Print Page   |   Contact Us   |   Report Abuse   |   Sign In   |   Register
2011 Conference Recordings

HomeRegistrationAgendaLodging & TravelChapter Leaders SummitSponsors2011 Recordings

Thanks to all of the sponsors, volunteers, presenters and those who attended 2011 conference in Baltimore. Noted experts, executive leaders, and innovative professionals led sessions to make us more effective today and lay the foundation for the future. Members collaborated with peers on solutions to common concerns and the trusted advisors in our exhibit hall shared their valuable knowledge with attendees.

Below are audio recording of the keynote presentations. ISSA Members will also have access to audio recordings and slide decks from many featured speakers and session presenters. Click here and log in for complete access.

Archive:

Opening Keynote General Keith B. Alexander - United States Army, Commander, U.S. Cyber Command & Director National Security Agency Central Security Service. With introduction from Stefano Zanero, Conference Chair, and Kevin L. Richards, ISSA International President.


Shawn Henry – Executive Assistant Director, FBI
Assurance and Attribution: The Case for an Alternate Internet
Not all uses of the Internet are equal. For some users, privacy is paramount. For others, it’s security. Despite the increasing number of intrusions and disruptions, the Internet as it currently exists may be sufficient for those who want to tweet and e-mail anonymously. But for owners of critical infrastructure, security trumps privacy. For these users, a separate domain that would allow assurance—the ability to detect changes in data or hardware—and attribution—the ability to determine who made the changes—may be the answer. We must begin the dialogue now about whether and how to make it happen.


M. Eric Johnson - Director, Glassmeyer/McNamee Center for Digital Strategies and Professor, Tuck School of Business at Dartmouth College
Human Behavior – The Weakest Link?
For many organizations, the most challenging security frontier is people. Corporations and governments alike are faced with staggering risks from members of their own organization. Whether willful or inadvertent, human-induced leaks fueled by mass distribution from WikiLeaks can create breath-taking exposure. Likewise, simple deceptions can lead to large-scale losses of intellectual property. While the risks are not new, the targeted threats toward individuals are increasing with ever-more sophisticated deceptions. The consumerization of technology has simply added to the human challenge. Whether malicious or naïve, learning how to assess and change human behavior is every security professional’s challenge. In this presentation, the problems with people will be explored and how firms might address them in the future will be considered.


Position Yourself for 2020 – An Executive Perspective
This keynote panel will feature leading executives discussing what they expect the future to hold for security professionals. How will information security change between now and 2020? What skills will be valuable? How will security concerns integrate with business goals? And how can practitioners prepare for this future?


Moderator: Bob Bragdon - Publisher, CSO Magazine and CFOworld.com
Panelists Include:

  • Roland Cloutier - Vice President, Chief Security Officer, ADP
  • Andy Ellis - Chief Security Officer, Akamai
  • Dave Estlick - VP Information Security, Starbucks Coffee Company
  • Kris Herrin - Chief Technology Officer, Heartland Payment Systems

  • Community Search
    Sign In


    Forgot your password?

    Haven't registered yet?

    Calendar

    9/26/2016
    Secure360-Wisconsin

    9/29/2016
    Healthcare SIG Webinar: Use of Cloud Services in the Healthcare Industry

    10/6/2016
    WOMEN CYBER SECURITY PROFESSIONALS LUNCH AND LEARN

    10/7/2016
    2016 Cyber Security Conference - Cyber Threat Intelligence




    Copyright © 2016, Information Systems Security Association, All Rights Reserved
    Privacy PolicyCopyright Information