Pre-registration is closed -- Please register at the Symposium. Thank you.



Similar documents
UNC Charlotte Computer Security Symposium

Events. 7:45AM - 6:30PM McKnight Auditorium Cone University Center UNC Charlotte 9201 University City Blvd. Charlotte, NC Most Visited Links

THE DIGITAL AGE THE DEFINITIVE CYBERSECURITY GUIDE FOR DIRECTORS AND OFFICERS

Representative James R. Langevin Chairman of the Homeland Security Subcommittee on Emerging Threats, Cyber Security and Science and Technology

Programme. 8.30am am

A New Security Publication About Risk and Security for Business Leaders. Sponsorship & Advertising Media Pack

understanding and managing enterprise risk; evaluating organizational structure and communications; assessing and handling insider threats;

Name of presentation Company name

Big 4 Information Security Forum

Organizational Security Track FAQ

Cyber threats are growing.

Wednesday, March 11, :00am to 4:30pm. Seats are filling fast, sign up today!

North Texas ISSA CISO Roundtable

4A Healthcare Data Security & Privacy

CAROL BOYLES ANDERSON

Statement for the Record. Richard Bejtlich. Chief Security Strategist. FireEye, Inc. Before the. U.S. House of Representatives

ISSA Women in Security Special Interest Group (WIS SIG)

Testimony of. Before the United States House of Representatives Committee on Oversight and Government Reform And the Committee on Homeland Security

Report on CAP Cybersecurity November 5, 2015

CYBER PANEL MEMBERS. Mr. Hart is a member of the United States Air Force Senior Executive Service with over fifteen years service as an SES.

Adopting a Cybersecurity Framework for Governance and Risk Management

U. S. Attorney Office Northern District of Texas March 2013

2014 Montana Government IT Conference. Securing Data Networks and People

The Professional Accountant

Dr. Starnes E. Walker Founding Director, Cybersecurity Initiative (302)

Business Transformation Through IT Leadership BUTLER UNIVERSITY CORPORATE AND EXECUTIVE EDUCATION

OKLAHOMA STATE UNIVERSITY BIG DATA CONFERENCE. April 7, 2015

44% What Delegates are Saying About Black Hat Webcasts. What Delegates are Doing After Black Hat Webcasts

OKLAHOMA STATE UNIVERSITY BIG DATA CONFERENCE. April 7, 2015

know school PubliC affairs

Cyber Security Awareness Workshop

CYBERSECURITY BEST PRACTICES FOR SMALL AND MEDIUM PENNSYLVANIA UTILITIES

2015 Cybersecurity Campaign. Improving Today, Protecting Tomorrow

NIST Cybersecurity Framework Impacting Your Company? April 24, 2014 Presented By Sheila FitzPatrick, NetApp Jeff Greene, Symantec Andy Serwin, MoFo

Corporate Compliance Programs - Industry Best Practices. November 18, 2010 (Thursday) 8:00 a.m. to 12:00p.m.

Edmund E. Perea J.D, Esq

GLOBAL FORENSIC AND DISPUTE SERVICES CYBER PROTECTION SPECIALISTS

Michigan Cyber Summit 2013 Hosted by Michigan Governor Rick Snyder

TURNING THE RISING TIDE OF CYBERSECURITY THREATS

DEVELOPMENTS AND TRENDS IN HEALTHCARE LAW 2015

Conference Schedule and

Oil & Gas Cybersecurity

Computer and Network Security in Higher Education

NGA Paper. Act and Adjust: A Call to Action for Governors. for cybersecurity;

Bernice P. (Bernie) Dixon

Appendix A: Gap Analysis Spreadsheet. Competency and Skill List. Critical Thinking

SECURING PAYMENTS IN THE CYBER WORLD

Athens, 2 December 2011 Hellenic American Union Conference Center

Cyber Sanity: Innovative Approaches to Data Security. Sponsored By:

Georgia Tech Cybersecurity Leadership Certificate Program July 25 29, 2016

ESTATE PLANNING AND ADMINISTRATION SEMINAR

National Cyber Security Awareness Month. Week Two: Creating a Culture of Cybersecurity at Work

