INFRAGARD KEYNOTE Dan Geer CISO In-Q-Tel. CyberSecurity and National Policy

Size: px
Start display at page:

Download "INFRAGARD KEYNOTE Dan Geer CISO In-Q-Tel. CyberSecurity and National Policy"

Transcription

1 SecureWorld Inside Featured Keynotes Industry Expert Panels Conference Sessions Case Studies SecureWorld+ Training And More!... Security demands are rapidly growing while security training budgets are not. is your world secure? ATLANTA Cobb Galleria Centre April 27-28, 2010 SecureWorld delivers the most affordable, highest quality security education, training and networking right to your doorstep. Check us out on the web secureworldexpo.com Special Thanks to our Gold Sponsor April 27, 2010 April 28, 2010 OPENING KEYNOTE Kevin Richards ISSA International President The Current State of Cyber Security INFRAGARD KEYNOTE Dan Geer CISO In-Q-Tel CyberSecurity and National Policy This Event Hosted by: LUNCHEON KEYNOTE Patrick Gray Sr. Security Strategist Cisco Systems Security Threats & Trends in 2010 Sponsored by: LUNCHEON KEYNOTE Harish Agastya Director Trend Micro Think Tomorrow s Data Center Can Be Protected by Yesterday s Security? Think Again Sponsored by: TUALIZATION NT DATA LEAKAGE APPLICATION SECURITY COMPLIANCE SYSTEMS INTEGRATION ENCRYPTION BIOMETRICS WIRELESS FORENSICS ACCESS CONTROL BOTNETS VIRTUALIZATION APPLICATION SECUR DATA LEAKAGE COMPLIA RISK MANAGEMENT

2 HIGHLIGHTS April 27, :30 am OPENING KEYNOTE Kevin Richards ISSA International President The Current State of Cyber Security 10:15 am ISSA Atlanta Chapter Meeting 12:30 pm LUNCHEON KEYNOTE Patrick Gray Senior Security Strategist, Cisco Systems Security Threats & Trends in 2010 Sponsored by: Sponsored by: April 28, :30 am INFRAGARD KEYNOTE Dan Geer Hosted by: CISO, In-Q-Tel CyberSecurity and National Policy 12:00 pm ISACA Atlanta Chapter Meeting 12:15 pm LUNCHEON KEYNOTE Harish Agastya Director, Trend Micro Think Tomorrow s Datacenter can be Protected by Yesterday s Security? Think Again 1:00 pm ACP Atlanta Chapter Meeting SecureWorld+ Training Practical Application of Key Information Assurance Concepts The objective of the session is to provide attendees with the knowledge and tools need to implement three key risk management concepts. Real world examples of Business Impact Analysis methodology, Project Impact Analysis and Gap Analysis will be presented. (Earn 16 CPE CREDITS) Effective, Focused Awareness In this three-pronged session, we ll focus on improving the security awareness and behavior of all our users, including executive staff. We ll provide some practical ideas and techniques for delivering security training, customized according to your audience. We ll also cover how to plan and execute a program that s right for your specific organizational environment and budget. Includes SWE Conference Pass, Conference Sessions, Keynotes, Exhibits, Open Sessions and Lunch Each Day

3 TWO DAY CONFERENCE - $245 Conference Sessions, Conference Keynotes, Exhibits, Open Sessions, Lunch and 12 CPE Cert cate of Attendence. SECUREWORLD+ - $695 Extended Training Opportunities - Conference Sessions, Keynotes, Exhibits, Open Sessions, Lunch and a 16 CPE Certi cate of Attendence EXHIBITS/OPEN SESSIONS - FREE Exhibits, Keynotes and Open Sessions INVITATION ONLY 70 7:00am0am :00pm0pm Registration tion 8:00am - 9:00am Executive Steering Council Breakfast: Security and Modern Applications Ballroom D Dennis Hurst (Invitation Only) Sponsored by Voltage Security 8:00am - 9:30am SecureWorld+Practical Application of Key Information Assurance Concepts (Part 1) SecureWorld+ Effective, Focused Awareness (Part 1) :30am - 9:15am Applied Compliance Getting Out of the Trenches From Autopsy to Physical Exam: The Changing Face of Digital Forensics Soft Skills for Information Security Professionals Keyaan Williams Martin Fisher Richard Austin David Billeter 9:00am - 3:00pm Exhibit Floor Open Exhibit Hall 9:30am - 10:15am Opening Keynote:The Current State of Cyber Security Keynote Theater Kevin Richards 10:15am - 11:30am Conference Break/Product Demonstrations/Pub Crawl - Exhibit Floor Exhibit Hall 10:15am - 10:45am Atlanta ISSA Chapter Meeting Sponsored by Trend Micro Ballroom D Kevin Richards 11:15am - 12:15pm Executive Roundtable: Managing a Data Breach (Invitation Only) 115 Richard Mims 11:30am - 12:15pm The Trusted, Dynamic Enterprise, a Blueprint for Enterprise Security Presentation Alcatel-Lucent Theater 11:30am - 12:15pm Assessing Your IT Operational Security Processes Emerging Trends in Data Security and Privacy Regulations PCI Compliance - A Practical Approach Pete Chronis Getting Everyone on the Same Security Page Information Security for the Traveling Executive 116 David Keating Muzaffar Chaudhary Katherine Fithen Roy Wilkinson 12:15pm - 1:15pm Executive Roundtable: Security Metrics (Invitation Only) 115 Darryl Defendorf 12:15pm - 1:00pm Luncheon Keynote: Security Threats & Trends in 2010 Keynote Theater Patrick Gray 1:15pm - 2:00pm Industry Expert Panel: Data Protection- Walking the Thin Line Between Employee Productivity and Security Industry Expert Panel: Network Security-Finding the Right Management Program Industry Expert Panel: Effective Compliance Management in Today s Workplace Keynote Theater Presentation Theater Phil Agcaoili Muzaffar Chaudhary 2:00pm - 3:00pm Conference Dessert Break/Product Demonstration/ Pub Crawl - Exhibit Exhibit Hall Floor 3:00pm - 5:30pm SecureWorld Expo Conference Reception 3:00pm - 3:45pm 3:00pm - 4:30pm Day 1 - April 27, 2010 TIME CONFERENCE ROOM # SPEAKER(S) Disruptive Technologies Which Part of a Prickly Pear is the End Point? Cloud Security Alliance: Securing the Present and Future of Cloud Computing Networking - Key Element of Career Management Success SecureWorld+Practical Application of Key Information Assurance Concepts (Part 2) SecureWorld+ Effective, Focused Awareness (Part 2) Nanette Poulios Michael Rosenstock Dennis Hurst Kathy Booe-Kiser Check us out on the web: secureworldexpo.com

