From Evolution to Revolution: The Founders and the Headliners of Information Security
|
|
|
- Spencer Jones
- 10 years ago
- Views:
Transcription
1 From Evolution to Revolution: The Founders and the Headliners of Information Security Georgia Tech Information Security Center Panel session, 22 nd National Information Systems Security Conference Fall, 1999 Panel Chair: Blaine W. Burnham, Ph.D. Director, Georgia Tech Information Security Center (GTISC) Georgia Institute of Technology Atlanta, Georgia Phone: Fax: Point of Contact: Phyllis A. Schneck, Ph.D. Special Assistant to the Director, GTISC Georgia Institute of Technology Atlanta, Georgia Phone: Fax: July 1999
2 Session Abstract: The purpose of this panel session is to present an overview of the issues which span the history of, and developments in, the field of Information Security. We aim to accomplish this by presenting selected key players to present a chronological, first-hand account of the following points: Where have we come from? What have we forgotten? Where are we now? Where are we headed? What are the current government and industry demands, and how do those differ from 30 years ago? We propose that these panel sessions be videotaped for later use in developing a complete history of the evolution of Information Security and preserving the business lessons learned. GTISC would like to extend special thanks to Cynthia Irvine of the Naval Post Graduate School for her contributions to the creation of this panel. Background of Target Audience: The GTISC panel presentation is intended for anyone interested in the aforementioned issues. As key emphasis will be placed on the importance of the future of Information Security, young attendees are strongly encouraged, and therefore no background prerequisites exist for this panel session.
3 Panelists: Roger Schell Clark Weissman Steve Lipner Mitretek Systems ABSTRACT Achieving Assurance: What will we do? For thirty years, high security, multilevel security, and the goal of protecting sensitive or classified information from hostile code have been the holy grails of computer security research. We have now reached the point where the threats defined as academic hypotheses in 1975 are manifest on the Internet. Meanwhile, attempts to build systems that could respond to those threats have failed the test of the marketplace. This presentation will review some of the history of threats and countermeasures. It will then discuss some options for achieving effective protection of sensitive information that have a chance of achieving technical and market success. Steven B. Lipner is director of Mitretek s Systems Technology Center division. In this role, he leads over one hundred staff who conduct specialized engineering projects in INFOSEC, software technology, and Internet applications. With almost thirty years of experience in INFOSEC, Mr. Lipner has been responsible for the evolution of Mitretek s INFOSEC work to provide additional focus on research and innovative technologies. Mr. Lipner serves as the executive agent for the cross-agency INFOSEC Research Council under a contract from the National Security Agency to Mitretek. Prior to joining Mitretek, Mr. Lipner spent about fifteen years as a business unit manager and development manager responsible for COTS INFOSEC products. As an executive vice president of Trusted Information Systems (TIS), he was responsible for the Gauntlet Internet Firewall product line, and was the principal inventor of the TIS cryptographic key recovery technology. As manager of the Secure Systems Group at Digital Equipment Corporation, he was responsible for the development of secure operating system, network encryption and security management products including an operating system for VAX
4 computers that was targeted at Class A1 of the Orange Book. Mr. Lipner was one of the original industry members of the National Computer Systems Security and Privacy Advisory Board. *** Peter Neumann Computer Science Laboratory, SRI International Peter G. Neumann is a Principal Scientist in the Computer Science Laboratory at SRI (where he has been since 1971), concerned with computer system survivability, security, reliability, human safety, and high assurance. He is the author of Computer-Related Risks, Moderator of the ACM Risks Forum (comp.risks), Chairman of the ACM Committee on Computers and Public Policy, and Associate Editor of the CACM for the Inside Risks column. He was founder and for 19 years Editor of the ACM SIGSOFT Software Engineering Notes. He is currently a member of the