:30 – 8:30 PM Speaker

8:30 -900 Q&A Networking

About our High School Guests: The James Logan Robotics team is a club at James Logan High school located in Union City. The club meets weekly and invites all high school students to learn more about the STEM field and dive into engineering concepts and coding.  <Read More @ http://www.jameslogan.org/engineering>

Their mission is to help others find their love for STEM and offers guidance and direction to pursue a career in this field. ISC2 East Bay invites JL Robotics to engage with us in finding mentors who will support them in their pursuit of activities in the field of engineering and technology.
Speaker Topic: The Mitre Att&ck Framework:
The MITRE ATT&CK framework is a very effective tool for “adversary emulation”, cataloging how adversaries behave, what they’re trying to do, and the techniques used to accomplish their means. Moreover, the framework aims to provide a common language and vocabulary for practitioners, vendors, and all parties working to understand common threat actors and techniques.

In November 2018, MITRE evaluated a subset of techniques in an open-test environment, working with vendors to analyze their detection capabilities against these common techniques. With the results of this first evaluation now published, many are trying to make sense of results to understand the efficacy of different solutions in the marketplace today.

Matt Bouis, Senior Sales Engineer at Cybereason, will boil down the complexity of the MITRE ATT&CK framework so your organization can understand:

• How to adapt the framework to your company’s environment and needs in order to get the most utility out of it
• What different detection categories mean and how to interpret results of ATT&CK Framework evaluations
• How Cybereason allows customers to search and understand their environment based on the ATT&CK Framework

Matt Bouis, Sr. Engineer in Cybersecurity data analytics.

About Cybereason:

Cybereason is the leader in endpoint protection, offering endpoint detection and response, next-generation antivirus, managed monitoring and IR services.
Founded by elite intelligence professionals born and bred in offense-first hunting, Cybereason gives enterprises the upper hand over cyber adversaries.
The Cybereason platform is powered by a custom-built in-memory graph, the only truly automated hunting engine anywhere. It detects behavioral patterns across every endpoint and surfaces malicious operations in an exceptionally user-friendly interface.
Cybereason is privately held and headquartered in Boston with offices in London, Tel Aviv, and Tokyo.

Kindly confirm your attendance for the meeting by June 12th, 2019, along with your preference of pizza (Veg/Non-Veg).

We need to provide the attendee list to our host for badges.

To RSVP please send your name, *ISC2 ID  and the subject line “attending June 13th 2019 meeting” to programs@isc2-eastbay-chapter.org, and conferencedirector@isc2-eastbay-chapter.org.

Oracle 5805 Owens Dr, Pleasanton, CA 94588

Look for the (ISC)2 East Bay Meeting Sign pointing to the entrance of 5805. We meet just inside the main lobby.

*If you are not a member of ISC2 or ISC2 East Bay Chapter, please complete the membership application form and send the application with your notice of intent to attend.  Membership is still free, but we do need to know who you are.

May 9th Chapter Meeting

ATTENTION DATE WAS WRONG – is 2nd Thursday May 9th

Location change – 6101 Bollinger Canyon Rd, San Ramon, CA 94583 Room BR1X – 1150

 

Why CISO’s Fail, in the words of the author, Barak Engel

Information security is now a really big deal, yet we keep screwing it up. Big breaches are in the news every day, and they are only the tip of the iceberg. Security leaders average less than two years in tenure, and job satisfaction – their own, and others’ of their performance – is lower than that of watching paint dry. Fingers go ablamin’, but in security we just end up pointing them elsewhere.

Why? and more importantly, what can we do about it?

Claimed in its origin by many cultures, the ancient saying “The Fish Stinks from the Head” applies to the emerging discipline of information security, just as much as it does to organizational rot and mis-development. Providing a useful guide for an irreverent look at ourselves, the speaker in this open-to-the-audience talk will touch on both the “why” and the “what to do” parts, while doing his best to make you laugh.

Real-life experiences, both amusing and embarrassing, will be shared liberally.

Speaker Bio: Barak Engel is known for having come up with the concept of “virtual CISO” back when security was a four-letter word that no one could spell. He stubbornly insisted, and ultimately developed a consulting practice around it. Almost two decades later his company, EAmmune, develops and manages security programs for organizations, large and small, across all industries. Barak himself has served as CISO for many of them (e.g. MuleSoft), and often for several at once.

In another clear mark of insanity, he decided to write a book about security management while still actively practicing, rather than from the comfort and safety of retirement. The 2017 book, Why CISOs Fail, keeps getting incredible reviews from those who stumble upon it, delighting Barak every time it happens. It also serves as the inspiration for this talk.