4 Day 1 - April 27, 2010 Conference Details 7:00am - Registration Opens 8:00am - 9:00am - Room Ballroom D Executive Steering Council Breakfast: Security and Modern Applications (Invitation Only) Sponsored by Voltage Security Dennis Hurst, Founding Member, Cloud Security Alliance 8:00am - 9:30am - Room 111 SecureWorld+ Training:Practical Application of Key Information Assurance Concepts (Part 1), Security Sage The objective of the session is to provide attendees with the knowledge and tools need to implement three key risk management concepts. Real world examples of Business Impact Analysis methodology, Project Impact Analysis and Gap Analysis will be presented. 8:00am - 9:30am - Room 115 SecureWorld+ Training: Effective, Focused Awareness (Part 1) John O Leary, President, O Leary Management Education In this three-pronged session, we ll focus on improving the security awareness and behavior of all our users, including executive staff. We ll provide some practical ideas and techniques for delivering security training, customized according to your audience. We ll also cover how to plan and execute a program that s right for your specifi c organizational environment and budget. 8:30am - 9:15am - Room Applied Compliance Keyaan Williams, Director of Association Relations, Metro Atlanta ISSA This presentation provides practical advice regarding the implementation of an effective compliance program, regardless of the regulation that applies to your organization. The presentation will examine the true meaning of compliance, the reasons that compliance matters, and the benefits of adopting an applied approach to solving the compliance problem. 8:30am - 9:15am - Room Getting Out of the Trenches Martin Fisher, Manager, CSIRT Team, Delta Air Lines Looking at history can provide insight to the present and the future. In this talk we compare the situation on the Western Front during World War One to the current state of information security and what that may mean for people, processes, and tools as infosec moves farther into the 21st Century. 8:30am - 9:15am - Room From Autopsy to Physical Exam: The Changing Face of Digital Forensics Richard Austin, Part-Time Instructor, Dept. of Computer Science and Information Systems, Kennesaw State University, Adj. Professor, Dept. of Information Technology, Southern Polytechnic State University The traditional practice of digital forensics has rather resembled an autopsy in that examination has focused on cold, dead disks but this is changing as practitioners begin to recognize the wealth of information that can be gleaned from the running system. This presentation will briefly review the practice and capabilities of live memory and registry analysis that are enhancing the practitioners toolbox to make a physical exam a more practicable part of forensic practice. 8:30am - 9:15am - Room Soft Skills for Information Security Professionals David Billeter, Vice President, Information Security, InterContinental Hotels Group How to say more than no. In this presentation we will look at some skills that information security professionals can use to work more effectively with business and technical peers, and build foundations that allow security to help teams succeed. 9:00am - 3:00pm Exhibit Hall Exhibit Floor Open 9:30am - 10:15am - Keynote Theater - Exhibit Floor Opening Keynote: The Current State of Cyber Security Kevin Richards, President, ISSA International 10:15am - 11:30am - Exhibit Hall Conference Break/Exhibitor Product Demonstrations/ Pub Crawl 10:15am - 10:45am - Room Ballroom D ISSA Chapter Meeting Sponsored by Trend Micro Kevin Richards, President, ISSA International 11:15am - 12:15pm - Room 115 (Invitation Only) Executive Roundtable: Managing a Data Breach Robert Mims, Director, Information Security, AGL Resources 11:30am - 12:15pm - Presentation Theater - Exhibit Floor The Trusted, Dynamic Enterprise, a Blueprint for Enterprise Security Dr. Cliff Grossner, Director Strategic Marketing, Enterprise Security, Alcatel-Lucent Securing communications for all voice and data applications as well as employee mobility is the key to supporting new business models and enabling a trusted dynamic enterprise that competes effectively in today s business environment. Rapid advances in communications technology have been accompanied by an equally rapid multiplication in security threats, the growth of cybercrime, and the introduction of new security regulations. To take advantage of the latest business models and ensure they are still protected enterprises must change how they view security. Security must become a positive enabler for driving business performance. Learn about how your network can be a security instrument delivering security to protect your corporation. 11:30am - 12:15pm - Room Assessing Your IT Operational Security Processes Peter Chronis, Senior Manager, Enterprise Information Security, EarthLink, Inc. The presentation is focused on identifying and assessing the effectiveness of an organization s IT security processes and programs, identifying gaps and developing effective mitigation strategies. 11:30am - 12:15pm - Room Emerging Trends in Data Security and Privacy Regulations David Keating, Attorney at Law, Partner, Alston & Bird LLP The presentation will focus on recent developments at the state and federal level in the area of data security and data privacy. The presentation will include a discussion of compliance strategies and approaches for managing data security requirements in customer and vendor agreements. 11:30am - 12:15pm - Room PCI Compliance - A Practical Approach Muzaffar Chaudhary, Information Security Officer, Hartsfield- Jackson Atlanta International AirportJoin Muzaffar Chaudhary for a discussion focusing on the current requirements and Compliance time line. Topics will include; PCI Stakeholder & Relationships, Creating a framework to achieve PCI compliance, Performing a Risk analysis and Identifying PCI data in your organization, Align your business processes to achieve compliance, are you prepared if you have a PCI breach? What you need to know.

5 TWO DAY CONFERENCE SECUREWORLD+ EXHIBITS/OPEN SESSIONS INVITATION ONLY 11:30am - 12:15pm - Room Information Security for the Traveling Executive Roy Wilkinson, President Emeritus, Atlanta ISSA 11:30am - 12:15pm - Room 116 Getting Everyone on the Same Security Page Katherine Fithen, Senior Manager, Information Security & Regulatory Compliance, Global IT, The Coca-Cola Company How do you get your business owners, your legal counsel, your HR department, your IT department, and all your employees on the same page when it comes to security requirements? Everyone agrees security is important until it impacts their normal processes, and then it is burdensome. 12:15pm - 1:15pm - Room 115 (Invitation Only) Executive Roundtable: Security Metrics Darryl Defendorf, Sr. Manager, IT Risk Management & Compliance, McKesson 12:30pm - 1:00pm - Keynote Theater - Exhibit Floor Luncheon Keynote: Security Threats & Trends in 2010 Patrick Gray, Senior Security Strategist, Cisco Systems 1:15pm - 2:00pm - Keynote Theater - Exhibit Floor Industry Expert Panel: Data Protection- Walking the Thin Line Between Employee Productivity and Security Managing and securing your data is becoming more complicated each day with the demands of today s fast-paced world. How can you adequately protect it and at the same time allow for your employees to access it for work related use? This panel will discuss possible data protection issues and steps to take to help you secure one of your most important company assets; your data. 1:15pm - 2:00pm - Room Industry Expert Panel:Network Security-Finding the Right Management Program With all of the recent threats and security breach scenarios, it is necessary to create a network that is secure and manageable. This panel discussion will examine the important steps and tools required for increased network security and manageability. 1:15pm - 2:00pm - Presentation Theater - Exhibit Floor Industry Expert Panel: Effective Compliance Management in Today s Workplace PCI, SOX, HIPAA, GLBA; these acronyms can cause a lot of stress for today s IT professional. Join this panel for a look at the recent developments in compliance regulations and what you should be doing to ensure you are meeting them and have effective plans in place 2:00pm - 3:00pm - Exhibit Hall Conference Dessert Break/Exhibitor Product Demonstrations/ Pub Crawl 3:00pm - 5:30pm SecureWorld Expo Conference Reception 3:00pm - 3:45pm - Room Disruptive Technologies Nanette Poulios, Director Information Assurance Center, Walsh College As technology rapidly advances, some view emerging technology as disruptive to normal business operations. Others welcome these new products as collaborative tools edging the business towards increased profi tability. Whether embraced by the organization or not, these emerging technologies penetrate our organizations and affect the security and privacy of our information and systems. This session will explore the implications and security of some of these collaborative tools and emerging technologies. As security and compliance practitioners, we will discuss how to secure collaborative tools such as wiki s, cloud computing, blogs, GPS, hand held devices and other disruptive technologies. 3:00pm - 3:45pm - Room Which Part of a Prickly Pear is the End Point? Michael Rosenstock, ESET For the It professional trying to secure the end point their job has become a game of catch with a prickly pear. The proper use of technology, policy, and education can be the defense you need to survive the game. 3:00pm - 3:45pm - Room Networking - Key Element of Career Management Success Kathy Booe-Kiser, Executive Coach, OI Partners Career Management is a continuous process, with interlinking elements key to your success. To succeed in today s dynamic work environment, you must take responsibility for managing your own career. In addition to developing technical and leadership skills, an important element of your career management is building relationships or by another name networking. It takes time and effort to establish a professional network that can have a significant impact on your career. In this discussion, we will look at ways of building an effective network and engaging that network in your career management success. 3:00pm - 3:45pm - Room Cloud Security Alliance: Securing the Present and Future of Cloud Computing Dennis Hurst, Founding Member, Cloud Security Alliance In this presentation, The Cloud Security Alliance will provide an overview of the key security considerations enterprises should consider when investigating adoption of cloud computing services. He will also provide a look ahead to how cloud computing may transform business and the nature of IT, and provide an update from the Cloud Security Alliance in its goal to establish a comprehensive set of best practices for securing these emerging technologies. 3:00pm - 4:30pm -Room 111 SecureWorld+ Training:Practical Application of Key Information Assurance Concepts (Part 2), Security Sage 3:00pm - 4:30pm - Room 115 SecureWorld+ Training: Effective, Focused Awareness (Part 2), President, O Leary Management Education Check us out on the web: secureworldexpo.com

