Laserfiche WebLink
Proposal to Provide <br />CJIS Gap Assessment <br />City of South Bend <br />Crowe has been involved a number of other presentations, some examples include: <br />• "Anatomy of a Breach" at the University of Texas at Dallas Fraud Conference in 2016 <br />• "The Three Lines of Defense" at North American CACS in 2016 <br />• "Forensics Investigations" at the University of Texas at Dallas Fraud Conference in 2015 <br />• "Network Security Trends" at the AICPA National Conference in 2014 <br />• "Anatomy of a Breach" at the San Francisco ISACA Fall Conference in 2014 <br />• "Penetration Testing: Lessons Learned" for the Texas Bankers Association in 2014 <br />• "CyberSecurity Trends" at the 2013 American Bankers Association National Convention <br />• Presentations on Penetration Testing and Business Continuity at ISACA's Geek Week <br />Collegiate Cyber Defense Competition <br />The Collegiate Cyber Defense Competition is an event held annually to <br />assess an institutions student's depth of understanding and operational°�r rti. <br />competency in managing the challenges inherent in protecting a 01011 E adr, ITT <br />corporate network infrastructure and business information systems. The C,YHEPit <br />SE <br />competition is structured to score University's "Blue Team" Defense ('011 �'yll <br />p Y (Defense) � ��,��rr�-� a ui IHm+S <br />ability to defend their environment against a simulated hack coordinated <br />by the "Red Team" Professional Penetration Testers. <br />Crowe Cybersecurity Consultants have been invited to participate on the Red Team for the following <br />contests: <br />• Nationals (2018, 2017) <br />• Mid -West Region (2013 - 2017) <br />• Northeast Region (2017, 2013, 2011, 2010) <br />• Southwest Region (2017) <br />Crowe has invested a significant amount of research and development time into becoming a forefront <br />industry leader in Information Security. Our technology risk professionals have in-depth knowledge not <br />only of the industry standards for Information Security, but also the practical implementation of these <br />standards in accordance with business processes and drivers. <br />Tool Development <br />A continuous development and review process is facilitated to ensure that clients are receiving the best <br />of breed tool suites; whether commercial, in-house developed, or publicly available. A sample of the tools <br />that Crowe has contributed to the Information Security community include: <br />• cm-directory-enum (2018) <br />• echidna (2017) — Presented at DerbyCon <br />• SmuggleBus (2017) — Presented at Blackhat <br />& DerbyCon <br />• ad-Idap-enum (2016) <br />• Go-SSHscan (2016) <br />• Cracklord (2015) — Presented at Blackhat <br />• RavenHID (2014) - Presented at DerbyCon <br />• Share-Enum (2013) — Presented at DEFCON <br />Crowe recognizes that highly technical engagements such as Penetration Testing and IT Forensic <br />Assessments require significant investments of both key personnel and resources. In identifying this <br />requirement, Crowe has not only created a dedicated Cybersecurity team, but also focused that team to <br />establish the Crowe Center for Cyber Security. This Center serves as a foundation in technology <br />assessment services, ensuring that our team stays on the cutting edge of the security field. <br />&> I019 Crowe LLP ewww.rrow¢:,com <br />