Chevron World Headquarters

Location change – 6101 Bollinger Canyon Rd, San Ramon, CA 94583 –Room BR1X – 1150

San Ramon, CA 94583
Time: 7:00 to 9:00PM
RSVP by replying back to the member email by 5/8/2019 or send your ISC2 ID and subject line “Attending 5/14/2019 member meeting to Director Programs.
The phone number to call if lost or need directions:  (925) 842-1000 and ask for the main security reception. Our hosts at Chevron are Ana Colocho or Frank Fabsits or ask for Robin Basham
Parking: Park in Visitor Lot Across the Loop Road (Right Turn at first stop sign, and your first right turn into parking lot – walk across road to building behind flagpoles and fountain. Meeting room is BEFORE Security Desk just inside double glass doors on the right)

 

March 14th Chapter Meeting at Oracle

Location: Oracle 5805 Owens Dr, Pleasanton, CA 94588

Time: 7:00 to 9:00 PM

Topic:  IoT Threat Detection

With the explosive growth in connected smart devices which break user centric security controls, with devices communicating in multiple spectra redefining the enterprise perimeter (WiFi, BT, Ble, 5G), with IT/OT convergence exposing IT managed networks to a multitude of custom devices; visibility, risk assessment and control of these devices are a major problem for every enterprise. These trends are leading to incorrect configurations, wider than required access rights, and vulnerable devices being installed into networks. Using a few examples of attacks that we detected, this talk discusses a learning driven, device centric security approach that establishes deep context about devices, provides risk assessment and automates access control to let enterprises safely handle smart devices at a large scale.

Srinivas Akella

Founder & CTO

Srinivas Akella is an entrepreneur and a technologist with a strong cyber security, cloud and SaaS background.  He is the Founder, Chief Products and Technology Officer at WootCloud.

Kindly confirm your attendance for the meeting by March 12th, 2019, along with your preference of pizza (Veg/Non-Veg) so that we place orders accordingly.

We need to provide the attendee list to our host for badges.

To RSVP please send your name, *ISC2 ID  and the subject line “attending March 14 2019 meeting” to programs@isc2-eastbay-chapter.org. If you intend to participate in earning CPE for conference planning, please copy conferencedirector@isc2-eastbay-chapter.org.

Oracle 5805 Owens Dr, Pleasanton, CA 94588

*If you are not a member of ISC2 or ISC2 East Bay Chapter, please complete the membership application form and send the application with your notice of intent to attend.  Membership is still free, but we do need to know who you are.

Chapter Meeting and Elections Feb 14 2019

Location: High Performance Computing Innovation Center, Livermore. Driving Directions and important information below.

Time: 7:00 to 9:00 PM

Topic: Lessons learnt while building Zero Trust Networks and iOT Security

Zero Trust Networks are based on the principle of “never trust without verification”. We will discuss some insights and lessons from building Zero-Trust networks. Since Users on Network and Off network will be treated equally, we have to overcome some unique challenges like incorporating SaaS applications into the model. How Zero-Trust Networks helps us meet Compliance requirements.

Meet Nalin Narayanam, Chief Information Security Officer
Intarcia Therapeutics, Inc.

With over 13 years of Security Industry experience in areas like Identity Management,Tokenization, DLP,  and  SIEM, meet Nalin Narayanam, an active contributor in cutting edge Biotech Ingenuity. Hear how Intarcia Therapeutics will allow the world to securely rethink the future of medicine.

Kindly confirm your attendance for the meeting by February 12th, 2019, along with your preference of pizza (Veg/Non-Veg) so that we place orders accordingly.

We need to provide the attendee list to our host for badges.

To RSVP please send your name, *ISC2 ID  and the subject line “attending February 14 2019 meeting” to eric.simmons@isc2-eastbay-chapter.org. If you intend to participate in earning CPE for conference planning, please copy conferencedirector@isc2-eastbay-chapter.org.

*If you are not a member of ISC2 or ISC2 East Bay Chapter, please complete the membership application form and send the application with your notice of intent to attend.  Membership is still free, but we do need to know who you are.

REMINDER: Arrive on time or there will not be anyone to open the door.  We begin door duty at 6:30 and end at 7:00 PM – NO EXCEPTIONS

Location:
The High Performance Computing Innovation Center (HPCIC) is a collaboration hub for unclassified research and development activities. Established by Lawrence Livermore National Laboratory (LLNL) and located on its site, HPCIC guests must adhere to strict security guidelines while visiting.
 