6 Day 2 - April 28, 2010 TIME CONFERENCE ROOM # SPEAKER(S) 7:00am0am - 2:30pm Registration ion 8:00 am - 9:30am SecureWorld+Practical Application of Key Information Assurance Concepts (Part 3) SecureWorld+ Effective, Focused Awareness (Part 3) 8:30am - 9:15am Economic Crimes Using Electronic Means War Driving in 2010 and Beyond: Drive, Detect, and Defend for Wireless Networks Current Trends in Authentication Practices for Online Applications Information Classifi cation and Handling The First Step to an Phillip Hurd Alan Nutes Herb Mattord Chris Bullock Effective Information Security Framework 8:30am - 9:15am InfraGard Chapter Meeting: FBI Strategic Partnership Program & The Keynote Theater Gerald Becknell InfraGard - Research Technology Protection (RTP) 9:00am - 2:30pm Exhibit Floor Open Exhibit Hall 9:30am - 10:15am InfraGard Keynote: CyberSecurity and National Policy Keynote Theater Dan Geer 10:15am - 11:15am Conference Break/ Product Demonstrations-Exhibit Floor Exhibit Hall 10:45am - 11:45am Executive Roundtable:Cloud Computing and the Enterprise 115 Martin Fisher (Invitation Only) 11:15am - 12:00pm Integrating Records Retention and e-discovery Be The Bridge Knowledge + Malice = Chaos: When Awareness Doesn t Work The Well Rounded Security Professional: Security Professional Development from One Practitioner s Perspective Retrofi tting FISMA to an Existing System in Georgia 116 Janeine Charpiat Mick Williams Roger Dixon Mark Reardon 11:45am - 12:45pm Executive Roundtable: Effective Risk Management in Today s Risky 115 Scott Woodison World (Invitation Only) 12:00pm - 4:00pm ISACA Atlanta Chapter Meeting Ballroom D 12:00pm - 12:45pm Luncheon Keynote: Think Tomorrow s Datacenter Can Be Protected By Keynote Theater Harish Agastya Yesterday s Security? Think Again. 1:00pm - 3:00pm ACP Chapter Meeting 101 1:00pm - 1:45pm Industry Expert Panel: Directing Managed Services: Look Before you Leap Into the Cloud Industry Expert Panel: Protecting Your Endpoint Security Assets Industry Expert Panel: Data Privacy- Keeping Your Information Out of the Wrong Hands Presentation Theater Keynote Theater 1:45pm - 2:30pm Conference Dessert Break/Product Demonstration - Exhibits Floor Exhibit Hall 2:00pm - 2:30pm SecureWorld Expo: Dash for Prizes Exhibit Hall 2:30pm - 3:15pm United States Secret Service Cyber Crime Briefi ng Best Practices for Internet Domain Name Protection Threats to Information Security: Know your Enemy Resolving the Confl ict over Workplace Privacy and Employee Monitoring Roger Dixon James Baird Jonathan Jacobs Lynn Goodendorf Mike Whitman Conference Details 7:00am - Registration Opens 8:00am - 9:30am - Room 111 SecureWorld+ Training Practical Application of Key Information Assurance Concepts (Part 3), Security Sage 8:00am - 9:30am - Room 115 SecureWorld+ Training Effective, Focused Awareness (Part 3) John G. O Leary, President, O Leary Management Education 8:30am - 9:15am - Keynote Theater InfraGard Chapter Meeting: FBI Strategic Partnership Program & The InfraGard - Research Technology Protection (RTP) Gerald Becknell 8:30am - 9:15am - Room Economic Crimes Using Electronic Means Phillip Hurd, Chief Audit Executive, Director of Internal Auditing, Georgia Institute of Technology The session will focus on global crime statistics and how economic fraud is perpetrated through electronic means. Four real world fraud cases will be used to illustrate several modern economic crime schemes and how to identify them. The key fraud scheme will be a simple crime scheme that anyone can do that appears proper. 8:30am - 9:15am - Room Current Trends in Authentication Practices for Online Applications Herbert J. Mattord, Operations Manager, KSU Center for Information Security Education and Awareness, Kennesaw State University Online applications have become ubiquitous and userid/password access control remains firmly in the forefront. This session will take a high-level look at the authentication practices used by some of the online applications encountered by typical users to illustrate the good, the bad and the ugly among current practices. The technical controls used to control access will be identified and discussed. Tradeoff issues that govern which controls are used in various circumstances will also be explored.