U.S. General Accounting Office Executive Council on Information Management and Technology. See his Web site < for Senate and House committee testimonies, reports, papers, a partial bibliography, and RISKS material. Neumann is a Fellow of the American Association for the Advancement of Science, the ACM, and the Institute of Electrical and Electronics Engineers (of which he is also a member of the Computer Society). He has received the ACM Outstanding Contribution Award for 1992, the first SRI Exceptional Performance Award for Leadership in Community Service in 1992, the Electronic Frontier Foundation Pioneer Award in 1996, the ACM SIGSOFT Distinguished Service Award in 1997, and the CPSR Norbert Wiener Award for in October 1997, for ``deep commitment to the socially responsible use of computing technology.'' *** Todd Inskeep Vice President - Information Security Architecture Bank of America [email protected] ABSTRACT
5 Mr. Inskeep will briefly discuss the circular history of computer security practices, and the difficulty of building systems today with applications that lack assurance, and requirements to enforce security policies that are beyond the capability of today's distributed system. Mr. Inskeep will also discuss both the need for education and some current trends in INFOSEC education. Mr. Inskeep has over 15 years of Information Security experience ranging from military communications through policy, security evaluation, trusted operating systems, secure applications including PCMCIA cards and smart cards, and Public Key Infrastructure implementation. After a variety of work at the National Security Agency, Mr. Inskeep joined NationsBank as it began merging with Bank of America. At Bank of America, Mr. Inskeep explores, develops, and documents security architecture across various bank projects. These projects include distributed secure applications, secure connections to legacy systems, and application architectures for demilitarized zones (DMZ) within the firewall system. His focus is on the bank's internal PKI implementation, and the bank's implementation of the Identrus PKI - an international banking effort to enable trusted electronic commerce world-wide. Jim Anderson James P. Anderson Co [email protected]
Time: 9:50-12:00 pm on Oct. 9, 2013 Location: TBA. Bios of Panelists
Panel: Key Issues in Big Data Panelists: 1) Dr. Roger R. Schell, USC 2) Dr. Amr Awadallah, Cloudera, Inc. 3) Dr. Peter G. Neumann, RSl 4) Dr.Tomoyuki Higuchi 5) Dr. Sylvia Osborn, University of Western
Testimony of. Before the United States House of Representatives Committee on Oversight and Government Reform And the Committee on Homeland Security
Testimony of Dr. Phyllis Schneck Deputy Under Secretary for Cybersecurity and Communications National Protection and Programs Directorate United States Department of Homeland Security Before the United
Georgia Tech Cybersecurity Leadership Certificate Program July 25 29, 2016
Georgia Tech Cybersecurity Leadership Certificate Program July 25 29, 2016 Preliminary Program Schedule The Georgia Tech Cybersecurity Leadership Certificate Program is presented with the guidance of Admiral
IC B10 - Vision Panel Discussion: Scaling the Information Security Program Maturity Model: 3 Practitioners Perspectives
Page 1 of 12 IC B10 - Vision Panel Discussion: Scaling the Information Security Program Maturity Model: 3 Practitioners Perspectives Panel Date: Thursday, April 18, 2013 Panel Time: 9-10am PST (60 minutes
Computer Security Incident Response Team
Computer Security Incident Response Team Operational Standards The University of Scranton Information Security Office August 2014 Table of Contents 1.0 Operational Standards Document Overview... 3 2.0
AOPA'S GUIDE TO CANDIDATE FORUMS. stand on issues important to General Aviation. A guide to help pilots discover where candidates
AOPA'S GUIDE TO CANDIDATE FORUMS A guide to help pilots discover where candidates stand on issues important to General Aviation What is a Candidate Forum? A candidate forum is an event hosted by a community
Meeting Cyber Security Challenges
Meeting Cyber Security Challenges Presented to Naval Postgraduate School Cyber Summit 29 October 2009 Cynthia Irvine, PhD, Professor Naval Postgraduate School UNCLASSIFIED Overview Challenges in Cyber
Policies and Procedures Communications Quality & Reliability (CQR) Technical Committee
Policies and Procedures Communications Quality & Reliability (CQR) Technical Committee http://www.comsoc.org/~cqr/index.html Issued on August 28, 2003. Revised on August 29, 2003 based on one comment.
