Print Page   |   Contact Us   |   Report Abuse   |   Sign In   |   Register
2013 ISSA International Conference Keynote Videos
We would like to thank all who joined us at the 2013 International Conference in Nashville, TN - USA.

Below are the recordings of the inspiring keynote presentations. Members click here for select recording and presentation slides from breakout sessions (member log in required.)


Glenn Harlan Reynolds, Beauchamp Brogan Distinguished Professor of Law, University of Tennessee College of Law and Author of An Army of Davids: How Market and Technology Empower Ordinary People To Beat Big Media, Big Government and Other Goliaths




Eugene H. Spafford, Executive Director, CERIAS and Professor-Dept. of Computer Sciences at Purdue University, Purdue University, ISSA Distinguished Fellow, Central Indiana Chapter




Rt Hon Baroness Neville-Jones, DCMG, United Kingdom Special Government Representative to Business for Cybersecurity




 

CISO Keynote Panel

Julia King, Executive Editor, Events/National Correspondent at Computerworld, Moderator
Bill Burns, Director of Information Security, Netflix, Inc.
Paul Connelly, Vice President of Information Privacy and Security/CISO, Hospital Corporation of America
Scott Mackelprang, Chief Security Officer, Asurion


2012 ISSA International Conference Keynotes

On behalf of ISSA International, our host chapter, Orange County, and the 2012 International Conference committee, I would like to thank all who joined us at the 2012 International Conference in Anaheim, California.

Below are recordings of the inspiring keynote presentations. Click here for Featured Speakers (member log in required).

Howard A. Schmidt

Join recently retired Cybesecurity Coordinator for the Obama Administration, as he shares insights from his time at the White House’s Executive Office of the President and extensive career in the information security field.

 


John F. Koster, MD – President and CEO, Providence Health & Services
The Data-Driven Collaborative Enterprise – A CEO’s Perspective

"Big data” is here, but organizations need to understand how to use it. Dr. Koster will share how he has transformed his health care organization with meaningful use of digital tools and collaboration among experts to not only identify innovation, but spread it across scale in real time. This collaborative implementation of new technology has provided an environment that allows for enhanced security without detracting from the really significant improvements in health care around quality and affordability.



Keynote Panel: Embracing Change

Join leading CISOs as they discuss how they have embraced change to make their organizations faster, better, smarter and, most importantly, safer.

Moderated by: Bob Bragdon - Publisher, CSO Magazine

Panelists Include:
  • Eric Cowperthwaite - Chief Information Security Officer, Providence Health & Services
  • Jack Jones- Senior Vice President and Chief Information Security Officer, Huntington Bank
  • Tammy Moskites - Vice President and Chief Information Security Officer, Time Warner Cable
  • Robert Pittman - Chief Information Security Officer, County of Los Angeles

     


    Ross Koppel, PhD – Professor, University of Pennsylvania
    Human Creativity: Workarounds as Enablers and Inhibiters of Security

    IT systems oblige humans to be creative in ways system designers neither anticipated nor wanted – with occasional disastrous consequences. Workarounds allow people and systems to function. They allow competent and incompetent, well-intended and malefactors, to overcome bad programming, insufficient training, poor design, and inadequate integration of information technology and workflow. Sometimes workarounds display valuable efficiencies; sometimes they permit the lazy or inattentive to accomplish tasks in unfortunate ways. Always, workarounds expose opportunities for system knowledge and improvements. Most workarounds are unnoticed and unheeded; many are taught as part of routine procedures.

    In this keynote session, Professor Koppel will share his extensive research on workarounds via observations, statistical analyses, intensive interviews, shadowing, and participation in key committees. Examples will be drawn primarily from health care organizations, but also from financial, data storage and security sectors. Building security systems without fully considering workarounds is like assuming no one ever leaves the key under the mat.

  • Community Search
    Sign In


    Forgot your password?

    Haven't registered yet?

    Calendar

    9/29/2016
    Healthcare SIG Webinar: Use of Cloud Services in the Healthcare Industry

    10/6/2016
    WOMEN CYBER SECURITY PROFESSIONALS LUNCH AND LEARN

    10/7/2016
    2016 Cyber Security Conference - Cyber Threat Intelligence

    10/11/2016
    SANS/ISSA Women's CONNECT Event

    10/12/2016 » 10/13/2016
    Hawaii's 23rd Annual Discover Security Conference 2016




    Copyright © 2016, Information Systems Security Association, All Rights Reserved
    Privacy PolicyCopyright Information