7 8:30am - 9:15am - Room War Driving in 2010 and Beyond: Drive, Detect, and Defend for Wireless Networks Alan Nutes, Security Manager, Department of Watershed Management This presentation is designed to provide participants an understanding of the techniques used by individuals to locate and hack into an organizations wireless network and to provide safeguards. With the increasing use of wireless access points for computer networks accessed by numerous types of devices, the possibility of exploiting the exposures and vulnerabilities of these systems is becoming more prevalent. Learn the basics of wireless networks, the controls that exist, the techniques used by perpetrators and further enhancements to providing a more secure environment. 8:30am - 9:15am - Room Information Classifi cation and Handling The First Step to an Effective Information Security Framework Chris Bullock, Dir. of Information Technology and Software Security,Georgia Lottery Corporation Information Classifi cation and Handling is the key fi rst step and building block in the design and implementation of an effective information security program. This presentation will discuss why information classifi cation and handling is vital to ensuring an organization s information assets are properly protected, how to deploy effective information classifi cation and handling program and will analyze some major case studies of sensitive information breaches. 9:00am - 2:30pm - Exhibit Hall Exhibit Floor Open 9:30am - 10:15am - Keynote Theater InfraGard Keynote: CyberSecurity and National Policy Dan Geer, CISO, In-Q-Tel 10:15am - 11:15am - Exhibit Hall Conference Break/Exhibitor Product Demonstrations 10:45am - 11:45am - Room 115 Executive Roundtable:Cloud Computing and the Enterprise (Invitation Only) Martin Fisher, Manager, Computer Security Incident Response Team, Delta Air Lines 11:15am - 12:00pm - Room Integrating Records Retention and e-discovery Janeine Charpiat, Incident Response Manager, Information Security, McKesson This presentation is designed to help organizations better understand the synergies between records management and e-discovery. It is important that organizations look beyond the baseline objectives of developing retention policies and schedules and rather recalibrate toward focusing on the effective management of records that both prepares them for e-discovery and supports their overall informationrelated business goals. 11:15am - 12:00pm - Room Retrofitting FISMA to an Existing System in Georgia Mark Reardon, CISO, Georgia Technology Authority In 2008, the state of Georgia adopted the federal information security management act s (FISMA s) risk management framework for use with all of its information systems. This appears to be straightforward for new systems, but how does a security organization retrofi t an existing system? Retrofitting at fi rst appears daunting but in fact is very similar to supporting a new system with FISMA.This presentation will recommend how to approach the retrofit situation, who needs to be involved, and how to prioritize appropriate actions. 11:15am - 12:00pm - Room 116 Be The Bridge Mick Williams, Information Security Officer, Person s Banking Company, Inc The gap between IT and Management in relation to spending and needs must be bridged for a successful existence. We, as IT professionals, must use tools and common language to mesh IT and business management into one accord. We will go over common failures of IT professionals when discussing needs with management and also delve into what really works to get them and us crossing the bridge, together. 11:15am - 12:00pm - Room Knowledge + Malice = Chaos: When Awareness Doesn t Work John G. O Leary, President, O Leary Management Education On Nov. 5, 2008, two Los Angeles traffic engineers pled guilty to illegally accessing a city computer. On Aug 21, 2006, they hacked a traffic computer to disconnect four signal control boxes at critical intersections. It took 4 days for LA traffic to recover its usual semi-controlled, semi-chaotic state. The plea bargain delivered minimal penalties, but possible consequences of similar exploits in the future are mind-boggling. We ll analyze this internal incident, ask questions, and pose some what if scenarios. 11:15am - 12:00pm - Room The Well Rounded Security Professional: Security Professional Development from One Practitioner s Perspective Roger S. Dixon, Head of Information Security - North America, Invesco Ltd. In these challenging economic times companies are looking to get the best possible value out of every dollar spent, with cost saving sometimes unfortunately coming from personnel cuts. Drawing on his observations of the security industry and numerous years of experience, this discussion will take a look at some professional development activities from the presenter s perspective that can lead to a more rounded security professional, improve the value package from a company s perspective, and enhance individual careers. 11:45am - 12:45pm - Room 115 Executive Roundtable:Effective Risk Management in Today s Risky World (Invitation Only) Scott C. Woodison, Director, IT Audit, Board of Regents, University Systems of Georgia 12:00pm - 4:00pm - Ballroom D ISACA Atlanta Chapter Meeting 12:00pm - 12:45pm - Keynote Theater Luncheon Keynote: Think Tomorrow s Datacenter Can Be Protected By Yesterday s Security? Think Again. Harish Agastya, Director, Trend Micro 1:00pm - 3:00pm - Room 101 ACP Chapter Meeting 1:00pm - 1:45pm - Presentation Theater Industry Expert Panel: Directing Managed Services: Look Before you Leap Into the Cloud This panel will take a look at the components of managed services programs such as cloud computing, SaaS and Virtualization and highlight what you should be looking for and how to sift through and determine the best program for your needs. 1:00pm - 1:45pm - Industry Expert Panel: Data Privacy- Keeping Your Information Out of the Wrong Hands Your customers and clients need to know their private data is safe with you and won t be shared. How do you ensure that this is the case? What recent legislation must you be aware of related to your data privacy plans? This panel will take a look at some of the elements needed to successfully keep your data private and in compliance with new regulations mandated. 1:00pm - 1:45pm - Keynote Theater Industry Expert Panel: Protecting Your Endpoint Security Assets The equipment that your employees rely on can be one of the most vulnerable points of attack and intrusion. What can you do to help protect them? What requirements and systems should you put in place to prevent a security disruption? This panel will take a look at some elements that should be implemented to create and maintain endpoint security. 1:45pm - 2:30pm - Exhibit Hall Conference Dessert Break/Exhibitor Product Demonstrations 2:00pm - 2:30pm - Exhibit Hall SecureWorld Expo: Dash for Prizes 2:30pm - 3:15pm - Room United States Secret Service Briefi ng Jonathan Jacobs, Special Agent, United States Secret Service 2:30pm - 3:15pm - Room Best Practices for Internet Domain Name Protection Lynn Goodendorf, Good Security Consulting This session will cover the 10 best practices for protecting brand names on the Internet by effective management of a domain name portfolio. 2:30pm - 3:15pm - Room Threats to Information Security: Know your Enemy Michael E. Whitman, Director- Center for Information Security Education, Kennesaw State University In this presentation, Dr. Mike Whitman will discuss the results of a recent study which asked industry top computing executives to identify and rank the threats to their information security. Dr. Whitman will compare these results to those of a previous study in The presentation will also include discussions of industry efforts in selecting information security standards, risk management practices and security metrics. 2:30pm - 3:15pm - Room Resolving the Confl ict over Workplace Privacy and Employee Monitoring, Security Sage Employers want to be sure their employees are doing a good job, but employees don t want their every move or message logged. That s the essential confl ict of workplace monitoring. New technologies make it possible for employers to monitor many aspects of their employees jobs. Such monitoring is virtually unregulated. Therefore, unless company policy specifi cally states otherwise employers may listen, watch and read most of employees workplace communications. In this session we will examine what an employer can do and what they should do to make the workplace safe and the employees secure in the knowledge that there is really little expectation of privacy. Check us out on the web: secureworldexpo.com

8 Our business is to secure your business. Fast, Effective, Proactive, Antivirus and Antispyware Our award-winning proactive threat-detection technology delivers the most effective protection from viruses, spyware, and other Internet threats. ESET software blocks most threats the moment they are released, avoiding detection latency common to competing products. And with super-fast, super-easy operation, we keep your users productive, and your help-desk load down. Experience the difference for your business; request a Free Business Edition Trial ESET, LLC. All rights reserved. Trademarks used herein are trademarks or registered trademarks of ESET, LLC. All other names and brands are registered trademarks of their respective companies. Thanks to Our Sponsors

About Our 2015 WTA Cyber Security Speakers and Sessions

About Our 2015 WTA Cyber Security Speakers and Sessions About Our 2015 WTA Cyber Security Speakers and Sessions The constant threat of cyber security attacks is the number one concern for most businesses today. Weaknesses in networks and data security can expose

More information

Tuesday, August 19th Prevent, Detect, Respond: A Framework for Effective Cyber Defense Dr. Eric Cole, Fellow, SANS Institute

Tuesday, August 19th Prevent, Detect, Respond: A Framework for Effective Cyber Defense Dr. Eric Cole, Fellow, SANS Institute Tuesday, August 19 th 9:00-9:45 am Keynote Address Prevent, Detect, Respond: A Framework for Effective Cyber Defense Security is now a mainstay of boardroom discussions. However, many organizations remain

More information

Address C-level Cybersecurity issues to enable and secure Digital transformation

Address C-level Cybersecurity issues to enable and secure Digital transformation Home Overview Challenges Global Resource Growth Impacting Industries Address C-level Cybersecurity issues to enable and secure Digital transformation We support cybersecurity transformations with assessments,

More information

Pocket E-Guide. Sponsored By:

Pocket E-Guide. Sponsored By: Pocket E-Guide Endpoint security suites: What to consider before renewal The shift to Web-based malware and the explosive growth in the amount of threats has forced organizations to move away from signature-based

More information

e-discovery Conference

e-discovery Conference Information Security & Protection Seminar June 15, 2011 8:00 a.m. to 3:30 p.m. Presented by: ARMA Greater Indianapolis Chapter Session 1: Physical Security, & Handling Classified Information Overview Rolls-Royce

More information

Dallas, TX September 10. Chairman: Lance Spitzner

Dallas, TX September 10. Chairman: Lance Spitzner Dallas, TX September 10 Chairman: Lance Spitzner AGENDA All Summit Sessions will be held in the Vista Ballroom (unless noted). All approved presentations will be available online following the Summit

More information

AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE

AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE THE CHALLENGE: SECURE THE OPEN AIR Wirelesss communication lets you take your business wherever your customers,

More information

KEY TRENDS AND DRIVERS OF SECURITY

KEY TRENDS AND DRIVERS OF SECURITY CYBERSECURITY: ISSUES AND ISACA S RESPONSE Speaker: Renato Burazer, CISA,CISM,CRISC,CGEIT,CISSP KEY TRENDS AND DRIVERS OF SECURITY Consumerization Emerging Trends Continual Regulatory and Compliance Pressures

More information

Cyber crime risk management protecting your business 4 November 2015

Cyber crime risk management protecting your business 4 November 2015 Cyber crime risk management protecting your business 4 November 2015 Programme genda (updated 26 Oct) 7.15 am 8.25 am Registration Networking breakfast sponsored by 8.25 am 8.30 am Welcome remarks by MC

More information

Threat and Vulnerability Management (TVM) Protecting IT assets through a comprehensive program. Chicago IIA/ISACA

Threat and Vulnerability Management (TVM) Protecting IT assets through a comprehensive program. Chicago IIA/ISACA www.pwc.com Vulnerability Management (TVM) Protecting IT assets through a comprehensive program Chicago IIA/ISACA 2 nd Annual Hacking Conference Introductions Paul Hinds Managing Director Cybersecurity

More information

INSIGHTS AND RESOURCES FOR THE CYBERSECURITY PROFESSIONAL

INSIGHTS AND RESOURCES FOR THE CYBERSECURITY PROFESSIONAL INSIGHTS AND RESOURCES FOR THE CYBERSECURITY PROFESSIONAL BY 2 In enterprise IT, there is a single point where everything that matters in information, technology and business converges: Cybersecurity Nexus

More information

08/10/2013. Data protection and compliance. Agenda. Data protection life cycle and goals. Introduction. Data protection overview

08/10/2013. Data protection and compliance. Agenda. Data protection life cycle and goals. Introduction. Data protection overview Data protection and compliance In the cloud and in your data center 1 November 2013 Agenda 1 Introduction 2 Data protection overview 3 Understanding the cloud 4 Where do I start? 5 Wrap-up Page 2 Data

More information

Over 20 years experience in Information Security Management, Risk Management, Third Party Oversight and IT Audit.

