Print Page   |   Contact Us   |   Report Abuse   |   Sign In   |   Register
Security Reflections of 2013 and Predictions for 2014
Tell a Friend About This EventTell a Friend
Security Reflections of 2013 and Predictions for 2014

ISSA Web Conferences bring together ISSA members from around the world to share leading industry presentations and answer members' questions. Each event is designed to address the timely needs of our members through a live, online event and a subsequent recorded version for on-demand viewing. All content is developed by the ISSA Web Conference Committee.

1/28/2014
When: 1/28/2014
9:00 AM
Where: Web Conference - Register Today!

« Go to Upcoming Event List  



Security Reflections of 2013 and Predictions for 2014

2-Hour Live Event: Tuesday, January 28, 2014

Start Time: 9:00 a.m. US Pacific/ 12:00 p.m. US Eastern/ 5:00 p.m. London

Click here to register.

Generously supported by:


Web Conference Overview:

Once again some brave (or foolish?) folks volunteer some insights and predictions into where infosec challenges will come from in 2014 and beyond. To a degree, changes in legislation and technology are easy meat to predict in a 12-month time frame. But what about environmental impacts such as cyberattacks and cyberwarfare trends? Will the cold wind of social media exploits bring infosec into focus for the ignorant end user? What is likely to be the next cataclysmic event to rock the industry? Where will the wind of change blowsecurity in the ”cloud?" Will the heat be turned up further on compliance requirements? Will there be a drought of funds making everything we want to do harder to achieve? Join us, make notes, and then check back in a year to see how we did!

Speakers:

Dipto Chakravarty
EVP Engineering & Products at ThreatTrack Security Inc.


Dipto Chakravarty is the author of two best-selling computer books from McGraw-Hill and he has published over 45 papers and 11 patents. He holds a BS in Computer Science and Electrical Engineering, MS in Computer Science from the University of Maryland, EMBA from Wharton Business School and a GMP from Harvard Business School.

He is a recognized expert on cyber security, networks and digital video, and currently serves as the EVP of engineering and product management at ThreatTrack Security driving the company’s global R&D and product strategy. Joining Threat Track Security from the Novell management team, he previously ran global engineering for the last seven years. Prior to Novell, he served as the SVP of engineering at e-Security till its acquisition. Earlier at Artesia, he served as the founder and CTO. Besides entrepreneurial startups, Chakravarty has held engineering positions at IBM, Thomson and Bell Labs.


Mathieu Gorge - New York Metro, USA Chapter
CEO and Founder, VigiTrust


Mathieu Gorge is an international authority on IT security, an expert on key legal aspects of corporate security, their laws and frameworks.

His company, VigiTrust, designs cloud based educational programs, provides security assessments, credit card security compliance packages and corporate governance solutions. VigiTrust operates in Europe, US and Ireland and services clients including financial services, banking, merchant aggregators, government and health care.

Mathieu is a regular speaker at international security conferences across Europe and works closely with the PCI Council, East West Institute and ANSI, ISACA, ISSA, and ENISA.


Ira Winkler - Baltimore, Northern Virginia, USA Chapters and ISSA International President
President, Secure Mentem


Ira Winkler, CISSP, is President of Secure Mentem. He is considered one of the world’s most influential security professionals, and has been named a "Modern Day James Bond” by the media. He did this by performing espionage simulations, where he physically and technically "broke into” some of the largest companies in the World and investigated crimes against them, telling them how to cost effectively protect their information and computer infrastructure. He continues to perform these espionage simulations, as well as assist organizations in developing cost effective security programs. Ira also won the Hall of Fame award from the Information Systems Security Association, the 2013 CSO Compass Award, as well as several other prestigious industry awards.


Ira is also author of the riveting, entertaining, and educational books, Spies Among Us and Zen and the Art of Information Security. He is also a columnist for ComputerWorld and writes for several other industry publications.

Mr. Winkler began his career at the National Security Agency, where he served as an Intelligence and Computer Systems Analyst. He moved on to support other US and overseas government military and intelligence agencies. After leaving government service, he went on to serve as President of the Internet Security Advisors Group, Chief Security Strategist at HP Consulting, and Director of Technology of the National Computer Security Association. He was also on the Graduate and Undergraduate faculties of the Johns Hopkins University and the University of Maryland.


Mr. Winkler has also written the book Corporate Espionage, which has been described as the bible of the Information Security field, and the bestselling Through the Eyes of the Enemy. Both books address the threats that companies face protecting their information. He has also written hundreds of professional and trade articles. He has been featured and frequently appears on TV on every continent. He has also been featured in magazines and newspapers including Forbes, USA Today, Wall Street Journal, San Francisco Chronicle, Washington Post, Planet Internet, and Business 2.0.

Kevin Bocek
VP of Product Marketing and Head of Threat Research, Venafi

As Vice President of Product Marketing & Head of Threat Research, Kevin Bocek is responsible for product positioning, go-to-market strategy, and sales enablement at Venafi.

Kevin brings more than 15 years of experience in encryption and key management with trailblazing startups and market leaders including CipherCloud, IronKey, nCipher, PGP, RSA Security, Thales, and Xcert. Most recently, Kevin accelerated the market awareness of CipherCloud as the leader in cloud encryption and established IronKey as the innovator in online banking security and cloud-based BYOD management.


He has authored several books, includingPCI Cardholder Data Protection for DummiesandLaptop Encryption for Dummiesand co-authored research projects with The Ponemon Institute including theCost of a Data BreachandWorldwide Encryption Trendsreports.

Kevin earned a BS degree in Chemistry from the College of William and Mary and an MBA from the Wake Forest School of Business.

Michael F. Angelo - Chief Security Architect, NetIQ Corporation
ISSA Web Conference Committee Chair, Session Moderator

Michael is well known in the security community with his work designing, developing, implementing and deploying security products and architectures for multi-national corporate environments. His work includes participating, driving, and creating security standards, working on corporate policies, national and international legislation, and multi-national regulatory issues.

Michael is very active in the security community at large and participates in numerous international and national advisory councils. Currently, he chairs the ISSA International Webinar Committee, and is a technology contributor to the U.S. Department of Commerce Information Systems Technical Advisory Council. He has also been a featured speaker at numerous national and international security conferences, including RSA, ISSA, and InfoSec. In 2012 and 2013 he was on the RSA national symposia committee.

Michael currently holds 52 U.S. patents (77 World Wide), with the majority being in the area of security and authentication; he is a former Sigma-Xi distinguished lecturer, recipient of the Trusted Computing Platform Alliance (TCPA) lifetime achievement award. In 2011 he was recognized by ISSA as the Security Professional of the Year and in 2013 received the ISSA Hall of Fame Award.

He has numerous security-related blogs, podcasts, and articles, some of which can be found at:

http://community.netiq.com/blogs/security_webb/archive/tags/Michael+F.+Angelo/default.aspx

Community Search
Sign In


Forgot your password?

Haven't registered yet?

Calendar

9/29/2016
Healthcare SIG Webinar: Use of Cloud Services in the Healthcare Industry

10/6/2016
WOMEN CYBER SECURITY PROFESSIONALS LUNCH AND LEARN

10/7/2016
2016 Cyber Security Conference - Cyber Threat Intelligence

10/11/2016
SANS/ISSA Women's CONNECT Event

10/12/2016 » 10/13/2016
Hawaii's 23rd Annual Discover Security Conference 2016




Copyright © 2016, Information Systems Security Association, All Rights Reserved
Privacy PolicyCopyright Information