Quarterly, the International Information System Security Certification Consortium, Inc. (ICS)2 Tampa Bay Chapter hosts meetings to discuss ways to improve information security and defense against cyber threats. The chapter focuses on local communities in the Tampa Bay area to educate members and security professionals on new and innovative ways to improve security software.
Academic Department Chair Laura Malave, of St. Petersburg College’s College of Computer & Information Technology (CCIT) attends these quarterly meetings. Since she teaches IT Security courses for CCIT, these meetings provide an excellent opportunity to keep abreast of industry trends, network with industry professionals and collaborate on projects. As part of her involvement with the Tampa Bay Chapter, Malave volunteers her time as a planning committee member for the Tampa BSides Information Security Conference. Involvement with organizations such as this help professors such as Malave bring real world experience to the classroom.
The (ICS)2 website contains resources for technology professionals to check out tips about security awareness in various parts of the world. Some of these resources include: (ICS)2 Career tools, Foundation, InfoSecurity Professional Magazine (or members only), Global Information Security Workforce Study, Journal-Discount for members and Security Central.
Learn more about the purpose of the (ISC)2 Chapter.
The next quarterly Chapter meeting will be on:
Saturday, Aug. 15
10 a.m. to 1 p.m.
South University
4401 North Himes Avenue, #175
Tampa, FL 33614
During the meeting, the following will be discussed:
- Summer STEM Camp
- BSides 2016 Reports which highlight the following:
- Marketing
- Hosting
- Merchandise
- Web Site
- Sponsor
- Speakers
- Volunteers
- Education/Training
After lunch, a guest speaker will introduce the topic, Intro to Metasploit. According to Professor Laura Malave of the College of Computer & Information Technology (CCIT), Metasploit is “an advanced open-source platform for developing, testing, and using exploit code. It is among the most widely used exploitation tools in the information security field”, she said.
Learn more about MegaSploit.