Incorporating Security Practices Into Business Processes

Houston DevOps Security Conference
August 26, 2018
O365 Workloads, Find and Plug Your Data Leaks
October 1, 2018
Show all

Incorporating Security Practices Into Business Processes

September 13, 2018 @ 11:30 am – 2:15 pm
Hess Club
5430 Westheimer Rd Houston
TX 77056 USA

Presentation: Incorporating Security Practices Into Business Processes

Speaker: Ira Winkler, CISSP – President of Secure Mentem


When people fail from a security perspective, everyone seems to blame the users. Part of the consistent failing is that organizations expect users to do their job, and somehow know what security to implement into the process on their own. This doesn’t just involve user actions, but the every process within an organization that places information at risk. This presentation will talk about how to build security actions and behaviors into organizational policies and procedures and therefore practice.


Ira is Author of Advanced Persistent Security. He is considered one of the world’s most influential security professionals, and has been named a “Modern Day James Bond” by the media. He did this by performing espionage simulations, where he physically and technically “broke into” some of the largest companies in the World and investigating crimes against them, and telling them how to cost effectively protect their information and computer infrastructure. He continues to perform these espionage simulations, as well as assisting organizations in developing cost effective security programs. Ira also won the Hall of Fame award from the Information Systems Security Association, as well as several other prestigious industry awards. Most recently, CSO Magazine named Ira a CSO Compass Award winner as The Awareness Crusader.

Contact Information:

 Name: Ira Winkler
 Title: President of Secure Mentem
 Company: Secure Mentem

Our Sponsor:

Remediant delivers the first agent-less, vault-less privileged access management solution that combines real-time monitoring and Just-In-Time Administration (JITA) across windows, linux, MacOS, and public cloud. We stop lateral movement using stolen administrative credentials without hindering IT operations.
Name: Brian Miller
Company: Remediant

Luncheon Meeting Schedule:

11:15 a.m. Registration / Networking
11:30 a.m. Luncheon / Networking
11:45 a.m. Chapter Business Meeting
12:00 noon Keynote Presentation
1:00 p.m. Adjourn Luncheon


  • Background in Information Security.


  • 1 CPE

Leave a Reply