Ric Messier

The Value of Operations Security

Date: This event took place live on January 14 2016

Presented by: Ric Messier

Duration: Approximately 60 minutes.

Questions? Please send email to




This webcast is no longer available to view.

Description:

While policy creation and maintenance is a common focus for information security, policies leave a lot of room for implementation and interpretation. Complying with a good set of security policies does not guarantee that your organization is well-protected against attack. Your organization needs a good operations security team to implement security measures.

In this webcast, Security Professional Ric Messier will identify key points to understanding operations security and the need for a focus on it; details on potential components of a solid operations security plan; understanding the importance of detection and response capabilities in near-real time.

Audience members will come away learning:

  • What is Operations Security
  • Policy Shortcomings
  • Regulations and Compliance
  • Threats to Operations
  • Operational Protections
  • Detection Capabilities
  • Responding to Threats in Real-Time
  • Feedback Loops

This event is ideal for Technical Security Professionals, Technical Management, Networking Professionals, Systems Administrators, and Executive Management who want a better understanding of the needs of the security team.

About Ric Messier, Program Director of Champlain College online Cybersecurity program portfolio

Ric Messier (GSEC, CEH, CISSP) had his first experience on a global network called the BITNET in the early 1980s. Since that time, he has been deeply involved in networking from small enterprises up to the largest Internet Service Providers. He has also got hooked on security at the same time as his experience on the BITNET, after unexpectedly exploiting a hole in a mail program on an IBM mainframe. Ric has also spent several years working on Voice Over IP solutions both at the network and the application level. His first experience with a forensic investigation was in the late 1990s and he has been involved periodically with investigations and incident response teams since then. While working at Genuity, a Tier 1 ISP in the late 1990s and early 2000s, he had regular interaction with law enforcement on their investigations. Ric was the security lead for a team of professionals working on a next generation data center at Genuity. He also lead a team developing a managed intrusion detection system offering at Genuity. After Genuity was acquired by Level 3 Communications, he provided security expertise to the implementation and use of session border controllers in their VoIP network. He spent several years performing penetration tests on the products of a leading VoIP products vendor.