e-discovery Conference



Similar documents
I ve been breached! Now what?

Course 4202: Fraud Awareness and Cyber Security Workshop (3 days)

The FBI Cyber Program. Bauer Advising Symposium //UNCLASSIFIED

IBM Security Privileged Identity Manager helps prevent insider threats

CYBER SECURITY INFORMATION SHARING & COLLABORATION

Top 5 Global Bank Selects Resolution1 for Cyber Incident Response.

Is Your Company Ready for a Big Data Breach?

Cybersecurity for Nonprofits: How to Protect Your Organization's Data While Still Fulfilling Your Mission. June 25, 2015

Wednesday, March 11, :00am to 4:30pm. Seats are filling fast, sign up today!

Keynote: FBI Wednesday, February 4 noon 1:10 p.m.

Hot Topics in Law Practice Management

SECURITY CONSIDERATIONS FOR LAW FIRMS

October 24, Mitigating Legal and Business Risks of Cyber Breaches

ASSUMING A STATE OF COMPROMISE: EFFECTIVE DETECTION OF SECURITY BREACHES

Getting real about cyber threats: where are you headed?

Cybersecurity and internal audit. August 15, 2014

Defending Against Data Beaches: Internal Controls for Cybersecurity

White Paper THE FOUR ATTACK VECTORS TO PREVENT OR DETECT RETAILER BREACHES. By James Christiansen, VP, Information Risk Management

The Onslaught of Cyber Security Threats and What that Means to You

Reliable, Repeatable, Measurable, Affordable

Cybersecurity. Are you prepared?

Addressing the SANS Top 20 Critical Security Controls for Effective Cyber Defense

SECURITY OVERVIEW FOR MY.ENDNOTE.COM. In line with commercial industry standards, Thomson Reuters employs a dedicated security team to protect our

Cyber Security and Information Assurance Controls Prevention and Reaction NOVEMBER 2013

Experience the commitment WHITE PAPER. Information Security Continuous Monitoring. Charting the Right Course. cgi.com 2014 CGI GROUP INC.

case study Core Security Technologies Summary Introductory Overview ORGANIZATION: PROJECT NAME:

Privacy / Network Security Liability Insurance Discussion. January 30, Kevin Violette RT ProExec

IBM Security re-defines enterprise endpoint protection against advanced malware

Cybersecurity: What CFO s Need to Know

Addressing APTs and Modern Malware with Security Intelligence Date: September 2013 Author: Jon Oltsik, Senior Principal Analyst

The Unintentional Insider Risk in United States and German Organizations

Think STRENGTH. Think Chubb. Cyber Insurance. Andrew Taylor. Asia Pacific Zone Product Manager Chubb Pro PI, Media, Cyber

Actions and Recommendations (A/R) Summary

Securing and protecting the organization s most sensitive data

Preemptive security solutions for healthcare

Applying machine learning techniques to achieve resilient, accurate, high-speed malware detection

Cyber Risks Management. Nikos Georgopoulos, MBA, cyrm Cyber Risks Advisor

Cyber Threats Insights from history and current operations. Prepared by Cognitio May 5, 2015

Law Firm Cyber Risk Conference: Addressing the Issues from the Top Down

the challenge our mission our advisors

Testimony of Dan Nutkis CEO of HITRUST Alliance. Before the Oversight and Government Reform Committee, Subcommittee on Information Technology

2015 Michigan NASCIO Award Nomination. Cyber Security Initiatives: Michigan Cyber Disruption Response Strategy

REPORT. Next steps in cyber security

2015 Global Megatrends in Cybersecurity

NIST Cybersecurity Framework Impacting Your Company? April 24, 2014 Presented By Sheila FitzPatrick, NetApp Jeff Greene, Symantec Andy Serwin, MoFo

Cybersecurity: Protecting Your Business. March 11, 2015

Cyber Insurance: How to Investigate the Right Coverage for Your Company

Security Management. Keeping the IT Security Administrator Busy

Working with the FBI

Perceptions About Network Security Survey of IT & IT security practitioners in the U.S.