Information Security Curricula in Computer Science Departments: Theory and Practice
Information Security Curricula in Computer Science Departments: Theory and Practice Alec Yasinsac Department of Computer Science Florida State University 214a James Jay Love Building Tallahassee, FL 32306-4530
GEORGE L. WILLIS Assoc. Clinical Professor and Director of the Tax Law Clinic
GEORGE L. WILLIS Assoc. Clinical Professor and Director of the Tax Law Clinic EDUCATION CHAPMAN UNIVERSITY SCHOOL OF LAW J. D. WITH TAXATION EMPHASIS, 1998 CALIFORNIA STATE UNIVERSITY, LONG BEACH B. A.,
PERSONAL HISTORY AND PROFESSIONAL QUALIFICATIONS (2015)
Michael V. Vollmer Attorney at Law 5020 Campus Drive Newport Beach, California 92660 Telephone 949.474.9088 Facsimile 949.474.9089 E-mail [email protected] Certified Specialist, Estate Planning, Trust
Implementing Cisco IOS Network Security v2.0 (IINS)
Implementing Cisco IOS Network Security v2.0 (IINS) Course Overview: Implementing Cisco IOS Network Security (IINS) v2.0 is a five-day instructor-led course that is presented by Cisco Learning Partners
Active Learning with the CyberCIEGE Video Game
Active Learning with the CyberCIEGE Video Game 2011 Michael F. Thompson and Dr. Cynthia E. Irvine Department of Computer Science Naval Postgraduate School Monterey, CA USA The CyberCIEGE Educational Video
CYBERBOK Cyber Crime Security Essential Body of Knowledge: A Competency and Functional Framework for Cyber Crime Management
CYBERBOK Security Essential Body of Knowledge: A Competency and Functional Framework for Security Workforce Development aligned with ISO 31000* risk management principles and guidelines. *Note : ISO 31000
Gila County Superior Court Judge Bryan B. Chambers
Gila County Superior Court Judge Bryan B. Chambers Judge Bryan B. Chambers On July 13, 2015, Bryan B. Chambers was appointed by Arizona Governor, Douglas A. Ducey, to fill the unexpired term of Judge Peter
Welcome to the Webinar A Candid Conversation: The Future of the Health Care CIO. February 25, 2015 12pm 1pm PST
Welcome to the Webinar A Candid Conversation: The Future of the Health Care CIO February 25, 2015 12pm 1pm PST Introduction 2 Today we will candidly discuss: Challenges facing health care organizations
Computer Security Incident Response Team
University of Scranton Computer Security Incident Response Team Operational Standards Information Security Office 1/27/2009 Table of Contents 1.0 Operational Standards Document Overview... 3 2.0 Establishment
What is the Right Security Solution for Mobile Computing? #RSAC
SESSION ID: SPO1-T09 Trust in Mobile Enterprise Have We Lost the Game? MODERATOR: Prof. Dr. Norbert Pohlmann Professor Computer Science Department for Information Security, Director of the Institute for
Financial Training 2016 COURSE CATALOG. in the Energy Sector. Use code Energy2016 and save $200 on any live, in-person training course
Financial Training in the Energy Sector center.snl.com/energy Use code Energy2016 and save $200 on any live, in-person training course 2016 COURSE CATALOG ESSENTIAL KNOWLEDGE FOR A UNIQUE INDUSTRY The
Dean C. Garfield President & CEO, Information Technology Industry Council (ITI) Committee on Energy and Commerce
Written Testimony of Dean C. Garfield President & CEO, Information Technology Industry Council (ITI) Before the Committee on Energy and Commerce Subcommittee on Communications and Technology U.S. House
Topic: The role of Enterprise Architecture in the design of the digital future: A Zachman Perspective
Workshop and Panel Proposal Topic: The role of Enterprise Architecture in the design of the digital future: A Zachman Perspective Presenters: John Zachman, James Lapalme, Aurona Gerber and Alta van der
Bernice P. (Bernie) Dixon
Bernice P. (Bernie) Dixon Bernice P. Dixon is the Chairman and CEO of Atlanta Technology Angels and Founder and CEO of Advising Angels. Bernie has been passionate about leveraging her positions as a senior
Autonomous Vehicle Technologies for Passenger and Freight Mobility
6 Center for the Commercialization of CCITT Innovative Transportation Technology Autonomous Vehicle Technologies for Passenger and Freight Mobility Tuesday, June 10, 2014 1:30 p.m. to 4:30 p.m. Northwestern
The Security Development Lifecycle
The Security Development Lifecycle Steven B. Lipner Director of Security Engineering Strategy Security Business and Technology Unit Microsoft Corporation Context and History 1960s penetrate and patch 1970s
Partnership prospectus
Partnership prospectus Why NextGen Government, why now? Ground breaking progress has been made in the approach to digital government over the last few years, which the new Digital Transformation Office
Information Security Policy
Information Security Policy Steve R. Hutchens, CISSP EDS, Global Leader, Homeland Security Agenda Security Architecture Threats and Vulnerabilities Design Considerations Information Security Policy Current
OUR SPONSORS. South Florida Hedge Funds 2011 Industry Outlook. The Miami Finance Forum. Presents A Panel Discussion on.