Guidelines for visitors to LLNL’s HPCIC:
  • Must show a valid government-issued photo ID prior to entry (e.g., California Driver’s License, passport, HSPD-12 badge)
  • May not use personally owned cameras or recording devices, including those within cell phones or computers, i.e., no photography or audio/video recording allowed
  • No alcohol, weapons, explosives, controlled substances (e.g. illegal drugs) or other articles prohibited by law allowed on premises
  • Cannot be a citizen of Iran, North Korea, Sudan, or Syria.
Directions to LLNL’s HPCIC

From I-580 West (Oakland/San Francisco/Pleasanton/Dublin)

  1. Heading East on I-580 (Pleasanton/Dublin), take Exit 55 for Vasco Rd. toward Brentwood.
  2. Keep RIGHT at the fork & follow signs for Vasco Rd. South – merge onto Vasco Rd.
  3. Head South on Vasco Rd. – 1.1 miles
  4. Turn LEFT (East) at Patterson Pass Rd. – 1.2 miles
  5. Turn RIGHT (South) at Greenville Rd. – 0.7 miles
  6. Pass the stop light at Lupin Way/East Gate Drive & turn RIGHT (West) onto Credit Union Dr.

From I-580 East (Tracy/Stockton/Sacramento)

  1. Heading West on I-580, take Exit 57 toward N. Greenville Rd.
  2. Merge onto Altamont Pass Rd. – 0.1 miles
  3. Turn RIGHT (South) onto N. Greenville Rd. (East) – 2.4 miles
  4. Pass the stop light at Lupin Way/East Gate Drive & turn RIGHT (West) onto Credit Union Dr.

From I-680 South (San Jose/Milpitas/Fremont)

  1. Heading North on I-680, take exit 21B for California 84 E toward Livermore.
  2. Merge onto CA-84 E/Vallecitos Rd. – 4.8 miles
  3. Turn RIGHT onto Vallecitos Rd. – 1.1 miles
  4. Continue onto Holmes St. – 1.0 miles
  5. Turn RIGHT on Concannon Blvd. – 2.1 miles
  6. Turn RIGHT on S. Livermore Ave. – 0.5 miles
  7. Continue onto Tesla Rd. – 2.5 miles
  8. Turn LEFT (North) on Greenville Rd. – 1.4 miles
  9. Shortly BEFORE the stop light at Lupin Way, turn LEFT (West) onto Credit Union Dr.
Once you’ve turned onto Credit Union Dr, the HPCIC main building is located to the left (South) of Uncle Credit Union. Please park in front of the HPCIC building (6475), or if full, in the northern end of the lot off Credit Union Dr. Signs are posted.

Chapter Meeting Jan 10 2019

Industrial Control System Cyber Security Design and Regulation

Presented by Michael Cole, CISSP, CCNP – Control System Cybersecurity Analyst – Turlock Irrigation District

In the previous UTC Journal, Jon Stizel described how Ameren is using the National Institute of Standards and Technology (NIST) Cybersecurity Framework (CSF) to improve the maturity of their cybersecurity program with metrics and reporting.  Turlock Irrigation District (TID) has also used the NIST CSF, Energy Sector Cybersecurity Framework Implementation Guidance (ESCFIG) and the Electric Subsector Cybersecurity Capability Maturity Model (ES-C2M2) for its NERC CIP program foundation…

Michael Cole is a Control System Cybersecurity Analyst for the Turlock Irrigation District, where he provides expertise on NERC CIP Standards and Program design. Turlock Irrigation District is a Central California public utility that provides water for irrigation and power to customers in its service area. Michael has a Bachelor of Science in Computer Science, is a Certified Information Systems Security Professional (CISSP), and a Cisco Certified Network Professional (CCNP). Michael has focused on building a NERC CIP Documentation Architecture that is based on the NIST Cyber Security Framework (CSF) and Electric Subsector Cybersecurity Maturity Model (ES-C2M2). The architecture uses the ES-C2M2 cybersecurity domains as an abstraction for Turlock Irrigation District’s NERC CIP Program.

Venue: Optiv at 3875 Hopyard Rd., Pleasanton, CA 94588

Kindly confirm your attendance for the meeting by January 9th, 2019, along with your preference of pizza (Veg/Non-Veg) so that we place orders accordingly.

We need to provide the attendee list to our host for badges.

To RSVP please send your name, *ISC2 ID  and the subject line “attending January meeting” to conferencedirector@isc2-eastbay-chapter.org.

*If you are not a member of ISC2 or ISC2 East Bay Chapter, please complete the membership application form and send the application with your notice of intent to attend.  Membership is still free, but we do need to know who you are.

REMINDER: Arrive on time or there will not be anyone to open the door.  We begin door duty at 6:30 and end at 7:00 PM – NO EXCEPTIONS

Take the elevators to the second floor, take a left, we are all the way at the end of the hallway.

