1 Information Security & Protection Seminar June 15, :00 a.m. to 3:30 p.m. Presented by: ARMA Greater Indianapolis Chapter Session 1: Physical Security, & Handling Classified Information Overview Rolls-Royce Security Expert, Cynthia J. vanbree e-discovery Conference 8:30-9:30 Session 1 Session 2: Cyber Threats To Indiana Corporations And Their Clients FBI Cyber Security Expert, Special Agent Michael Alford March 24, a.m. to 4 p.m. Session 3: Enterprise Signature-Based Antivirus is catching less than 50% of current attacks: How can you protect your Data and Devices? -Bob Foley, J.D., CEO Session 4: The Intersection of Data Privacy, Records Management and e-discovery - Joan S. Antokol, Esq. Schedule 8:00-8:30 Registration & CE Sign-in/Continental Breakfast 9:30-10:00 Break/Vendor Exhibits/CE Sign-in 10:00-11:00 Session 2 11:00-11:30 Vendor Exhibits 11:30-12:30 Lunch/Vendor Exhibits/CE Sign-in 12:30-1:30 Session 3 1:30-2:00 Break/Vendor Exhibits/CE Sign-in 2:00-3:00 Session 4 3:00-3:30 Closing remarks/ prize drawings (must be present to win) Where: Rolls-Royce Training Ctr. - Auditorium Who should attend? Information & Records Professionals, Privacy & Security and IT Professionals, Lawyers, Paralegals and Students Sessions approved for 4 ICRM Certification Maintenance Program (CMP) credit hours (1 CMP credit hour per session) Sessions eligible for 4 CPE credits from IAPP International Association of Privacy Professionals (1 CPE credit per session) Sessions approved for 4 CLE Credits (1 CLE credit per session) ARMA Greater Indianapolis Chapter ARMA International is a not-for-profit professional association and the authority on managing records and information paper and electronic. The Greater Indianapolis Chapter provides education, research and networking opportunities to information professionals in Indiana. When: 2601 W. Raymond St. Indianapolis. IN (See map on page 3) Weds., June 15, 8:00 am to 3:30 pm. Registration: One price, any or all sessions & vendor exhibits: $75 ARMA Members $100 Non-members $25 Students (School I.D. required) * Includes continental breakfast and lunch. Advance registration online by June 13 th at to guarantee seating and meals. Pay online at time of registration. Only cash and checks accepted at the door. REGISTER NOW: SEATING IS LIMITED! *Please note that Rolls-Royce security protocol requires all visitors present a photo I.D. and Foreign Nationals must use the advance registration process and will be contacted for additional documentation requirements.
2 I (8:30-9:30) Session 1: Physical Security, & Handling Classified Information Overview Physical Security Overview (per the NISPOM, National Industrial Security Program Operating Manual) Requirements for shredding, GSA (U.S.A. General Services Administration) approved safes, copy machines (approved copiers), secure conference rooms, U.S. mail. Handling Classified Information Overview Procedures employees should follow when working on contracts that require access to classified information--information that for reasons of national security needs to be protected. Objectives: *Describe how information becomes classified. *Describe the concept of security clearances. *Recognize classified information. *Practice proper procedures for safeguarding classified information in its various forms (e.g. hardcopy, electronic). *Identify classified material that has not been properly safeguarded and take appropriate action. *Address security questions or concerns to the local security office. *Definitions of Foreign National, Foreign Person, Foreign Interest. *Intelligence threats. *Foreign Collection Methods of Operation. *Controlled unclassified information. Presented by: Cynthia J. vanbree, Rolls-Royce Security Expert Ms. vanbree is the Senior Security Manager for Rolls-Royce in Indianapolis. Cindy has over twenty years of experience in the practical implementation of the United States National Industrial Security Program (NISP). The NISP prescribes the requirements for safeguarding classified national security information in industry established through Executive Order Cindy earned an MBA from University of Indianapolis and is a recipient of the James A. Cogswell Award for excellence in industrial security. Cindy has received commendations from the FBI and Defense Security Service for her contributions to the national security. (10:00-11:00) Session 2: Cyber Threats To Indiana Corporations And Their Clients Special Agent Alford, FBI cyber security expert, will discuss the threats to Indiana corporations and their customers posed by cyber criminals extending beyond the Internet. The attackers utilize a combination of sophisticated computer intrusions, phishing schemes, social engineering and physical theft, and are supported by world-wide availability of compromised computers to route malicious Internet traffic. SA Alford will discuss the FBI s efforts to combat this crime problem and provide suggestions to corporations for handling incidents. Presented by: Special Agent Michael Alford Michael Alford has been a Special Agent with the FBI in Indianapolis for over three years and has over 15 years of experience in computer security and computer forensics. He routinely investigates complex computer intrusions, including national security intrusions and intrusions into industrial control systems. Prior to his current position, he worked at the University of Central Florida as Coordinator of Computer Applications for the University Relations division.
