Dinner Meeting

September 2017 Dinner Meeting

ISACA LA Dinner Meeting

Tuesday, September 12, 2017

5:00 pm to 5:30 pm – Registration & Networking
5:30 pm to 6:30 pm – Dinner & Networking
6:30 pm to 8:30 pm – Program

More Info Register Button

Dinner Meeting Topic:

Cybercrime Case Studies and Lessons Learned

 

Business Email Compromise (BEC) is defined as a sophisticated scam targeting businesses working with foreign suppliers and/or businesses that regularly perform wire transfer payments. The scam is carried out by compromising legitimate business e-mail accounts through social engineering or computer intrusion techniques to conduct unauthorized transfers of funds. Most victims report using wire transfers as a common method of transferring funds for business purposes; however, some victims report using checks as a common method of payment. The fraudsters will use the method most commonly associated with their victim’s normal business practices. The Internet Crime Complaint Center (IC3) has been tracking BEC statistics since October, 2013. As of December 31, 2016, the total loss due to BEC crimes is approximately $5.2 Billion from over 131 different countries. In the greater Los Angeles area, the loss is estimated to be more than $5.3 million per month.


 

Michael_Sohn

 

Michael Sohn, Supervisory Special Agent, FBI

FBI Logo

Michael Sohn, Supervisory Special Agent, FBI Michael Sohn is currently leading a squad at the FBI Los Angeles Field Division that is responsible for investigating computer and high-technology crimes. His investigative experience includes cyber terrorism, nation-state and criminal cyber intrusion matters. Prior to his employment with the FBI, he worked as a Cyber Counterintelligence Officer for the Department of the Army, a Counter Terrorism officer for the Defense Intelligence Agency, a consultant at Booz Allen Hamilton and a U.S. Army Officer. Mr. Sohn received a Bachelor of Science in Computer Science from the United States Military Academy, West Point, and a Master of Science in Computer Information Systems from Boston University, Boston.

3:30-5:00 Pre-Meeting — There will be no pre-meeting


Dinner Meetings are generally the second Tuesday of each month. The exceptions are joint meetings with other groups and the summer months of July and August when we don’t meet.For Online Reservations, click the “Register” button below:

Register Button

2 CPEs for Dinner Program

Payment Methods:

Credit Card, Cash and Checks
(made payable to ISACA-LA).

Rates ISACA, IIA,
ISSA, OWASP
Members
Full-Time Students
& Faculty
(Members and Non-Members; now called “Academia”)
Non-Members
Pre-Meeting N/A N/A N/A
Dinner Meeting:

Pre-Paid online by midnight the Friday before the event

$25 $10 $35
Dinner Meeting:

Walk-Ins or Pre-Paid online after midnight the Friday before event

$35 $20 $45

Address/Directions

 

Luminarias

3500 Ramona Boulevard

Monterey Park, CA 91754

(323) 268-4177

Disclaimer

ISACA reserves the right to alter or delete items from the program in the event of unforeseen circumstances. Material has been prepared for the professional development of ISACA members and others in the IT audit, control, security, and governance community. Neither the presenters nor ISACA can warrant that the use of material presented will be adequate to discharge the legal or professional liability of the members in the conduct of their practices. All materials used in the preparation and delivery of presentations on behalf of ISACA are original materials created by the speakers, or otherwise are materials which the speakers have all rights and authority to use and/or reproduce in connection with such presentation and to grant the rights to ISACA as set forth in speaker agreement. Subject to the rights granted in the speaker agreement, all applicable copyrights, trade secrets, and other intellectual property rights in the materials are and remain with the speakers.

Please note: unauthorized recording, in any form, of presentations and workshops is prohibited.

 

Permission to be Photographed

By attending this event, the registrant grants permission to be photographed during the event. The resultant photographs may be used by ISACA for future promotion of ISACA’s educational events on ISACA’s web site and/or in printed promotional materials, and by attending this event, the registrant consents to any such use. The registrant understands any use of the photographs will be without remuneration. The registrant also waives any right to inspect or approve the aforementioned use of any photographs now or in the future.