Chapter Meeting October 11th, 2018

Topic: Guidance to Implementing Network Security for Kubernetes

Topic: Security and Compliance for Kubernetes, Containers, and Microservices.   Modern application development and deployment have evolved significantly over the last several years. While it brings great productivity, efficiency and time to market advantages for software teams, it creates significant friction for traditional security and compliance architectures. This presentation will discuss how modern security and compliance teams can become business enablers and support agile software development.  Please join this session to learn about:

  • Key challenges facing security & compliance teams towards securing kubernetes based environments,
  • A reference guide and some best practices
  • A real-world case study on how a large SaaS provider is implementing security for their kubernetes based environments.

About Amit Gupta: Product Management leader with 18+ years of professional history developing, positioning and marketing software and services for Enterprises and Service Providers across the world. 10+ years of industry experience in enterprise infrastructure and data center solutions. 14+ years of background in application and infrastructure hosting and cloud services. Professional experience in both entrepreneurial and large corporate environments, driving strategy and tactical execution. Well versed with various Public / Private / Hybrid Cloud service consumption models.

About Tigera: Tigera provides Zero Trust network security and continuous compliance for Kubernetes platforms. Tigera Secure Enterprise Edition extends enterprise security and compliance controls to Kubernetes environments with support for on-premises, multi-cloud, and legacy environments. Tigera Secure Cloud Edition is available on the AWS marketplace and enables fine-grained security and compliance controls for Kubernetes on AWS and Amazon EKS. Tigera powers all of the major hosted Kubernetes environments including Amazon EKS, Azure AKS, Google GKE, and IBM Container Service.  Reach out to Amit Gupta  VP Product Management, Tigera amit@tigera.io

Venue: Chevron World Headquarters

6001 Bollinger Canyon Road
Conference Room A1020 – Building A (CHVPKA 1020)
San Ramon, CA 94583
Time: 7:00 to 9:00 PM Please arrive by 6:55.

Dinner

Pizza and Salad.

RSVP

RSVP to conferencedirector@isc2-eastbay-chapter.org with the subject “Attending October 11th at Chevron building A”. Include your name and ISC2 ID. If you don’t have an ISC2 ID and are not yet a member of our chapter, include the membership application with your email and copy membership@isc2-eastbay-chapter.org

We will be meeting in Building A in room 1020., 6001 Bollinger Canyon Rd, San Ramon, CA 94583. Park in the visitor parking lot and proceed to BLDG A.

Don’t get lost

The phone number to call if lost or need directions:  (925) 842-1000 and ask for the main security reception. Our hosts at Chevron are Ana Colocho (Chevron)  or ask for Robin Basham conferencedirector@isc2-eastbay-chapter.org
Parking: Park in Visitor Lot Across the Loop Road (Right Turn at first stop sign, and your first right turn into the parking lot – walk across the road to building behind flagpoles and fountain. The meeting room is BEFORE Security Desk just inside double glass doors on the right)

Chapter Meeting September 13, 2018

To RSVP please send your name, *ISC2 ID  and the subject line “attending September meeting” to conferencedirector@isc2-eastbay-chapter.org. If you have not arrived by 7:00 PM you will not be able to enter the Venue. Please arrive between 6:45 and 7:00 PM as doors lock and all attendees will want to go upstairs to the meeting room. (more below)

Topic 1:  Security Architecture in a Hybrid state

Speaker Istvan Berko – Security Sales Consultant, PNW, GovEd & Globals

In the past, we have aligned our security architecture through our governed controls and the applicability of these controls to our environments. As the legacy IT architecture is morphing into business-centric functions, the underlying infrastructure and data architecture is changing at pace.  This is resulting in a need to shift our information security perspective and the acceptable residual risk. This talk will discuss the need to adapt and consider some of these newer attack vectors and risks.

  • Operational Cloud security controls – New privileged provided to applications from an abstracted privilege management platform
  • Controls applicability to SaaS platforms – Do we introduce legacy security to hosted services?
  • Network and segmentation architecture – What works and what doesn’t
  • DevSecOps and CD/CI and how we enable an SDLC approach to business lead rapid deployment.

Dimension Data – http://www.dimensiondata.com/en-US/Solutions/Security

Mini Topic : Why IPv6 and IOT is the “Price of Admission” our November 9th Conference

Speakers: Robin Basham, Conference Director

Venue: Optiv at 3875 Hopyard Rd., Pleasanton, CA 94588

Kindly confirm your attendance for the meeting by September 12th, 2018, along with your preference of pizza (Veg/Non-Veg) so that we place orders accordingly.