( 4EC C11392)

About Our 2015 WTA Cyber Security Speakers and Sessions

Bio Summary and CV. curriculum vitae of John C. Villines; Introduction; page 1 of 5 (rev Jan 2013)

11/27/2015. Cyber Risk as a Component of Business Risk: Communicating with the C-Suite. Conflict of interest. Learning Objectives

ISSA SOUTH TEXAS CHAPTER NEWSLETTER

Inaugural Conference

States at Risk: Cyber Threat Sophistication, Inadequate Budget and Talent

Protecting Energy s Infrastructure and Beyond: Cybersecurity for the Smart Grid

Working with the FBI

CYBERSECURITY BEST PRACTICES FOR SMALL AND MEDIUM PENNSYLVANIA UTILITIES. second edition

USF Graduate Catalog SECTION 23.

Information Security Forum Sponsorship Programs

How To Hold A Public Safety Summit

September 28, MEMORANDUM FOR. MR. ANTONY BLINKEN Deputy Assistant to the President and National Security Advisor to the Vice President

Georgia Tech College of Management

HPC IN Cybersecurity Annual Technical Meeting. Venue: Schlumberger Richmond Ave, Houston, TX 77042

University-Industry Work Group: Education

Data Analytics and Business Intelligence Improving Your Operations Performance

Venue : Conference Hall, Second Floor YMCA Building Jai Singh Marg, Connaught Place, New Delhi

AGENDA Morning Session

International Business Symposium

Department of Justice Policy Guidance 1 Domestic Use of Unmanned Aircraft Systems (UAS)

January IIA / ISACA Joint Meeting Pre-meeting. Cybersecurity Update for Internal Auditors. Matt Wilson, PwC Risk Assurance Director

Amit Garg BERKELEY RESEARCH GROUP, LLC 1800 M Street, N.W. 2 nd Floor Washington, D.C Direct: agarg@thinkbrg.

CyberSecurity Solutions. Delivering

STEP UP Two-Day Training Program

Crafting an Undergraduate Information Security Emphasis Within Information Technology

The Hunt for Fraud. September 25, Seminar / Training. September 26, 2014

Panel on Emerging Cyber Security Technologies. Robert F. Brammer, Ph.D., VP and CTO. Northrop Grumman Information Systems.

SECURITY & RISK MANAGEMENT CONSULTANTS COURSE (SRMC)

Career Survey. 1. In which country are you based? 2. What is your job title? 3. Travel budget. 1 of 28. Response Count. answered question 88

Tuesday, August 19th Prevent, Detect, Respond: A Framework for Effective Cyber Defense Dr. Eric Cole, Fellow, SANS Institute

Security & privacy in the cloud; an easy road?

Cybercrime & Cybersecurity: the Ongoing Battle International Hellenic University

Implementation of the Cybersecurity Executive Order

Why do Identity and Access Management Projects Fail? With FishNet Security IAM Services Group January 26, 2012

CYBER SECURITY FOR SMALL BUSINESS CONFERENCE. Co-Sponsored by Sam s Club and SCORE

Department of Homeland Security Federal Government Offerings, Products, and Services

Northrop Grumman Cybersecurity Research Consortium

e-discovery Conference

ISSA SOUTH TEXAS CHAPTER

Hacking and Hardware: Understanding the Threats, Compliance Obligations, and Cybersecurity Solutions for Utilities

An Actionable. exposure. Do not miss an opportunity to attend Mr. Pabrai s presentation. You will not be disappointed.

NEW YORK UNIVERSITY SCHOOL OF LAW, New York, N.Y. Master of Law in Taxation (May 2002)

Update on the CSSLP And its Impact on the SDLC Profession. Hart Rossman, CSSLP Member, (ISC) 2 Application Security Advisory Board

MARYLAND. Cyber Security White Paper. Defining the Role of State Government to Secure Maryland s Cyber Infrastructure.