3 (12:30-1:30) Session 3: Enterprise Signature-Based Antivirus is catching less than 50% of current attacks: How can you protect your Data and Devices? Despite the increased adoption of cloud computing and other hosted application technologies, most organizations are still committed to providing every knowledge worker with a personal computer. This computer then becomes a target for an increasingly well funded, sophisticated, innovative and diabolical set of criminals across the world. The threat environment continues to outpace improvements in threat detection effectiveness. Signature-based AV has been limping along on life support for years. A multi-layered approach that includes behavioral protection technologies offers promise to provide effective protection. This presentation will look at the recent trends in endpoint attacks and available options to safeguard against intrusion and data loss. Presented by: Bob Foley, J.D., CEO Matrix Global Partners, Inc. Bob has spent the majority of his business career as an entrepreneur and leader in the software industry. While trained as a lawyer, Bob has focused on building and managing businesses that develop software and services for customers in the areas of data management and security and has worked with organizations that range from small banks to international business leaders like The Gap, GE, McDonald s and large federal government organizations. Bob s current passion is developing his business, Matrix, into a leader in endpoint security solutions and support and is currently working with organizations around the world. (2:00-3:00) Session 4: The Intersection of Data Privacy, Records Management and e-discovery Data privacy, records management and e-discovery continue to impact organizations, including those in Indiana. Joan Antokol, Indianapolis attorney and former Global Privacy Officer at Novartis Pharma, will discuss the changing US and global privacy landscape. She will incorporate a discussion on how privacy and security requirements are influencing records and e- Discovery. Further, she will provide recommendations to organizations. Presented by: Joan S. Antokol, Managing Partner, Head Privacy and Data Protection Practice Park Legal LLC Joan Antokol is internationally recognized for her work in privacy and data protection. She is a member of Park Legal LLC, a new Indianapolis-based boutique law firm that focuses its practice in the areas of data privacy, information security and data management. Ms. Antokol also owns an online training company and a software company. She assists global and local organizations with many aspects of privacy, security, and overall compliance, such as healthcare privacy and security, security breaches (including risk minimization), employee privacy, credit card data compliance, enterprise management, privacy and security policies and procedures, and privacy auditing. Joan is a frequent presenter at privacy conferences in the U.S. and E.U. and has a number of published articles about privacy and security. Since 2002, Joan has been the only private sector attorney who is a member of a group comprised of the data protection regulators from each of the E.U. Member States, Canada, Switzerland, the U.S. (i.e., Federal Trade Commission and U.S. Homeland Security), and several countries in Asia. Ms. Antokol is also the 2011 Chair of the Indiana Security and Privacy Network (InSPN), a privacy and security organization that currently has about 100 local organizations as members. Before starting Park Legal LLC in May 2010, Joan spent three years as a partner at a large Indianapolis law firm and launched that firm s privacy and records management practice group. Prior to that time, Joan was a Vice President and the Global Head of Privacy for the 260 Novartis Group companies.