We need to provide the attendee list to our host for badges.

To RSVP please send your name, *ISC2 ID  and the subject line “attending September meeting” to conferencedirector@isc2-eastbay-chapter.org.

*If you are not a member of ISC2 or ISC2 East Bay Chapter, please complete membership application form and send the application with your notice of intent to attend.  Membership is still free, but we do need to know who you are.

REMINDER: Arrive on time or there will not be anyone to open the door. We begin door duty at 6:30 and end at 7:00 PM.

Chapter Training Day – Friday July 13th

End Point Security Training Day

Odds Are You Need More Skills than Luck

Speakers and Topics are under review.  Please reach out to  Conference Director  Robin Basham,  Director Cybersecurity Awareness Krishnan Thiruvengadam, or Director Education & Career Development Jing Zhang-Lee

Read More

ISSA and ISACA members are welcome to participate as long as seats are available.

Training day is limited to the first 50 students.  Sessions run 90 minutes.  Please reach out if you are interested in being an instructor.

9 AM to 4 PM – 6 CPE

Chapter Meeting June 14th, 2018

Exfiltrating Data through IoT

“Exfiltrating data through the Internet of Things (IoT) provide insights based on research/analysis of data exfiltration vulnerabilities found in IoT protocols (i.e. SSDP, P25, Zigbee, Z-Wave, Wi-Fi, uPnP). With an eye toward mitigating weaknesses in current protocols, this talk addresses future protocol designs to eliminate those weaknesses.  This discussion will delve into the details and demo data exfiltration using IoT protocols. The application of this knowledge will allow you to assess and mitigate these risks as you integrate IoT technologies into your production systems, as well as making informed decisions regarding IoT device and protocol selection.

Garry Drummond, CEO & Founder, 802 Secure Mr. Drummond is a Wartime CEO. From his humble beginnings in Pleasanton, California, he boot-strapped his start-up company, 802 Secure Inc. from his garage. Mr. Drummond has conceptualized, designed and delivered cybersecurity products for both Critical Infrastructures, Enterprise and Government clients around the world. Mr. Drummond along with his few but loyal engineering team landed venture capital in November 2016 to expand the team and fulfill orders. 802 Secure is developing technology for Securing the Internet of Things (IoT), combining Software Defined Radios with Big Data Analytics. Mr. Drummond is a Certified Information System Security Professional (CISSP) and is passionate about wireless cybersecurity. With the recent explosion of Internet of Things, (IoT) device enablement as well as mobile adoption – wireless has now become the easiest way to back-door the wired-side of the network. Wireless technologies do not follow the traditional guidelines of security and new methodologies required to secure digital assets. Only through new thought leadership and innovation using software-defined- radios with big data analytics can these new broader spectrum attack vectors be identified.

802 Secure was awarded Silicon Valley Start-up of the Year in April 2015 and Silicon Valley Company of the Year May 2016. Most recently, in 2017, Mr. Drummond was awarded Most Innovative CEO of the Year.802 Secures products are sold through 5 of the most influential technology resellers in the US.

Aaron Davidson, Solutions Architect, 802 Secure Mr. Davidson is 802 Secure’s Solution Architect working with clients in understanding their issue(s) and providing solutions in meeting their security needs. His experiences stretch from technical support, system admin, network engineering &amp; architecture, quality assurance, security engineering, sales engineering and personnel management. His technical sales skills and bonding with deeply technical individuals as well as creating relationships with management, senior executives, VP and C level have provided effective solutions in meeting the demands of their industry segments.

About 802 Secure:

802 Secure is developing signal intelligent technology for securing the Internet of Things; detecting and assessing new wireless risks across the broader RF spectrum using software defined radios and big data analytics. 802 Secure has developed a leading world-class product, AirShield, to monitor IoT assets, identify risks and threats, and ensure performance and reliability 24×7 of the IoT environment. (www.802secure.com)

Venue:
Chevron World Headquarters
6001 Bollinger Canyon Road
Conference Room A1020 – Building A
San Ramon, CA 94583
Time: 7:00 to 9:00PM
RSVP by replying back to the email by 6/13/2018.
The phone number to call if lost or need directions:  (925) 842-1000 and ask for the main security reception. Our hosts at Chevron are Tom Rogers or Frank Fabsits or ask for Robin Basham
Parking: Park in Visitor Lot Across the Loop Road (Right Turn at first stop sign, and your first right turn into parking lot – walk across road to building behind flagpoles and fountain. Meeting room is BEFORE Security Desk just inside double glass doors on the right)

 

(ISC)2 East Bay Chapter