Name of presentation Company name



Similar documents
INNOVATION. Campus Box 154 P.O. Box Denver, CO Website:

Executive Cyber Security Training. One Day Training Course

Dr. Starnes E. Walker Founding Director, Cybersecurity Initiative (302)

Information Security in a Downturn

Network Support. Technical Certificate. Program Outcomes: FOUNDATION COURSES. 1 of 7

Cyber-Security Risk- IP Theft and Data Breaches Protecting your Crown Jewels Internally and with Your Key Third Parties

University of Maryland University College. American Military University. Henley-Putnam University

Social Media Security Training and Certifications. Stay Ahead. Get Certified. Ultimate Knowledge Institute. ultimateknowledge.com

Promoting a cyber security culture and demand compliance with minimum security standards;

We believe successful global organisations can confront fraud, corruption and abuse PwC Finland Forensic Services

SECURITY & RISK MANAGEMENT CONSULTANTS COURSE (SRMC)

Certification for Information System Security Professional (CISSP)

2012 CyberSecurity Watch Survey

Cyber Security Awareness Day

NIST Cybersecurity Framework Impacting Your Company? April 24, 2014 Presented By Sheila FitzPatrick, NetApp Jeff Greene, Symantec Andy Serwin, MoFo

JOINT EVENT WITH IIBA-LA. Trends & Best Practices in. Cybersecurity for networks, cloud computing and mobile

Security Transcends Technology

PREPARE YOUR INCIDENT RESPONSE TEAM

Douglas M. DePeppe Cyberlaw Attorney

Information Systems Security Certificate Program

2014 Montana Government IT Conference. Securing Data Networks and People

USF Graduate Catalog SECTION 23.

Jibran Ilyas DIRECTOR

CYBER SECURITY, INTELLIGENCE AND AWARENESS COURSE PARK HOTEL THE HAGUE THE HAGUE, NETHERLANDS 26-30OCTOBER 2015

CyberSkills Management Support Initiative

Certification and Training

Department of Homeland Security

Course Content Summary ITN 267 Legal Topics in Network Security (3 Credits)

Information Security Principles and Practices

Wednesday, March 11, :00am to 4:30pm. Seats are filling fast, sign up today!

DHS. CMSI Webinar Series

Protecting Energy s Infrastructure and Beyond: Cybersecurity for the Smart Grid

Info-Tech Research Group. Media Kit

Network Engineering Technology

North Texas ISSA CISO Roundtable

Appendix A: Gap Analysis Spreadsheet. Competency and Skill List. Critical Thinking

PREPARED TESTIMONY OF THE NATIONAL CYBER SECURITY ALLIANCE MICHAEL KAISER, EXECUTIVE DIRECTOR ON THE STATE OF CYBERSECURITY AND SMALL BUSINESS

Cyber Security & Cyber Criminality: ~ The Facts ~ - Sgt Phil Cobley

Speaker Information. United States Patent and Trademark Office

Cybersecurity in SMEs: Evaluating the Risks and Possible Solutions. BANCHE E SICUREZZA 2015 Rome, Italy 5 June 2015 Arthur Brocato, UNICRI

IT Security Management 100 Success Secrets

OUTLINE FOR AN INTERDISCPLINARY CERTIFICATE PROGRAM

Australia s proposed accession to the Council of Europe Convention on Cybercrime

WCA WEBINAR SERIES: The Case for Cyber Security Training

Integrating Cybersecurity with Emergency Operations Plans (EOPs) for Institutions of Higher Education (IHEs)

Introducing... FedVTE and FedCTE

Certified Cyber Security Analyst VS-1160

Johnson Graduate School of Management, Cornell University NBA 548. INTERNATIONAL POLITICAL RISK MANAGEMENT

Nicole N. Hanson, M.A.

The Next Generation of Security Leaders

Anthony Reyes. Curriculum Vitae

RETHINKING CYBER SECURITY Changing the Business Conversation

(ISC)² Foundation Announces 2014 Information Security Scholarship Recipients

Cybercrime & Cybersecurity: the Ongoing Battle International Hellenic University

Technology Crime Services

JOEL M. ROSENTHAL, C.P.A., CVA

Certified Cyber Security Analyst VS-1160

University of the State of New York; New York State Licensed Psychologist Since 1983; #7640.

Patrick Fair Partner, ITC and Data Security Specialist Baker & McKenzie. Developments in Security Regulation

Who s Looking At Your Mobile Device? Data Security, Personal Privacy, and Information Governance in the Wireless World

USF Graduate Catalog SECTION 18.