7/23/2015. Tales of a Real-Life Hacker. Jon Miller. Vice President of Strategy Former ethical hacker of energy company operations.

The Protection Mission a constant endeavor

Data Privacy: The High Cost of Unprotected Sensitive Data 6 Step Data Privacy Protection Plan

E-Discovery. A Practical Guide to

Reducing the cost and complexity of endpoint management

National Cyber Security Policy -2013

Analyzing HTTP/HTTPS Traffic Logs

WHAT EVERY CEO, CIO AND CFO NEEDS TO KNOW ABOUT CYBER SECURITY.

Who s Doing the Hacking?

INFORMATION SECURITY FOR YOUR AGENCY

By: Gerald Gagne. Community Bank Auditors Group Cybersecurity What you need to do now. June 9, 2015

Network Security & Privacy Landscape

State of Security Survey GLOBAL FINDINGS

IBM Security QRadar Risk Manager

Protecting Your Data, Intellectual Property, and Brand from Cyber Attacks

ITAR Compliance Best Practices Guide

Middle Class Economics: Cybersecurity Updated August 7, 2015

Cyber Watch. Written by Peter Buxbaum

Protecting against cyber threats and security breaches

IBM Security QRadar Vulnerability Manager

7 VITAL FACTS ABOUT HEALTHCARE BREACHES.

SOLUTION BRIEF. Next Generation APT Defense for Healthcare

Advanced Cyber Threats in State and Local Government

HPC IN Cybersecurity Annual Technical Meeting. Venue: Schlumberger Richmond Ave, Houston, TX 77042

Oil & Gas Cybersecurity

Cyber Security An Exercise in Predicting the Future

Corporate Compliance Programs - Industry Best Practices. November 18, 2010 (Thursday) 8:00 a.m. to 12:00p.m.

ENABLING FAST RESPONSES THREAT MONITORING

Big 4 Information Security Forum

The Impact of Cybercrime on Business

Transcription:

Information Security & Protection Seminar June 15, 2011 8:00 a.m. to 3:30 p.m. Presented by: ARMA Greater Indianapolis Chapter Session 1: Physical Security, & Handling Classified Information Overview Rolls-Royce Security Expert, Cynthia J. vanbree e-discovery Conference 8:30-9:30 Session 1 Session 2: Cyber Threats To Indiana Corporations And Their Clients FBI Cyber Security Expert, Special Agent Michael Alford March 24, 2010 8 a.m. to 4 p.m. Session 3: Enterprise Signature-Based Antivirus is catching less than 50% of current attacks: How can you protect your Data and Devices? -Bob Foley, J.D., CEO Session 4: The Intersection of Data Privacy, Records Management and e-discovery - Joan S. Antokol, Esq. Schedule 8:00-8:30 Registration & CE Sign-in/Continental Breakfast 9:30-10:00 Break/Vendor Exhibits/CE Sign-in 10:00-11:00 Session 2 11:00-11:30 Vendor Exhibits 11:30-12:30 Lunch/Vendor Exhibits/CE Sign-in 12:30-1:30 Session 3 1:30-2:00 Break/Vendor Exhibits/CE Sign-in 2:00-3:00 Session 4 3:00-3:30 Closing remarks/ prize drawings (must be present to win) Where: Rolls-Royce Training Ctr. - Auditorium Who should attend? Information & Records Professionals, Privacy & Security and IT Professionals, Lawyers, Paralegals and Students Sessions approved for 4 ICRM Certification Maintenance Program (CMP) credit hours (1 CMP credit hour per session) Sessions eligible for 4 CPE credits from IAPP International Association of Privacy Professionals (1 CPE credit per session) Sessions approved for 4 CLE Credits (1 CLE credit per session) ARMA Greater Indianapolis Chapter ARMA International is a not-for-profit professional association and the authority on managing records and information paper and electronic. The Greater Indianapolis Chapter provides education, research and networking opportunities to information professionals in Indiana. When: 2601 W. Raymond St. Indianapolis. IN 46241 (See map on page 3) Weds., June 15, 8:00 am to 3:30 pm. Registration: One price, any or all sessions & vendor exhibits: $75 ARMA Members $100 Non-members $25 Students (School I.D. required) * Includes continental breakfast and lunch. Advance registration online by June 13 th at www.armaindy.org to guarantee seating and meals. Pay online at time of registration. Only cash and checks accepted at the door. REGISTER NOW: SEATING IS LIMITED! *Please note that Rolls-Royce security protocol requires all visitors present a photo I.D. and Foreign Nationals must use the advance registration process and will be contacted for additional documentation requirements.