Security Transcends Technology

Written Statement of Richard Dewey Executive Vice President New York Independent System Operator

Transcription:

> Most Visited Links Software and Information Systems Computer Science Faculty Listing (Contratulations 2007 Award Winners) Mrs. Diane Cassidy-Excellence in Undergraduate Teaching Award, Dr. Min Shin-Excellence in Graduate Teaching Award, Ms. Eve Powell and Dr. Tiffany Barnes-Essam El-Kwae Student-Faculty Research Award, Mr. Robin Gandhi and Mr. Kashif Sharif-Outstanding Teaching Assistant Awards, Ms. Nancy Clarke-Outstanding Staff Award. Events Event Details Event Title: Date: Oct 15, 2008 2008 Fall Cyber Security Symposium Pre-registration is closed -- Please register at the Event The Carolina Cyber Defenders from the Software and Informaiton Systems Department finished second in the Souteast Collegiate Cyber Defense Competition hosted by UNCC March 10-11. The Carolina Cyber Defenders are the defending national champions. Charlotte Mayor Pat McCrory has proclaimed October UNC Charlotte Cyber Security Awareness Month." The declaration comes as UNC Charlotte will again play host to the 2006 Fall Computer Security Symposium on October 25th. Dr. Mirsad Hadzikadic, Dean of the College of Computing and Informatics, was awarded the Dr. Richard Neel Award for Career Achievement at the 2005 Blue Diamond Awards sponsored by Information Technology Charlotte more information Effective on November 1, 2003 - Dr. Richard Lejk accepted the position of Associate Dean for the College of Computing and Informatics. Congratulations to Dr Lejk on his new position. Time: Location: Description: 7:45AM - 6:30PM ET McKnight Auditorium Cone University Center UNC Charlotte 9201 University City Blvd. Charlotte, NC 28223 Pre-registration is closed -- Please register at the Symposium. Thank you. The rapid deployment of advanced communication and information technology in our society has enabled increased interdependencies among diverse business groups, government agencies, and other entities. The spread of such technologies and the consequential reliance on it, require the commitment of all participants to know, understand, and take action to minimize the threats that compromise the facility, the integrity of data in the network, and the privacy rights of all persons. Intended Audience Business continuity professionals, IT managers, software developers, systems administrators, information security professionals, information security consultants, and policy makers should take advantage of this exceptional opportunity. CPE and CEU credits will be available. Contacts Registration: Nancy Clarke Media: Clark Curtis Sponsorships: Olin Broadway Invoices: Lathan Phillips Sponsorships https://secure.www.alumniconnections.com/olc/pub/nnc/events/nnc2161535.html (1 of 5) [11/18/2009 11:23:15 AM]

Please contact Olin Broadway for more information Support is designated for and will be used for this project. Remaining proceeds from the event may be directed, at the discretion of the Dean, to other College of Computing and Informatics' programs, including but not necessarily, hospitality and the purchase of alcoholic beverages. 2008 Sponsors include... Conference Co-Sponsors Charlotte Research Institute Silver Sponsors AirDefense Bronze Sponsors Speakers Deloitte Microsoft 2008 speakers include: Rich Baich, CISSP, CISM Principal, Security & Privacy Services, Deloitte. Rich Baich, CISSP, CISM. Rich currently serves as the leader for the financial services Security & Privacy practice for Deloitte Touche in the Southeast and Federal Government. He was formerly Chief Information Security Officer (CISO) at ChoicePoint Inc. Rich s security leadership roles include: Naval Information Warfare Officer for the National Security Agency (NSA); Sr. Director Professional Services at Network Associates (now McAfee); and after 9/11, as Special Assistant to Deputy Director for the National Infrastructure Protection Center (NIPC) at the Federal Bureau of Investigation (FBI). In 2005, Rich authored Winning as a CISO, a leadership sourcebook for security executives. He received the "Information Security Executive of the Year in Georgia" award in 2004 for his security and pioneering leadership. He serves as an advisor for Congresswomen Myrick's Homeland Security Taskforce and recently was selected as an advisor for the President s Commission on Cybersecurity. Greg Bell, Principal, KPMG LLP, Advisory Services Practice Greg Bell, KPMG. Mr. Bell is a Principal in the Atlanta office of KPMG s Advisory Services Practice and serves as KPMG s Global Services Leader for our Information Protection (Security, Privacy and Continuity) practice. He is experienced with various areas of Information Management and Information Security with particular specialization in the fields of IT risk management and business enablement. Mr. Bell has extensive knowledge and experience managing complex projects implementing, administrating and securing complex client-server and heterogeneous network technologies. Mr. Bell is a Certified Information Systems Security Professional. ( CISSP ) Ted Claypoole Womble, Carlysle, Sandridge & Rice Ted Claypoole, Womble Carlisle Sandridge and Rice. Ted Claypoole concentrates his practice in privacy, information security, technology https://secure.www.alumniconnections.com/olc/pub/nnc/events/nnc2161535.html (2 of 5) [11/18/2009 11:23:15 AM]