Over 20 years experience in Information Security Management, Risk Management, Third Party Oversight and IT Audit. CYBERSECURITY: ISSUES AND ISACA S RESPONSE June 2014 BILL S BIO Over 20 years experience in Information Security Management, Risk Management, Third Party Oversight and IT Audit. Vice President Controls

More information

THE WORLD IS MOVING FAST, SECURITY FASTER.

THE WORLD IS MOVING FAST, SECURITY FASTER. THE WORLD IS MOVING FAST, SECURITY FASTER. * COMMITTED TO SECURITY* *Committed to providing peace of mind in your digital life and business. [ 3 ] OUR MISSION TO PREVENT AND MANAGE RISKS FACED BY ORGANIZATIONS

More information

Making our Cyber Space Safe

Making our Cyber Space Safe Making our Cyber Space Safe Ghana s Emerging Cyber Security Policy & Strategy William Tevie Director General 5/28/2014 1 Agenda Cyber Security Issues Background to Policy Target Audience for Framework

More information

Nine Steps to Smart Security for Small Businesses

Nine Steps to Smart Security for Small Businesses Nine Steps to Smart Security for Small Businesses by David Lacey Co-Founder, Jericho Forum Courtesy of TABLE OF CONTENTS INTRODUCTION... 1 WHY SHOULD I BOTHER?... 1 AREN T FIREWALLS AND ANTI-VIRUS ENOUGH?...

More information

I n f o r m a t i o n S e c u r i t y

I n f o r m a t i o n S e c u r i t y We help organizations protect INFORMATION The BorderHawk Team has significant experience assessing, analyzing, and designing information protection programs especially in Critical Infrastructure environments.

More information

Cyber Risk and Insurance What companies need to know

Cyber Risk and Insurance What companies need to know Supported by The Security Institute Cyber Risk and Insurance What companies need to know Organised by Produced by Central London Supported by About the Conference Who should attend Estimates as to the

More information

Cyber Resilience Implementing the Right Strategy. Grant Brown Security specialist, CISSP @TheGrantBrown

Cyber Resilience Implementing the Right Strategy. Grant Brown Security specialist, CISSP @TheGrantBrown Cyber Resilience Implementing the Right Strategy Grant Brown specialist, CISSP @TheGrantBrown 1 2 Network + Technology + Customers = $$ 3 Perfect Storm? 1) Increase in Bandwidth (extended reach) 2) Available

More information

AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE

AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE THE CHALLENGE: SECURE THE OPEN AIR Wirelesss communication lets you take your business wherever your customers,

More information

The Value of Vulnerability Management*

The Value of Vulnerability Management* The Value of Vulnerability Management* *ISACA/IIA Dallas Presented by: Robert Buchheit, Director Advisory Practice, Dallas Ricky Allen, Manager Advisory Practice, Houston *connectedthinking PwC Agenda

More information

Cyber Insurance: How to Investigate the Right Coverage for Your Company

Cyber Insurance: How to Investigate the Right Coverage for Your Company 6-11-2015 Cyber Insurance: How to Investigate the Right Coverage for Your Company Presented by: Faith M. Heikkila, Ph.D., CISM, CIPM, CIPP-US, ABCP Greenleaf Trust Chief Information Security Officer (CISO)

More information

CYBER SECURITY TRAINING SAFE AND SECURE

CYBER SECURITY TRAINING SAFE AND SECURE CYBER SECURITY TRAINING KEEPING YOU SAFE AND SECURE Experts in Cyber Security training. Hardly a day goes by without a cyber attack being reported. With this ever-increasing threat there is a growing need

More information

Analyzing Security for Retailers An analysis of what retailers can do to improve their network security

Analyzing Security for Retailers An analysis of what retailers can do to improve their network security Analyzing Security for Retailers An analysis of what retailers can do to improve their network security Clone Systems Business Security Intelligence Properly Secure Every Business Network Executive Summary

More information

The Evolution of Application Monitoring

The Evolution of Application Monitoring The Evolution of Application Monitoring Narayan Makaram, CISSP, Director, Solutions Marketing, HP Enterprise Security Business Unit, May 18 th, 2012 Rise of the cyber threat Enterprises and Governments

More information

CYBERSECURITY: Is Your Business Ready?

CYBERSECURITY: Is Your Business Ready? CYBERSECURITY: Is Your Business Ready? Cybersecurity: Is your business ready? Cyber risk is just like any other corporate risk and it must be managed from the top. An organization will spend time monitoring

More information

Cyber Threats Insights from history and current operations. Prepared by Cognitio May 5, 2015

Cyber Threats Insights from history and current operations. Prepared by Cognitio May 5, 2015 Cyber Threats Insights from history and current operations Prepared by Cognitio May 5, 2015 About Cognitio Cognitio is a strategic consulting and engineering firm led by a team of former senior technology

More information

Why Email Encryption is Essential to the Safety of Your Business

Why Email Encryption is Essential to the Safety of Your Business Why Email Encryption is Essential to the Safety of Your Business What We ll Cover Email is Like a Postcard o The Cost of Unsecured Email 5 Steps to Implement Email Encryption o Know Your Compliance Regulations

More information

RETHINKING CYBER SECURITY Changing the Business Conversation

RETHINKING CYBER SECURITY Changing the Business Conversation RETHINKING CYBER SECURITY Changing the Business Conversation October 2015 Introduction: Diane Smith Michigan Delegate Higher Education Conference Speaker Board Member 2 1 1. Historical Review Agenda 2.

More information

Information Security Incident Management Guidelines

Information Security Incident Management Guidelines Information Security Incident Management Guidelines INFORMATION TECHNOLOGY SECURITY SERVICES http://safecomputing.umich.edu Version #1.0, June 21, 2006 Copyright 2006 by The Regents of The University of

More information

2015 Combined Chapter Educational Conference

2015 Combined Chapter Educational Conference Thursday, September 10, 2015 11:30am 1:00pm Conference Registration, Lunch & Networking Sponsored by Platinum Sponsor: SAP 1:00 1:20pm Welcome & General Business Session Welcome, announcements, introduction

More information

CYBERSECURITY BEST PRACTICES FOR SMALL AND MEDIUM PENNSYLVANIA UTILITIES

CYBERSECURITY BEST PRACTICES FOR SMALL AND MEDIUM PENNSYLVANIA UTILITIES CYBERSECURITY BEST PRACTICES FOR SMALL AND MEDIUM PENNSYLVANIA UTILITIES The information provided in this document is presented as a courtesy to be used for informational purposes only. This information

More information

National Railroad Passenger Corp. (AMTRAK) Session 1 Threats and Constraints. Continuous. - Continuous Monitoring. - Continuous Assessment

National Railroad Passenger Corp. (AMTRAK) Session 1 Threats and Constraints. Continuous. - Continuous Monitoring. - Continuous Assessment 0 National Railroad Passenger Corp. (AMTRAK) Session 1 Threats and Constraints Continuous - Continuous Monitoring - Continuous Assessment - Continuous Education 1 Amtrak Information Security Challenges

More information

IT risk management discussion 2013 PIAA Leadership Camp May 15, 2013

IT risk management discussion 2013 PIAA Leadership Camp May 15, 2013 IT risk management discussion 2013 PIAA Leadership Camp May 15, 2013 Debbie Lew Agenda Review what is IT governance Review what is IT risk management A discussion of key IT risks to be aware of Page 2