I (8:30-9:30) Session 1: Physical Security, & Handling Classified Information Overview Physical Security Overview (per the NISPOM, National Industrial Security Program Operating Manual) Requirements for shredding, GSA (U.S.A. General Services Administration) approved safes, copy machines (approved copiers), secure conference rooms, U.S. mail. Handling Classified Information Overview Procedures employees should follow when working on contracts that require access to classified information--information that for reasons of national security needs to be protected. Objectives: *Describe how information becomes classified. *Describe the concept of security clearances. *Recognize classified information. *Practice proper procedures for safeguarding classified information in its various forms (e.g. hardcopy, electronic). *Identify classified material that has not been properly safeguarded and take appropriate action. *Address security questions or concerns to the local security office. *Definitions of Foreign National, Foreign Person, Foreign Interest. *Intelligence threats. *Foreign Collection Methods of Operation. *Controlled unclassified information. Presented by: Cynthia J. vanbree, Rolls-Royce Security Expert Ms. vanbree is the Senior Security Manager for Rolls-Royce in Indianapolis. Cindy has over twenty years of experience in the practical implementation of the United States National Industrial Security Program (NISP). The NISP prescribes the requirements for safeguarding classified national security information in industry established through Executive Order 12829. Cindy earned an MBA from University of Indianapolis and is a recipient of the James A. Cogswell Award for excellence in industrial security. Cindy has received commendations from the FBI and Defense Security Service for her contributions to the national security. (10:00-11:00) Session 2: Cyber Threats To Indiana Corporations And Their Clients Special Agent Alford, FBI cyber security expert, will discuss the threats to Indiana corporations and their customers posed by cyber criminals extending beyond the Internet. The attackers utilize a combination of sophisticated computer intrusions, phishing schemes, social engineering and physical theft, and are supported by world-wide availability of compromised computers to route malicious Internet traffic. SA Alford will discuss the FBI s efforts to combat this crime problem and provide suggestions to corporations for handling incidents. Presented by: Special Agent Michael Alford Michael Alford has been a Special Agent with the FBI in Indianapolis for over three years and has over 15 years of experience in computer security and computer forensics. He routinely investigates complex computer intrusions, including national security intrusions and intrusions into industrial control systems. Prior to his current position, he worked at the University of Central Florida as Coordinator of Computer Applications for the University Relations division.