OUR SPONSORS The Miami Finance Forum Presents A Panel Discussion on South Florida Hedge Funds 2011 Industry Outlook Our Panelists: About the Miami Finance Forum The Miami Finance Forum is a non-for-profit
APPENDIX J INFORMATION TECHNOLOGY MANAGEMENT GOALS
APPENDIX J INFORMATION TECHNOLOGY MANAGEMENT GOALS Section 5123 of the Clinger-Cohen Act requires that the Department establish goals for improving the efficiency and effectiveness of agency operations
INTERNET SECURITY ARCHITECTURE
82-10-60 DATA SECURITY MANAGEMENT INTERNET SECURITY ARCHITECTURE Carol A. Siegel INSIDE Why is Architecture Important?, What is Architecture and How is it Created?, The Importance of Business Requirements,
5 Panelists from U.S.A. (affiliated with IMC USA and IERG)
5 Panelists from U.S.A. (affiliated with IMC USA and IERG) Jerry Savin CMC, FIMC President, CTCG IMC USA Past Chair Dr. Don Gilman Principal, Gilman Consulting Group IMC USA SoCal Board Member Jeremy Eskenazi
ERIC E. SPIRES. Ph.D. May 1987, University of Illinois (major - accounting; special area - auditing; minor - statistics and experimental design)
ERIC E. SPIRES Department of Accounting & MIS Fisher College of Business The Ohio State University 2100 Neil Avenue Columbus, Ohio 43210 (614) 292-4422 (voice) (614) 292-2118 (fax) [email protected] EDUCATION:
SE 4C03 Winter 2005 Firewall Design Principles. By: Kirk Crane
SE 4C03 Winter 2005 Firewall Design Principles By: Kirk Crane Firewall Design Principles By: Kirk Crane 9810533 Introduction Every network has a security policy that will specify what traffic is allowed
Curriculum Vita. Gregg M. Stutchman Forensic Analyst & Expert Witness in Audio & Video Forensics Forensic Photography
Stutchman Forensic Laboratory Audio & Video Forensics. Forensic Photography 421 Walnut Street, Suite 120. 707 257-0828. Fax 707 257-3240 www.stutchmanforensic.com email: [email protected] Curriculum
MS-55096: Securing Data on Microsoft SQL Server 2012
MS-55096: Securing Data on Microsoft SQL Server 2012 Description The goal of this two-day instructor-led course is to provide students with the database and SQL server security knowledge and skills necessary
Tuesday, August 19th Prevent, Detect, Respond: A Framework for Effective Cyber Defense Dr. Eric Cole, Fellow, SANS Institute
Tuesday, August 19 th 9:00-9:45 am Keynote Address Prevent, Detect, Respond: A Framework for Effective Cyber Defense Security is now a mainstay of boardroom discussions. However, many organizations remain
David G. Belanger, PhD, Senior Research Fellow, Stevens Institute of Technology, New Jersey, USA Topic: Big Data - The Next Phase Abstract
David G. Belanger, PhD, Senior Research Fellow, Stevens Institute of Technology, New Jersey, USA Dr. David Belanger is currently a Senior Research Fellow at Stevens Institute of Technology. In this role
Bellevue University Cybersecurity Programs & Courses
Undergraduate Course List Core Courses: CYBR 250 Introduction to Cyber Threats, Technologies and Security CIS 311 Network Security CIS 312 Securing Access Control CIS 411 Assessments and Audits CYBR 320
---Information Technology (IT) Specialist (GS-2210) IT Security Competency Model---
---Information Technology (IT) Specialist (GS-2210) IT Security Model--- TECHNICAL COMPETENCIES Computer Forensics Knowledge of tools and techniques pertaining to legal evidence used in the analysis of
Wireless Mobile Internet Security. 2nd Edition
Brochure More information from http://www.researchandmarkets.com/reports/2330593/ Wireless Mobile Internet Security. 2nd Edition Description: The mobile industry for wireless cellular services has grown
2015 Public Safety Broadband Stakeholder Meeting. Applied Public Safety Cybersecurity Research Nelson Hastings Electronics Engineer PSCR
2015 Public Safety Broadband Stakeholder Meeting Applied Public Safety Cybersecurity Research Nelson Hastings Electronics Engineer PSCR This work is sponsored by: Department of Homeland Security Science
Deputy Chief Financial Officer Peggy Sherry. And. Chief Information Security Officer Robert West. U.S. Department of Homeland Security.