Shon Harris s Newly Updated CISSP Materials

Stanford University Bulletin. Series 12 No. 1 May 13, Courses and Degrees

Lessons from Defending Cyberspace

WILLIAM M. MICHAELSON, C.P.A., C.F.E., M.A.E., D.A.B.F.A., C.F.F. CURRICULUM VITAE

Cybersecurity AAS Program

Introduction to Cyber Security

Master of Science in Cyber Security and Management

BACHELOR OF CRIMINOLOGY AND SECURITY MANAGEMENT(BCSM

KIMBERLY A. BENDER Curriculum Vitae

SECTION 10: FACULTY OF CRIMINOLOGY, JUSTICE AND POLICY STUDIES

2 ND CYCLE PROGRAM IN LEGAL STUDIES

Identity Fraud: Presented by: MOHD ZABRI ADIL TALIB Head, Digital Forensics CyberSecurity Malaysia

Cool Careers in Cybersecurity for Girls Workshop

62 Children s Court psychological assessments

Pacific Islands Telecommunications Association

Kevin Savoy, CPA, CISA, CISSP Director of Information Technology Audits Brian Daniels, CISA, GCFA Senior IT Auditor

The National Skills Academy for IT. Cyber Security

Transcription:

Name of presentation Company name

Thank you for your consideration

CyberSecurity Awareness Month Cybercrime and Copyright Infringement Amber Chris Burgess Marcus Rogers

Amber Purdue student sued by RIAA PSA

From CSOonline.com How to Stop Industrial Espionage By Christopher Burgess & Richard Power Awareness and education: Provide ongoing education to your workforce on the threats of economic espionage, intellectual property theft, counterfeiting and piracy. Help them understand your expectation that they will protect the enterprise's intellectual property, and by extension, their own livelihood. Provide general education for the entire workforce, and specialized education for executives, managers, technical personnel and so on.

Chris Burgess Christopher Burgess is a Senior Security Advisor to the Chief Security Officer of Cisco Systems, where he focuses on intellectual property strategies. Prior to joining Cisco, Christopher served as a senior national security executive for more than 30 years. He lived and worked in South Asia, Southeast Asia, Middle East, Central Europe and Latin America, where he acquired a deep understanding of the people, cultures and business practices. He is co-author of, "Secrets Stolen, Fortunes Lost," a study of the global threat to intellectual property, which was published by CSO Magazine in June 2006. In addition, he has been an invited speaker addressing various corporate Intellectual Property strategy teams and industry organizations on the many threats to intellectual property. Christopher serves as a member of the advisory board of Vadium Technology, Inc, a cryptographic solution company. Christopher Burgess also worked for the CIA for 30 years. He also serves as an advisor to Azimyth LLC a firm which develops and uses transformational technologies to power & deliver the next generation of services for broad classes of information delivery solutions across many communication media.

Resources Teaching, Research, and Outreach Policy on Intellectual Property http://www.purdue.edu/policies/pages/teach_res_outreach/b_10.ht ml Manager of Intellectual Property http://epics.ecn.purdue.edu/guidelines/teamroles/mip.php Biotechnology, Gene Flow, and Intellectual Property http://www.agriculture.purdue.edu/arp/agsummit.htm Intellectual Property Protection http://www.eere.energy.gov/inventions/energytechnet/ip/index.htm l

Dr. Marcus Rogers Dr. Rogers is a professor specializing in the area of Cyber Forensics. He is also a faculty member with the Center for Education and Research in Information Assurance and Security (CERIAS). Dr. Rogers is a Certified Information Systems Security Professional (CISSP), a former Senior Lead Instructor for (ISC)2, a member of the QA team for the SSCP and CISSP certifications and the co-author of the Law Investigation and Ethics section of the CISSP CBK Review Course. He is also a former police detective with a background in computer crime investigations. His area of interests include Applied Computer Forensics, Cybercrime Scene Analysis, and Cyber-terrorism. He has authored several book chapters, and articles in the area of computer forensics and forensic psychology. Dr. Rogers is the Editor-in Chief of the Journal of Digital forensic Practice and sits on the editorial board for several international journals. He is a frequent speaker at international and national information assurance and security conferences, and guest lectures at various universities throughout the world. Educational Background PhD (Forensic Psychology), University of Manitoba MB, 2001. MA (Psychology), University of Manitoba MB, 1995. BA (Psychology/Criminology), University of Manitoba MB, 1986.

Questions?? As always, be careful out there.

Credits: Thanks to Mindy Jasmund & Jennifer Kapp Ty and Alex Kingman for marketing materials Thanks to Joel Rasmus for speakers ITNS staff who support and encourage each other Exponent, Inside Purdue, Journal & Courier Purdue Facebook