More information

Into the cybersecurity breach

Into the cybersecurity breach Into the cybersecurity breach Tim Sanouvong State Sector Cyber Risk Services Deloitte & Touche LLP April 3, 2015 Agenda Setting the stage Cyber risks in state governments Cyber attack vectors Preparing

More information

Cyber Security and Information Assurance Controls Prevention and Reaction NOVEMBER 2013

Cyber Security and Information Assurance Controls Prevention and Reaction NOVEMBER 2013 Cyber Security and Information Assurance Controls Prevention and Reaction 1 About Enterprise Risk Management Capabilities Cyber Security Risk Management Information Assurance Strategic Governance Regulatory

More information

is your world secure? OPENING KEYNOTE CISO, GE Capital Commercial Finance Social Networking and the Consumer Cloud Are You Ready? And More!

is your world secure? OPENING KEYNOTE CISO, GE Capital Commercial Finance Social Networking and the Consumer Cloud Are You Ready? And More! is your world secure? DALLAS Plano Convention Centre NOVEMBER 3-4, 2010 Inside SecureWorld: November 3, 2010 Featured Keynotes Industry Expert Panels Conference Sessions November 4, 2010 OPENING KEYNOTE

More information

ISSA Women in Security Special Interest Group (WIS SIG)

ISSA Women in Security Special Interest Group (WIS SIG) ISSA International Woman in Security Special Interest Group ISSA International Conference Events October 12-13, 2015 Chicago, Illinois Mission Creating Leaders Together ISSA WIS SIG embraces a spirit of

More information

Report on CAP Cybersecurity November 5, 2015

Report on CAP Cybersecurity November 5, 2015 Agenda Number 7. Report on CAP Cybersecurity November 5, 2015 Phil Cook CISSP, CISM Manager, Information Technologies Risk #1 External Attacks PR 81 Protect and secure CAP's Information Technology assets

More information

The Top Ten of Information Security - For 2015

The Top Ten of Information Security - For 2015 7 th Annual Information Security Summit The Executive Forum Information Security Management Overview June 4, 2015 Copyright 2015. Citadel Information Group. All Rights Reserved. 2 Establishing Leadership.

More information

Top Five Ways to Protect Your Network. A MainNerve Whitepaper

Top Five Ways to Protect Your Network. A MainNerve Whitepaper A MainNerve Whitepaper Overview The data security challenges within the business world have never been as challenging as they are today. Not only must organizations providers comply with stringent State

More information

Middle Class Economics: Cybersecurity Updated August 7, 2015

Middle Class Economics: Cybersecurity Updated August 7, 2015 Middle Class Economics: Cybersecurity Updated August 7, 2015 The President's 2016 Budget is designed to bring middle class economics into the 21st Century. This Budget shows what we can do if we invest

More information

www.pwc.co.uk Cyber security Building confidence in your digital future

www.pwc.co.uk Cyber security Building confidence in your digital future www.pwc.co.uk Cyber security Building confidence in your digital future November 2013 Contents 1 Confidence in your digital future 2 Our point of view 3 Building confidence 4 Our services Confidence in

More information

Defending Against Data Beaches: Internal Controls for Cybersecurity

Defending Against Data Beaches: Internal Controls for Cybersecurity Defending Against Data Beaches: Internal Controls for Cybersecurity Presented by: Michael Walter, Managing Director and Chris Manning, Associate Director Protiviti Atlanta Office Agenda Defining Cybersecurity

More information

Why HIPAA Compliance Should Scare You and What You Should Ask Your Business Phone Service Provider NOW

Why HIPAA Compliance Should Scare You and What You Should Ask Your Business Phone Service Provider NOW Why HIPAA Compliance Should Scare You and What You Should Ask Your Business Phone Service Provider NOW By Mike McAlpen, 8x8 Executive Director of Privacy, Security and Compliance The Champion For Business

More information

The Emergence of the ISO in Community Banking Patrick H. Whelan CISA IT Security & Compliance Consultant

The Emergence of the ISO in Community Banking Patrick H. Whelan CISA IT Security & Compliance Consultant THE MARKET LEADER IN IT, SECURITY AND COMPLIANCE SERVICES FOR COMMUNITY FINANCIAL INSTITUTIONS The Emergence of the ISO in Community Banking Patrick H. Whelan CISA IT Security & Compliance Consultant Agenda

More information

Financial Implications of Cybercrime Meeting the Information Security Management Challenge in the Cyber-Age

Financial Implications of Cybercrime Meeting the Information Security Management Challenge in the Cyber-Age Financial Implications of Cybercrime Meeting the Information Security Management Challenge in the Cyber-Age Southern California Association for Financial Professionals February 14, 2014 Stan Stahl, Ph.D.

More information

IRS/Tax Practitioners Symposium. 2014 The Illinois CPA Society

IRS/Tax Practitioners Symposium. 2014 The Illinois CPA Society EARLY BIRD DISCOUNT Register by September 30, 2014 2014 The Illinois CPA Society Tuesday, October 21, 2014 Rosemont, IL IRS/Tax Practitioners Symposium Interact with experts, hear the latest updates and

More information

End-user Security Analytics Strengthens Protection with ArcSight

End-user Security Analytics Strengthens Protection with ArcSight Case Study for XY Bank End-user Security Analytics Strengthens Protection with ArcSight INTRODUCTION Detect and respond to advanced persistent threats (APT) in real-time with Nexthink End-user Security

More information

PCI Compliance for Healthcare

PCI Compliance for Healthcare PCI Compliance for Healthcare Best practices for securing payment card data In just five years, criminal attacks on healthcare organizations are up by a stunning 125%. 1 Why are these data breaches happening?

More information

Cisco SAFE: A Security Reference Architecture

Cisco SAFE: A Security Reference Architecture Cisco SAFE: A Security Reference Architecture The Changing Network and Security Landscape The past several years have seen tremendous changes in the network, both in the kinds of devices being deployed

More information

CYBERSECURITY: ISSUES AND ISACA S RESPONSE

CYBERSECURITY: ISSUES AND ISACA S RESPONSE CYBERSECURITY: ISSUES AND ISACA S RESPONSE June 2014 KEY TRENDS AND DRIVERS OF SECURITY Consumerization Emerging Trends Continual Regulatory and Compliance Pressures Mobile devices Social media Cloud services

More information

How To Handle A Threat From A Corporate Computer System

How To Handle A Threat From A Corporate Computer System Politics of Security Webcast Summary Cyber Threat News and APT Defenses Introduction Stories about cyber espionage and Advanced Persistent Threats (APTs) are part of the mainstream news cycle. Concerns

More information

THREE KEYS TO COST-EFFECTIVE SECURITY FOR YOUR SMALL BUSINESS

THREE KEYS TO COST-EFFECTIVE SECURITY FOR YOUR SMALL BUSINESS THREE KEYS TO COST-EFFECTIVE SECURITY FOR YOUR SMALL BUSINESS Learn more about Symantec security here OVERVIEW Data and communication protection isn t a problem limited to large enterprises. Small and

More information

Business resilience: The best defense is a good offense

Business resilience: The best defense is a good offense IBM Business Continuity and Resiliency Services January 2009 Business resilience: The best defense is a good offense Develop a best practices strategy using a tiered approach Page 2 Contents 2 Introduction

More information

Business Opportunity Enablement through Information Security Compliance

Business Opportunity Enablement through Information Security Compliance Level 3, 66 King Street Sydney NSW 2000 Australia Telephone +61 2 9290 4444 or 1300 922 923 Business Opportunity Enablement through Information Security Compliance Page No.1 Business Opportunity Enablement

More information

By: Gerald Gagne. Community Bank Auditors Group Cybersecurity What you need to do now. June 9, 2015

By: Gerald Gagne. Community Bank Auditors Group Cybersecurity What you need to do now. June 9, 2015 Community Bank Auditors Group Cybersecurity What you need to do now June 9, 2015 By: Gerald Gagne MEMBER OF PKF NORTH AMERICA, AN ASSOCIATION OF LEGALLY INDEPENDENT FIRMS 2015 Wolf & Company, P.C. Cybersecurity

More information

Security Management Program Development:

Security Management Program Development: Security Management Program Development: A Critical Infrastructure Protection Model July 15 16, 2015 Earn up to 15 CPEs EXPERIE NCE, DED IC ON AT I D, AN LEA DE RS HIP IN SE R CU ITY E C DU AT IO N Are

More information

1. For each of the 25 questions, multiply each question response risk value (1-5) by the number of times it was chosen by the survey takers.