Deputy Chief Financial Officer Peggy Sherry And Chief Information Security Officer Robert West U.S. Department of Homeland Security Testimony Before the Subcommittee on Government Organization, Efficiency
Cyber Security. Smart Grid
Cyber Security for the Smart Grid Peter David Vickery Executive Vice President N-Dimension Solutions Inc. APPA National Conference June 21, 2010 Cyber Security Solutions For Cyber Security
Policy on Academic Tracks and Promotions for the School of Nursing (SON) at the American University of Beirut (AUB)
Policy on Academic Tracks and Promotions for the School of Nursing (SON) at the American University of Beirut (AUB) Preamble The School of Nursing currently has 2 tracks, Academic and Clinical. The Academic
The Virtualization Practice
The Virtualization Practice White Paper: Trend Micro Deep Security Reference Architecture for the Secure Hybrid Cloud Edward L. Haletky Analyst Virtualization and Cloud Security The Virtualization Practice
2012 RECIPIENT SINGAPORE AUSTRALIA EMINENT ALUMNI AWARD. Dr TAN Chin Nam
2012 RECIPIENT SINGAPORE AUSTRALIA EMINENT ALUMNI AWARD Dr TAN Chin Nam Chair of the Media Development Authority International Advisory Panel Dr TAN Chin Nam is one of Singapore s most distinguished public
SPAR emedia Marketing Kit
SPAR emedia Marketing Kit The online media platform for SPAR Point Group AUDIENCE Who are they? Project Managers Design Leaders Asset Managers Engineering Managers Maintenance Managers Survey Heads LIDAR
Managing Hybrid Cloud Enlivenia
Managing Hybrid Cloud Environments Wednesday October 1st at 10:45 AM Campbell McNeill Distinguished Engineer and Chief Architect, Dell Cloud Marketplace Hybrid Clouds present great opportunities for a
The Fight for the Last Mile
Northwestern University The Fight for the Last Mile Tuesday, October 29, 2013 2:00-4:45pm James L. Allen Center - Tribune Foundation Auditorium Northwestern University 2169 Campus Drive, Evanston, IL About
CS 464/564 Networked Systems Security SYLLABUS
CS 464/564 Networked Systems Security SYLLABUS College: College of Science Department: Department of Computer Science Syllabus Title: CS 464/564 Networked Systems Security Call Number: 1. Meet the Professor
AC 2010-1485: DEVELOPMENT AND IMPLEMENTATION OF A MASTERS PROGRAM IN COMPUTER INFORMATION TECHNOLOGY
AC 2010-1485: DEVELOPMENT AND IMPLEMENTATION OF A MASTERS PROGRAM IN COMPUTER INFORMATION TECHNOLOGY Hetal Jasani, Northern Kentucky University Hetal Jasani is an assistant professor in the Department
Standards for Security Categorization of Federal Information and Information Systems
FIPS PUB 199 FEDERAL INFORMATION PROCESSING STANDARDS PUBLICATION Standards for Security Categorization of Federal Information and Information Systems Computer Security Division Information Technology
Data Security Breaches The Worldwide Epidemic
Data Security Breaches The Worldwide Epidemic Ineffective Data Security in organisations worldwide has lead to identity theft and fraud becoming the fastest growing and most prevalent crime in society.
CYBER PANEL MEMBERS. Mr. Hart is a member of the United States Air Force Senior Executive Service with over fifteen years service as an SES.
Mr. Bennett Hart, Senior Consultant in Intelligence, Operations, Technology, Training, Proposal Red Teams, and Key Personnel Selection. Mr. Hart is a member of the United States Air Force Senior Executive
2014 Montana Government IT Conference. Securing Data Networks and People
Presenter: Matt Bennett, Genetec Leveraging the Cloud for Hybrid Video Surveillance Matt is based in Seattle, WA and is the Western North America pre-sales engineer for Genetec (the world s leader in unified
DIVISION OF INFORMATION SECURITY (DIS) Information Security Policy IT Risk Strategy V0.1 April 21, 2014
DIVISION OF INFORMATION SECURITY (DIS) Information Security Policy IT Risk Strategy V0.1 April 21, 2014 Revision History Update this table every time a new edition of the document is published Date Authored
Triangle InfoSeCon. Alternative Approaches for Secure Operations in Cyberspace
Triangle InfoSeCon Alternative Approaches for Secure Operations in Cyberspace Lt General Bob Elder, USAF (Retired) Research Professor, George Mason University Strategic Advisor, Georgia Tech Research Institute
BSA-ISSA Information Security Study Online Survey of ISSA Members
BSA-ISSA Information Security Study Online Survey of ISSA Members December 3, 2003 Research Conducted Between October 13 and October 29, 2003 Key Findings I. A majority of security professionals believe
Why Cryptosystems Fail. By Ahmed HajYasien
Why Cryptosystems Fail By Ahmed HajYasien CS755 Introduction and Motivation Cryptography was originally a preserve of governments; military and diplomatic organisations used it to keep messages secret.