transactions and alliances, e-commerce and intellectual property protection as an attorney. He served as Assistant General Counsel for technology and Internet matters for Bank of America and as corporate counsel for CompuServe, Inc. Ted is a graduate of Duke University and the Ohio State University College of Law. Tom Gallagher Microsoft Tom Gallagher, Microsoft, coauthor of Hunting Security Bugs Tom is currently the lead of the Office Security Test team. This team is primarily focused on penetration testing, writing security testing tools, and educating program managers, developers, and testers about security issues. Doris Gardner Supervisory Special Agent, Cyber Crime Squad, FBI Doris Gardner, Supervisory Special Agent of the FBI office in Charlotte, supervises the Cyber Crime Squad for the entire state and is former Headquarters Supervisor for the Infrastructure Protection and Computer Crime Program for the southeastern offices of the FBI. Dan Geer VP/Chief Scientist, Verdasys, Inc. Dan Geer, Chief Information Security Officer for In-Q-Tel, the venture capital arm of the U.S. Central Intelligence Agency. He also serves as the Chair of the Advisory Board to ClearPoint Metrics, and as a Commission member on the Center for Strategic and International Studies' "Commission on Cyber Security for the 44th Presidency. He authored the white paper, The Shrinking Perimeter Making the Case for Data Level Risk Management and has also co-written several books and reports, including Cyber Insecurity. and most recently, Economics and Strategies of Data Security. Carter Heath Chief Information Security Officer, UNC Charlotte Carter has nearly ten years of security industry experience working as a consultant, systems designer and Information Security Officer. Carter and his team have the responsibility for securing the infrastructure and information assets of the University. Thomas J. Holt Assistant Professor, Department of Criminal Justice, UNC at Charlotte Dr. Thomas J. Holt is an Assistant Professor in the Department of Criminal Justice at the University of North Carolina at Charlotte specializing in computer crime, cybercrime, and technology. His research focuses on computer hacking, malware, and the role that technology and the Internet play in facilitating all manner of crime and deviance. He works with computer and information systems scientists, law enforcement, businesses, and technologists to understand and link the technological and social elements of computer crime. Dr. Holt has been published in several academic journals, and has presented his work at various computer security and criminology conferences. He is also on the editorial board of the International Journal of Cyber-Criminology. Patrick Keaton IBM Information Management Executive Patrick Keaton is an IBM Information Management Executive of IBM's Optim Solution for Enterprise Data Management for the Americas. https://secure.www.alumniconnections.com/olc/pub/nnc/events/nnc2161535.html (3 of 5) [11/18/2009 11:23:15 AM]