1. For each of the 25 questions, multiply each question response risk value (1-5) by the number of times it was chosen by the survey takers. Employee Security Awareness Survey Trenton Bond trent.bond@gmail.com Admin - Version 1.3 Security Awareness One of the most significant security risks that organizations and corporations face today is

More information

Checklist for HIPAA/HITECH Compliance Best Practices for Healthcare Information Security

Checklist for HIPAA/HITECH Compliance Best Practices for Healthcare Information Security Checklist for HIPAA/HITECH Compliance Best Practices for Healthcare Information Security Ali Pabrai, MSEE, CISSP (ISSMP, ISSAP) For Daily Compliance & Security Tips, Follow ecfirst @ Agenda Review the

More information

A Wake-Up Call? Fight Back Against Cybercrime. Prepared for: Ricky Link Managing Director, Southwest Region May 15, 2014

A Wake-Up Call? Fight Back Against Cybercrime. Prepared for: Ricky Link Managing Director, Southwest Region May 15, 2014 A Wake-Up Call? Fight Back Against Cybercrime Prepared for: Ricky Link Managing Director, Southwest Region May 15, 2014 1 Coalfire Background Leading Information Security Consulting Firm Offices: Atlanta,

More information

Georgia Tech Cybersecurity Leadership Certificate Program July 25 29, 2016

Georgia Tech Cybersecurity Leadership Certificate Program July 25 29, 2016 Georgia Tech Cybersecurity Leadership Certificate Program July 25 29, 2016 Preliminary Program Schedule The Georgia Tech Cybersecurity Leadership Certificate Program is presented with the guidance of Admiral

More information

Cyber Security and Privacy Services. Working in partnership with you to protect your organisation from cyber security threats and data theft

Cyber Security and Privacy Services. Working in partnership with you to protect your organisation from cyber security threats and data theft Cyber Security and Privacy Services Working in partnership with you to protect your organisation from cyber security threats and data theft 2 Cyber Security and Privacy Services What drives your security

More information

Some thoughts about cloud computing risks. Andris Soroka 28 th of January, 2015 Riga, Latvia

Some thoughts about cloud computing risks. Andris Soroka 28 th of January, 2015 Riga, Latvia Some thoughts about cloud computing risks Andris Soroka 28 th of January, 2015 Riga, Latvia Role of DSS in Cyber-security Development in Baltics Cyber-Security Awareness Raising Technology and knowledge

More information

The Hunt for Fraud. September 25, 2014. Seminar / Training. September 26, 2014

The Hunt for Fraud. September 25, 2014. Seminar / Training. September 26, 2014 BYOD and Securing Mobile Devices September 25, 2014 The Hunt for Fraud September 26, 2014 Seminar / Training Central Arkansas Chapter Information Systems Audit and Control Association, Arkansas Division

More information

Cybersecurity Strategy

Cybersecurity Strategy SYSTEM SOFT TECHNOLOGIES Cybersecurity Strategy Overview With the exponential growth of cyberspace over the past two decades has come increasing risk of data security breaches involving sensitive and private

More information

ASSUMING A STATE OF COMPROMISE: EFFECTIVE DETECTION OF SECURITY BREACHES

ASSUMING A STATE OF COMPROMISE: EFFECTIVE DETECTION OF SECURITY BREACHES ASSUMING A STATE OF COMPROMISE: EFFECTIVE DETECTION OF SECURITY BREACHES Leonard Levy PricewaterhouseCoopers LLP Session ID: SEC-W03 Session Classification: Intermediate Agenda The opportunity Assuming

More information

High End Information Security Services

High End Information Security Services High End Information Security Services Welcome Trion Logics Security Solutions was established after understanding the market's need for a high end - End to end security integration and consulting company.

More information

SECURING PAYMENTS IN THE CYBER WORLD

SECURING PAYMENTS IN THE CYBER WORLD The Central Bank of Kuwait Presents An Information Security Forum on SECURING PAYMENTS IN THE CYBER WORLD 16th NOVEMBER 2014 JUMEIRAH MESSILAH BEACH HOTEL, KUWAIT WELCOME In the last few years, the usages

More information

2014 Technology Conference

2014 Technology Conference 2014 Technology Conference October 24, 2014 Renaissance Hotel Baton Rouge, LA Who Should Attend Technology Officers, IT and IS staff (all levels), COOs, Retail Officers 5555 Bankers Avenue, Baton Rouge,

More information

The Education Fellowship Finance Centralisation IT Security Strategy

The Education Fellowship Finance Centralisation IT Security Strategy The Education Fellowship Finance Centralisation IT Security Strategy Introduction This strategy outlines the security systems in place to optimise, manage and protect The Education Fellowship data and

More information

Cybercrime and Regulatory Priorities for Cybersecurity

Cybercrime and Regulatory Priorities for Cybersecurity NRS Technology and Communication Compliance Forum Cybercrime and Regulatory Priorities for Cybersecurity Copyright 2014 by K&L Gates LLP. All rights reserved. Sean P. Mahoney sean.mahoney@klgates.com K&L

More information

THE IMPACT OF SECURITY ON APPLICATION DEVELOPMENT

THE IMPACT OF SECURITY ON APPLICATION DEVELOPMENT THE IMPACT OF SECURITY ON APPLICATION DEVELOPMENT 2 EXECUTIVE SUMMARY The growth of enterprise-developed applications has made it easier for businesses to use technology to work more efficiently and productively.

More information

SMB Data Breach Risk Management Best Practices. By Mark Pribish February 19, 2015

SMB Data Breach Risk Management Best Practices. By Mark Pribish February 19, 2015 SMB Data Breach Risk Management Best Practices By Mark Pribish February 19, 2015 Presentation Agenda About Mark Pribish Information Governance The Threat Landscape Data Breach Trends Legislative and Regulatory

More information

Best practices and insight to protect your firm today against tomorrow s cybersecurity breach

Best practices and insight to protect your firm today against tomorrow s cybersecurity breach Best practices and insight to protect your firm today against tomorrow s cybersecurity breach July 8, 2015 Baker Tilly Virchow Krause, LLP Baker Tilly refers to Baker Tilly Virchow Krause, LLP, an independently

More information

Risky Business. Is Your Cybersecurity in Cruise Control? ISACA Austin Chapter Meeting May 5, 2015

Risky Business. Is Your Cybersecurity in Cruise Control? ISACA Austin Chapter Meeting May 5, 2015 Risky Business Is Your Cybersecurity in Cruise Control? ISACA Austin Chapter Meeting May 5, 2015 What We ll Cover About Me Background The threat Risks to your organization What your organization can/should

More information

CYBER SECURITY INFORMATION SHARING & COLLABORATION

CYBER SECURITY INFORMATION SHARING & COLLABORATION Corporate Information Security CYBER SECURITY INFORMATION SHARING & COLLABORATION David N. Saul Senior Vice President & Chief Scientist 28 June 2013 Discussion Flow The Evolving Threat Environment Drivers

More information

Defending yesterday. Financial Services. Key findings from The Global State of Information Security Survey 2014

Defending yesterday. Financial Services. Key findings from The Global State of Information Security Survey 2014 www.pwc.com/security Defending yesterday While organizations have made significant security improvements, they have not kept pace with today s determined adversaries. As a result, many rely on yesterday

