apple laptop
What We Do in the Shadows – Gaining Visibility & Control Over Non-traditional I.T.
Bryan Graf | 4 Minute Read

Abacode’s Chief Technology Officer (CTO) and Chief Information Security Officer (CISO), Jeremy Rasmussen, will be giving a talk at the next Tampa Bay ISC² Chapter Meeting.

With ubiquitous mobile/wireless, IoT devices, cloud computing, social media, etc., our enterprise has little semblance to the traditional castle concept. It’s more like an amorphous blob, or worse, the Beta XII-A entity from ST:TOS “Day of the Dove.” So, what can we do about it? In this talk, I’ll provide real-world examples of things I have seen in 20+ years of infosec audits and provide advice on best practices for addressing “shadow IT.” For example, how do you really protect/monitor IoT devices? Or, how do you protect/monitor social media? How do you ensure that everything comes under centralized control for provisioning, I&A, access control, etc.? I don’t have all the answers but will at least try to get you out of the shadows and shine a light that will make the cockroaches scatter. – Jeremy Rasmussen, CISSP, CEH, PMP
Jeremy Rasmussen

Jeremy Rasmussen
CTO/CISO

Speaker BIO

Jeremy Rasmussen is CTO/CISO of Abacode, a company that provides managed cybersecurity & compliance advisory services to businesses across all industries. He is also an adjunct professor at the University of South Florida and founder of the USF Whitehatters Computer Security Club (WCSC). Since 2000, he has taught courses in cryptography & network security, ethical hacking, digital forensics & investigations, and mobile & wireless security. For 25+ years, he has performed R&D of cyber solutions for government and commercial customers. Jeremy is a CISSP (No. 11762) and CEH. He was named 2017 Tampa Bay Technology Leader of the Year.
Tampa Bay isc2 Official Chapter

ISC²

(ISC)²® is the largest not-for-profit membership body of certified information security professionals worldwide, with nearly 80,000 members in more than 135 countries. Globally recognized as the Gold Standard, (ISC)² issues the Certified Information Systems Security Professional (CISSP®) and related concentrations, as well as the Certified Secure Software Lifecycle Professional (CSSLP®), Certified Authorization Professional (CAP®), and Systems Security Certified Practitioner (SSCP®) credentials to qualifying candidates.