4 The ARMA Indy Spring Seminar is being sponsored by these vendors: Information Consulting has a simple objective: To improve our client s ability to find, to use, to manage and to protect its information. From businesses looking to establish information management and protection programs to organizations looking to audit their established programs, Information Consulting can help. We work collaboratively with our clients to build usable compliant Information Management & Governance Programs, Information Protection and Privacy Programs, and E-Discovery Preparedness Programs. Information Consulting takes our clients from vision to practice. Xact Data Discovery (XDD) is an international Data Discovery and Management company providing streamlined Forensic, Processing, Hosting, Document Review, Project Management, Imaging & Coding and Paper Discovery services to law firms, corporations and government agencies. At Xact Data Discovery, communication is everything because clients need to know where their data is throughout the entire discovery life cycle as well as understand the valuable information and knowledge they can obtain from it. As a global leader in Information Management, Recall provides the services you need throughout the life cycle of your sensitive documents. From document storage and retrieval, to digital conversion, data protection and secure destruction, Recall provides businesses with more than secure information management we provide peace of mind. In 2010 the founders of Pondurance, Theseus Security and ArchMaven joined forces to strengthen Pondurance LLC into one of the leading information security consulting firms in the Midwest. The partners of Pondurance are seasoned information security experts, having practiced as risk and advisory consultants for prominent organizations such as the Department of Defense, Ernst & Young, IBM, Verisign, Verizon Business, Fifth Third Bank, Cybertrust, Accuvant and the Payment Card Industry (PCI) Security Standards Council. Our team of information security professionals assists clients to assess their current information security posture, and to develop remediation and risk reduction plans.
5 ARMA Information & Security Protection Conference Location DIRECTIONS TO ROLLS-ROYCE/UAW TRAINING CENTER & AUDITORIUM 2601 W. Raymond St., Indianapolis, IN Gate 5-7, UAW/Rolls-Royce Corp. Training Center Only 6 miles S.W. of downtown Indianapolis, and close to I-70 and I-465 Free parking available in lots to the side and front of the Rolls-Royce Training Center PHOTO I.D. REQUIRED TO ENTER LOBBY and foreign nationals must pre-register. Enter off of W. Raymond St. at stop light between Kentucky Ave. & Tibbs Ave. (Gate 5-7, UAW/Rolls-Royce Corporation Training Center) You can only turn South at stop light onto private drive into Rolls-Royce. Follow signs to Training Center, red building, entrance is located on the circle drive with flags and white awning. Parking is available in front and at side of building. Parking lots & Lobby entrance
110101001101101101010011000 11011010100110110101001100 11011010011011010100110000 10100110110101001100010010 Protecting Information The Role of Community Colleges in Cybersecurity Education A Report from
E N V I R O N M E N T A L S C A N CYBERSECURITY Los Angeles and Orange Counties J U N E 2 0 1 2 E N V I R O N M E N T A L S C A N CENTER OF EXCELLENCE Los Angeles and Orange Counties Audrey Reille, Director
Data Breach Response Guide By Experian Data Breach Resolution 2013-2014 Edition Trust the Power of Experience. 2013 ConsumerInfo.com, Inc. Table of Contents Introduction 3... Data Breach Preparedness 4...
Cyber security and fraud: The impact on small businesses Federation of Small Businesses Telephone: 020 7592 8100 Facsimile: 020 7233 7899 Website: www.fsb.org.uk Cyber security and fraud: the impact on
A REPORT BY HARVARD BUSINESS REVIEW ANALYTIC SERVICES Meeting the Cyber Risk Challenge Sponsored by ABOUT ZURICH INSURANCE GROUP Zurich Insurance Group (Zurich) is a leading multi-line insurance provider
C o m m i t t e e o f S p o n s o r i n g O r g a n i z a t i o n s o f t h e T r e a d w a y C o m m i s s i o n G o v e r n a n c e a n d I n t e r n a l C o n t r o l C O S O I N T H E C Y B E R A G
The Critical Security Controls for Effective Cyber Defense Version 5.0 1 Introduction... 3 CSC 1: Inventory of Authorized and Unauthorized Devices... 8 CSC 2: Inventory of Authorized and Unauthorized Software...