Additionally, Mr. Keaton has the executive responsibility for shaping and delivering Optim solutions around Data Governance and Data Privacy at four of IBM's largest customers in the Financial Services, and Telecommunication industries. Mr. Keaton was previously a leader in IBM's GBS consulting organization, with responsibility for sales, and delivery of strategic Customer Relationship Management solutions in the Life Sciences Industry John Linkous eiqnetworks, Inc. John Linkous is IT Governance, Risk and Compliance (GRC) Evangelist at eiqnetworks, Inc. In his multifaceted role, John is responsible for establishing eiq s risk and compliance management product strategy, and ensuring that eiqnetworks customers are able to use the company s products to efficiently and effectively meet their unique risk and compliance requirements. John has over fifteen years of technology management and consulting experience specializing in the fields of enterprise systems management, information security and regulatory compliance with diversified global clients in the healthcare, financial services, aerospace, federal government, technology, education, retail, and communications sectors. His extensive knowledge of current information security and compliance issues, ability to fluidly communicate and bridge the complex gaps between technology and business, and clear writing style have made him a noted author and sought-after keynote speaker on a broad range of information security and management topics. John is author of, and contributing author to, numerous published books and white papers. Rhonda MacLean Barclays Rhonda MacLean, CISO, Barclays Rhonda MacLean is the CISO of Barclays, a major global financial services provider. Before joining Barclays, she ran MacLean Risk Partners LLC, a consulting firm that provides strategic consulting services for Fortune-ranked business enterprises, governments, industry associations and product companies. Rhonda MacLean serves as an Adjunct Distinguished Senior Fellow with Carnegie Mellon University s CyLab. In 2002, Ms. MacLean served as the sector coordinator and chairperson of the Financial Services Sector Coordinating Council for Critical Infrastructure Protection and Homeland Security. http://www.fsscc.org/ She also sits on the Global Council of CSO s, a think tank of senior cyber leaders from the public, private and academic sectors. Ms. MacLean was formerly leader of Bank of America s Corporate Global Information Security Group. She served fifteen years in various information technology leadership roles for The Boeing Company. In September 2003, The Executive Women s Forum named MacLean one of five Women of Vision, one of the top business leaders shaping the information security industry. MacLean was also named one of the 50 most powerful people in the network industry in NetworkWorld s 2003 and 2004 issues. In recognition of her continued leadership in the security field, she was awarded CSO s Compass Award in 2005. Cheri F. McGuire Principal Security Strategist, Microsoft Corporation In March 2008, Cheri McGuire joined Microsoft as a Principal Security Strategist in their Trustworthy Computing group, where she brings more than 18 years of experience in public and private sector critical infrastructure protection (CIP) policy, strategic planning, and cyber security and telecommunications program management. In her role at Microsoft, Ms. McGuire focuses on aligning CIP and cyber security requirements and policy with Microsoft s software, services, and https://secure.www.alumniconnections.com/olc/pub/nnc/events/nnc2161535.html (4 of 5) [11/18/2009 11:23:15 AM]

capabilities and with external industry and government organizations. She currently serves on the Industry Executive Subcommittee of the President s National Security Telecommunications Advisory Committee (NSTAC), and as the Vice Chair of the Information Technology (IT) Sector Coordinating Council. Peter F. Murphy, III Senior Vice President and Chief Technology Officer, TIAA-CREF Peter Murphy, TIAA-CREF. Peter Murphy is Senior Vice President and Chief Technology Officer at TIAA-CREF. He is responsible for managing core infrastructure assets and instituting and monitoring corporate technology standards company-wide. His responsibilities also include IT service delivery, technology risk management and security and architecture. Mr. Murphy joined TIAA-CREF in November 2005 as Chief Information Security Officer (CISO). In this role, he also was responsible for security policy and procedures, security risk and threat management, as well as the company s technology disaster recovery program. Mr. Murphy has also held numerous positions at Bank of America and was CISO at AmSouth Bank, which is now part of Regions Financial. Event Registration To register for this event, complete the form below and select "Continue". Event Details: Enter Quantity: Price: Individual Registration $ 99.00 Special Association Registration. Members of the following organizations may register at any time for the discounted registration fee. Please note that you must indicate the name of your association on the following registration page. $ 85.00 Charlotte Police Department CISSP Electronic Crime Task Force InfraGard ISSA ITC NCTA NC State Employees UNC Charlotte Faculty, Staff, Student UNC Charlotte ID is required No Charge Running Total: $ Copyright 2003-2007 College of Information Technology Site last updated at 15:26:08 on 06/15/07 https://secure.www.alumniconnections.com/olc/pub/nnc/events/nnc2161535.html (5 of 5) [11/18/2009 11:23:15 AM]