TENDER NOTICE No. UGVCL/SP/III/608/GPRS Modem Page 1 of 6. TECHNICAL SPECIFICATION OF GPRS based MODEM PART 4
TENDER NOTICE No. UGVCL/SP/III/608/GPRS Modem Page 1 of 6 TECHNICAL SPECIFICATION OF GPRS based MODEM PART 4 Cloud services (Data Centre) and related Functional requirement Cloud services as a Control
California Counties Information Security Programs A look into the progress and future plans across counties
CCISDA California Counties Information Services Directors Association California Counties Information Security Programs A look into the progress and future plans across counties 2010 Progress Report April
The 2 nd Hong Kong Public Relations Awards 2014 Now Calling For Entry
For Immediate Release The 2 nd Hong Kong Public Relations Awards 2014 Now Calling For Entry (Hong Kong, February 13 2014) The Hong Kong Public Relations Awards 2014 (HK PR Awards 2014) was formally launched
Timothy Renick Vice President for Enrollment Management and Student Success and Vice Provost Georgia State University
Testimony before the United States Senate Committee on Health, Education, Labor and Pensions Timothy Renick Vice President for Enrollment Management and Student Success and Vice Provost Georgia State University
Leveraging Sponsors to Advance Careers
Leveraging Sponsors to Advance Careers a symposium for sponsors and those seeking sponsorship Thursday, March 19, 2015 Eugene McDermott Plaza, Lecture Hall D1.602 Most of you know that having a mentor
THERESE M. ( TERRI ) VAUGHAN
THERESE M. ( TERRI ) VAUGHAN Dr. Therese M. ( Terri ) Vaughan became Robb B. Kelley Distinguished Professor of Insurance and Actuarial Science at Drake University in January 2005, after serving over 10
ARIZONA STATE SENATE 46TH LEGISLATURE FIRST REGULAR SESSION
ARIZONA STATE SENATE 46TH LEGISLATURE FIRST REGULAR SESSION MINUTES OF COMMITTEE ON COMMERCE DATE: March 5, 2003 TIME: 9:00 a.m. ROOM: SHR 3 CHAIRMAN: Senator Leff VICE CHAIRMAN: Senator Blendu ANALYST:
Written Statement of Richard Dewey Executive Vice President New York Independent System Operator
Written Statement of Richard Dewey Executive Vice President New York Independent System Operator Senate Standing Committee on Veterans, Homeland Security and Military Affairs Senator Thomas D. Croci, Chairman
National Black MBA Association is Impacting Time, Technology, and Tomorrow One Member at a Time at the 34 th Annual Conference & Exposition
FOR IMMEDIATE RELEASE Media Contact: Faith Morris (312) 701.0388 [email protected] National Black MBA Association is Impacting Time, Technology, and Tomorrow One Member at a Time at the 34 th Annual
Dr Dennis Reynolds Dennis Reynolds
Dr Dennis Reynolds Associate Director and Ivar Haglund Distinguished Professor of Hospitality Management School of Hospitality Business Management Washington State University Dennis Reynolds, the Associate
Panel on Emerging Cyber Security Technologies. Robert F. Brammer, Ph.D., VP and CTO. Northrop Grumman Information Systems.
Panel on Emerging Cyber Security Technologies Robert F. Brammer, Ph.D., VP and CTO Northrop Grumman Information Systems Panel Moderator 27 May 2010 Panel on Emerging Cyber Security Technologies Robert
4A Healthcare Data Security & Privacy
4A Healthcare Data Security & Privacy Symposium 2015 Banner Program Leaders Ben Goodman Developed in collaboration with Lisa Clark Conference Mission Health and medical regulators are promising audits
Digital Forensics at the National Institute of Standards and Technology
NISTIR 7490 Digital Forensics at the National Institute of Standards and Technology James R. Lyle Douglas R. White Richard P. Ayers NISTIR 7490 Digital Forensics at the National Institute of Standards
What Risk Managers need to know about ICS Cyber Security
What Risk Managers need to know about ICS Cyber Security EIM Risk Managers Conference February 18, 2014 Joe Weiss PE, CISM, CRISC, ISA Fellow (408) 253-7934 [email protected] ICSs What are they