(12:30-1:30) Session 3: Enterprise Signature-Based Antivirus is catching less than 50% of current attacks: How can you protect your Data and Devices? Despite the increased adoption of cloud computing and other hosted application technologies, most organizations are still committed to providing every knowledge worker with a personal computer. This computer then becomes a target for an increasingly well funded, sophisticated, innovative and diabolical set of criminals across the world. The threat environment continues to outpace improvements in threat detection effectiveness. Signature-based AV has been limping along on life support for years. A multi-layered approach that includes behavioral protection technologies offers promise to provide effective protection. This presentation will look at the recent trends in endpoint attacks and available options to safeguard against intrusion and data loss. Presented by: Bob Foley, J.D., CEO Matrix Global Partners, Inc. Bob has spent the majority of his business career as an entrepreneur and leader in the software industry. While trained as a lawyer, Bob has focused on building and managing businesses that develop software and services for customers in the areas of data management and security and has worked with organizations that range from small banks to international business leaders like The Gap, GE, McDonald s and large federal government organizations. Bob s current passion is developing his business, Matrix, into a leader in endpoint security solutions and support and is currently working with organizations around the world. (2:00-3:00) Session 4: The Intersection of Data Privacy, Records Management and e-discovery Data privacy, records management and e-discovery continue to impact organizations, including those in Indiana. Joan Antokol, Indianapolis attorney and former Global Privacy Officer at Novartis Pharma, will discuss the changing US and global privacy landscape. She will incorporate a discussion on how privacy and security requirements are influencing records and e- Discovery. Further, she will provide recommendations to organizations. Presented by: Joan S. Antokol, Managing Partner, Head Privacy and Data Protection Practice Park Legal LLC Joan Antokol is internationally recognized for her work in privacy and data protection. She is a member of Park Legal LLC, a new Indianapolis-based boutique law firm that focuses its practice in the areas of data privacy, information security and data management. Ms. Antokol also owns an online training company and a software company. She assists global and local organizations with many aspects of privacy, security, and overall compliance, such as healthcare privacy and security, security breaches (including risk minimization), employee privacy, credit card data compliance, enterprise management, privacy and security policies and procedures, and privacy auditing. Joan is a frequent presenter at privacy conferences in the U.S. and E.U. and has a number of published articles about privacy and security. Since 2002, Joan has been the only private sector attorney who is a member of a group comprised of the data protection regulators from each of the E.U. Member States, Canada, Switzerland, the U.S. (i.e., Federal Trade Commission and U.S. Homeland Security), and several countries in Asia. Ms. Antokol is also the 2011 Chair of the Indiana Security and Privacy Network (InSPN), a privacy and security organization that currently has about 100 local organizations as members. Before starting Park Legal LLC in May 2010, Joan spent three years as a partner at a large Indianapolis law firm and launched that firm s privacy and records management practice group. Prior to that time, Joan was a Vice President and the Global Head of Privacy for the 260 Novartis Group companies.

The ARMA Indy Spring Seminar is being sponsored by these vendors: Information Consulting has a simple objective: To improve our client s ability to find, to use, to manage and to protect its information. From businesses looking to establish information management and protection programs to organizations looking to audit their established programs, Information Consulting can help. We work collaboratively with our clients to build usable compliant Information Management & Governance Programs, Information Protection and Privacy Programs, and E-Discovery Preparedness Programs. Information Consulting takes our clients from vision to practice. Xact Data Discovery (XDD) is an international Data Discovery and Management company providing streamlined Forensic, Processing, Hosting, Document Review, Project Management, Imaging & Coding and Paper Discovery services to law firms, corporations and government agencies. At Xact Data Discovery, communication is everything because clients need to know where their data is throughout the entire discovery life cycle as well as understand the valuable information and knowledge they can obtain from it. As a global leader in Information Management, Recall provides the services you need throughout the life cycle of your sensitive documents. From document storage and retrieval, to digital conversion, data protection and secure destruction, Recall provides businesses with more than secure information management we provide peace of mind. In 2010 the founders of Pondurance, Theseus Security and ArchMaven joined forces to strengthen Pondurance LLC into one of the leading information security consulting firms in the Midwest. The partners of Pondurance are seasoned information security experts, having practiced as risk and advisory consultants for prominent organizations such as the Department of Defense, Ernst & Young, IBM, Verisign, Verizon Business, Fifth Third Bank, Cybertrust, Accuvant and the Payment Card Industry (PCI) Security Standards Council. Our team of information security professionals assists clients to assess their current information security posture, and to develop remediation and risk reduction plans.

ARMA Information & Security Protection Conference Location DIRECTIONS TO ROLLS-ROYCE/UAW TRAINING CENTER & AUDITORIUM 2601 W. Raymond St., Indianapolis, IN 46241 Gate 5-7, UAW/Rolls-Royce Corp. Training Center Only 6 miles S.W. of downtown Indianapolis, and close to I-70 and I-465 Free parking available in lots to the side and front of the Rolls-Royce Training Center PHOTO I.D. REQUIRED TO ENTER LOBBY and foreign nationals must pre-register. Enter off of W. Raymond St. at stop light between Kentucky Ave. & Tibbs Ave. (Gate 5-7, UAW/Rolls-Royce Corporation Training Center) You can only turn South at stop light onto private drive into Rolls-Royce. Follow signs to Training Center, red building, entrance is located on the circle drive with flags and white awning. Parking is available in front and at side of building. Parking lots & Lobby entrance