More information

Lith Networking and Network Marketing Safety

Lith Networking and Network Marketing Safety DIRECTION TO SUCCESS. PUBLIC AND PRIVATE SECTORS PARTNERSHIP WSIS Action Line Facilitation Meeting: Building confidence and security in the use of ICTs (C5) Partnerships for Global Cybersecurity ITU Geneva,

More information

Clavister InSight TM. Protecting Values

Clavister InSight TM. Protecting Values Clavister InSight TM Clavister SSP Security Services Platform firewall VPN termination intrusion prevention anti-virus anti-spam content filtering traffic shaping authentication Protecting Values & Enterprise-wide

More information

2010 AICPA Top Technology Initiatives. About the Presenter. Agenda. Presenter: Dan Schroeder, CPA/CITP Habif, Arogeti, & Wynne, LLP

2010 AICPA Top Technology Initiatives. About the Presenter. Agenda. Presenter: Dan Schroeder, CPA/CITP Habif, Arogeti, & Wynne, LLP 2010 AICPA Top Technology Initiatives Presenter: Dan Schroeder, CPA/CITP Habif, Arogeti, & Wynne, LLP Georgia Society of CPAs Annual Convention June 16, 2010 About the Presenter Partner-in-Charge, Habif,

More information

CYBER AND PRIVACY INSURANCE: LOSS MITIGATION SERVICES

CYBER AND PRIVACY INSURANCE: LOSS MITIGATION SERVICES CYBER AND PRIVACY INSURANCE: LOSS MITIGATION SERVICES How can you better prepare and respond to cyber risks? ACE developed Loss Mitigation Services to help policyholders understand and gauge various areas

More information

CONSULTING IMAGE PLACEHOLDER

CONSULTING IMAGE PLACEHOLDER CONSULTING IMAGE PLACEHOLDER KUDELSKI SECURITY CONSULTING SERVICES CYBERCRIME MACHINE LEARNING ECOSYSTEM & INTRUSION DETECTION: CYBERCRIME OR REALITY? ECOSYSTEM COSTS BENEFITS BIG BOSS Criminal Organization

More information

Information Security Forum Sponsorship Programs

Information Security Forum Sponsorship Programs Information Security Forum Sponsorship Programs About IANS IANS is an information security advisory and consulting firm, serving Fortune 1000 information security professionals with in-depth insights and

More information

Security Chasm! Dr. Anton Chuvakin

Security Chasm! Dr. Anton Chuvakin Security Chasm! Hack in The Box Amsterdam, The Netherlands July 2010 Why Are We Here? Risk of DEATH vs Risk of $60 fine? WTH is security? How we got here? Outline Security and/or/=/vs Compliance? Security

More information

Internet Malware Threats for School and Students

Internet Malware Threats for School and Students FIVE THINGS YOUR SCHOOL NEEDS TO KNOW ABOUT CYBERPROTECTION. Introduction As malware grows at an alarming rate, IT budgets are freezing and shrinking. Educational institutions are often forced into the

More information

Domain 1 The Process of Auditing Information Systems

Domain 1 The Process of Auditing Information Systems Certified Information Systems Auditor (CISA ) Certification Course Description Our 5-day ISACA Certified Information Systems Auditor (CISA) training course equips information professionals with the knowledge

More information

Legislative Council Panel on Information Technology and Broadcasting. Information Security

Legislative Council Panel on Information Technology and Broadcasting. Information Security For Information on 8 July 2013 LC Paper No. CB(4)834/12-13(05) Legislative Council Panel on Information Technology and Broadcasting Information Security Purpose This paper updates Members on the latest

More information

Healthcare Security: Improving Network Defenses While Serving Patients

Healthcare Security: Improving Network Defenses While Serving Patients White Paper Healthcare Security: Improving Network Defenses While Serving Patients What You Will Learn Safeguarding the privacy of patient information is critical for healthcare providers. However, Cisco

More information

CORE Security and the Payment Card Industry Data Security Standard (PCI DSS)

CORE Security and the Payment Card Industry Data Security Standard (PCI DSS) CORE Security and the Payment Card Industry Data Security Standard (PCI DSS) Addressing the PCI DSS with Predictive Security Intelligence Solutions from CORE Security CORE Security +1 617.399-6980 info@coresecurity.com

More information

JOINT EVENT WITH IIBA-LA. Trends & Best Practices in. Cybersecurity for networks, cloud computing and mobile

JOINT EVENT WITH IIBA-LA. Trends & Best Practices in. Cybersecurity for networks, cloud computing and mobile JOINT EVENT WITH IIBA-LA Trends & Best Practices in Cybersecurity for networks, cloud computing and mobile April 23 rd, 2015 Hands-on Experts Share Current Strategies to Manage Cybersecurity Today s enterprise

More information

Cybersecurity: Considerations for Internal Audit. IIA Atlanta Chapter Meeting January 9, 2015

Cybersecurity: Considerations for Internal Audit. IIA Atlanta Chapter Meeting January 9, 2015 Cybersecurity: Considerations for Internal Audit IIA Atlanta Chapter Meeting January 9, 2015 Agenda Key Risks Incorporating Internal Audit Resources for Internal Auditors Questions 2 Key Risks 3 4 Key

More information

The University of Alabama at Birmingham. Information Technology. Strategic Plan 2011 2013

The University of Alabama at Birmingham. Information Technology. Strategic Plan 2011 2013 The University of Alabama at Birmingham Information Technology Strategic Plan 2011 2013 Table of Contents Message from the Vice President... 3 About UAB... 4 About UAB Information Technology Meeting needs

More information

Increase insight. Reduce risk. Feel confident.

Increase insight. Reduce risk. Feel confident. Increase insight. Reduce risk. Feel confident. Define critical goals with enhanced visibility then enable security and compliance across your complex IT infrastructure. VIRTUALIZATION + CLOUD NETWORKING

More information

State Governments at Risk: The Data Breach Reality

State Governments at Risk: The Data Breach Reality State Governments at Risk: The Data Breach Reality NCSL Legislative Summit August 5, 2015 Doug Robinson, Executive Director National Association of State Chief Information Officers (NASCIO) About NASCIO

More information

Physical Security: Introductory Applications and Technology

Physical Security: Introductory Applications and Technology Physical Security: Introductory Applications and Technology February 22 23, 2016 Fort Worth, TX Earn up to 14 CPEs EXPERIE NCE, DED IC ON AT I D, AN LEA DE RS HIP IN SE R CU ITY E C DU AT IO N Delivering

More information

Corporate Overview. MindPoint Group, LLC 8078 Edinburgh Drive, Springfield, VA 22153 Office: 703.636.2033 Fax: 866.761.7457 www.mindpointgroup.

Corporate Overview. MindPoint Group, LLC 8078 Edinburgh Drive, Springfield, VA 22153 Office: 703.636.2033 Fax: 866.761.7457 www.mindpointgroup. Corporate Overview MindPoint Group, LLC 8078 Edinburgh Drive, Springfield, VA 22153 Office: 703.636.2033 Fax: 866.761.7457 www.mindpointgroup.com IS&P Practice Areas Core Competencies Clients & Services

More information

7 Things All CFOs Should Know About Cyber Security

7 Things All CFOs Should Know About Cyber Security Insero & Company s Accounting & Finance Education Series Presents 7 Things All CFOs Should Know About Cyber Security September 23, 2014 Michael Montagliano Chief Technologist, IV4. Inc. CERTIFIED PUBLIC

More information

Microsoft s cybersecurity commitment

Microsoft s cybersecurity commitment Microsoft s cybersecurity commitment Published January 2015 At Microsoft, we take the security and privacy of our customers data seriously. This focus has been core to our culture for more than a decade

More information

Defending Against Cyber Security Threats to the Payment and Banking Systems

Defending Against Cyber Security Threats to the Payment and Banking Systems NYU Leonard N. Stern School of Business Master of Science Risk Management RISK MANAGEMENT SYMPOSIUM 2015 Defending Against Cyber Security Threats to the Payment and Banking Systems Andrew Koh Class of

More information