Yahoo s Code of Ethics Winning with Integrity Winning with Integrity Yahoos, Yahoo is the place where millions of people go to see what is happening with the people and the things that matter to them most.
ICS-CERT Year in Review Industrial Control Systems Cyber Emergency Response Team 2013 National Cybersecurity and Communications Integration Center What s Inside Welcome 1 National Preparedness 2 Prevention
Targeted Attacks 8-Step Plan To Safeguard Your Organization Plus 8 Case Studies 1 Targeted Attacks U.S. companies lose about $250 billion per year through intellectual property theft, with another $114
A Websense White Paper ADVANCED PERSISTENT THREATS AND OTHER ADVANCED ATTACKS: THREAT ANALYSIS AND DEFENSE STRATEGIES FOR SMB, MID-SIZE, AND ENTERPRISE ORGANIZATIONS REV 2 ADVANCED PERSISTENT THREATS AND
Summary of Responses to an Industry RFI Regarding a Role for CMS with Personal Health Records Table of Contents EXECUTIVE SUMMARY... 4 1. INTRODUCTON... 7 2. CMS ROLE WITH PHRs... 9 What PHR functionalities
Global Network Initiative Public Report on the Independent Assessment Process for Google, Microsoft, and Yahoo Global Network Initiative Protecting and Advancing Freedom of Expresssion and Protecting and
Business Ethics Infrastructure 6 This chapter examines an essential element of a business ethics program: business ethics infrastructure the structures and systems that help enterprise owners and managers
Cyber Security Planning Guide The below entities collaborated in the creation of this guide. This does not constitute or imply an endorsement by the FCC of any commercial product, service or enterprise
Standards for Internal Control in New York State Government October 2007 Thomas P. DiNapoli State Comptroller A MESSAGE FROM STATE COMPTROLLER THOMAS P. DINAPOLI My Fellow Public Servants: For over twenty
Records Management Best Practices Guide A Practical Approach to Building a Comprehensive and Compliant Records Management Program Protecting and Managing the World s Information. Since 1951, Iron Mountain
Welcome to CGS!Florida On behalf of the Florida Department of Education, Office of Student Financial Assistance (OSFA) and the Florida Association of Student Financial Aid Administrators (FASFAA), thank
MICHIGAN CYBER INITIATIVE 2015 Leading the Nation: An interagency, public-private collaboration www.michigan.gov/cybersecurity FROM THE GOVERNOR Michigan has become the leader among states in cybersecurity.
Global Visa Card-Not-Present Merchant Guide to Greater Fraud Control Protect Your Business and Your Customers with Visa s Layers of Security Millions of Visa cardholders worldwide make one or more purchases
HOW WE DO BUSINESS THE REPORT JPMORGAN CHASE WHO WE ARE AT A GLANCE JPMorgan Chase & Co., a financial holding company, is a leading global financial services company and one of the largest banking institutions
Practice Guide Reliance by Internal Audit on Other Assurance Providers DECEMBER 2011 Table of Contents Executive Summary... 1 Introduction... 1 Principles for Relying on the Work of Internal or External
Security Guidelines for General Aviation Airports Information Publication A-001 May 2004 Version 1.0 This guidance document was developed by TSA, in cooperation with the General Aviation (GA) community.
Planning for the Future Strategic Plan U. S. S e c u r i t i e s a n d E x c h a n g e C o m m i s s i o n F I S C A L Y E A R S 2 0 1 4 2 0 1 8 D R A F T F O R C O M M E N T This document presents the