Recorded Live: April 24, 2012
Start Time: 9:00 a.m. US Pacific/ 12:00 p.m. US Eastern/ 5:00 p.m. London
Click here to view this web conference on-demand
Generously supported by:
Web Conference Overview:
Once again, the new data breach reports are published. Are we, as
security professionals, succeeding in protecting our assets? This
session will review the latest breach reports, provide insight into
current trends, and evaluate potential solutions.
Larry Ponemon, Ph.D., Chairman and Founder, CIPP – Ponemon Institute
Dr. Larry Ponemon is the Chairman and Founder of the Ponemon
Institute, a research "think tank” dedicated to advancing privacy, data
protection and information security practices. He is considered a
pioneer in privacy auditing and the Responsible Information Management
or RIM framework. Security Magazine recently named Dr. Ponemon "Most
Influential for Security”.
Dr. Ponemon consults with leading multinational organizations on
global information security and privacy management programs. He was
appointed to the Advisory Committee for Online Access & Security for
the United States Federal Trade Commission and was appointed by the
White House to the Data Privacy and Integrity Advisory Committee for the
Department of Homeland Security.
Dr. Ponemon was a senior partner of PricewaterhouseCoopers, where he
founded the firm’s global compliance risk management group. Prior to
joining Price Waterhouse, Dr. Ponemon served as the National Director of
Business Ethics Services for KPMG Peat Marwick, and was appointed
Executive Director of the KPMG Business Ethics Institute.
Dr. Ponemon is a veteran (Vietnam War era) of the United States Navy.
He is married and has two sons. Dr. Ponemon is an instrument rated
Shannon Lietz, CISSP, CISA, CISM - Senior Security Manager, ServiceNow
Shannon Lietz currently works for ServiceNow, a software company that
produces a Software as a Service ITSM platform, as the Sr. Manager of
Security. Previously, Ms. Lietz worked for Sony, a leading Fortune 500
electronics and entertainment company, helping to develop plans for a
new secure data center and to crisis manage a large-scale security
breach. She has previously founded a metrics company, developed custom
security software, and consulted for many Fortune 500 organizations.
Prior to this, she was a Master Security Architect working for the Chief
Security Officer, a member of the Chief Security Officer’s Staff and
Global Security Services Centre of Excellence for Savvis, the leading
provider of outsourcing solutions for complex, critical Internet
Ms. Lietz has lectured throughout the world and has published
numerous papers. She has spoken for FCC NRIC, ISSA, WCAI, ANSI, Credit
Unions, and at BlackHat on a variety of topics.
The unexpected should be expected in today’s business environment. In
this session, Shannon Lietz will share her vast experience in incident
response and lessons learned from her key role during the restoration of
the Sony outage.
Eric Naiburg, Program Director, Information Governance Solutions Product Marketing Strategy – IBM
Eric is co-author of UML for Database Design and UML for Mere Mortal
both published by Addison Wesley. He rejoined IBM in 2008 after 2 years
away from IBM and currently is responsible for InfoSphere Optim,
InfoSphere Guardium and IBM Information Governance solutions marketing.
Prior to rejoining IBM, he worked for Ivar Jacobson Consulting as VP of
Sales and Marketing. Previously working for IBM, Eric held several roles
within the Rational Software group including program director for
business, industry and technical solutions, product manager for Rational
Rose and team market manager for Rational Desktop Product. He also
spent several years with Logic Works Inc. (Acquired by Platinum
Technologies and CA), as product manager for ERwin. Before moving into
the field of Information Technology, Eric owned a small construction
company where he built and worked on more than 50 homes.
Database breaches continue to top the morning news headlines. In the
first month of 2012, www.privacyrights.org already reported 33 breaches
in the United States and those are just the ones that have been
identified and reported.
Why aren’t the numbers of breaches slowing down? Organizations
continue to struggle with budgets, processes and technology to
thoroughly protect their data. True data protection requires depth in
defense. In this session, we will discuss why we can no longer only rely
on a single point of protection and how monitoring database activities
are required to ensure a separation of duties and real-time protection.
Faith Heikkila, Ph.D., CIPP-US, CISM - ISSA Web Conference Committee
Faith Heikkila, Ph.D., CIPP-US, CISM is CISO for Greenleaf Capital,
Inc. She is responsible for overall information security governance and
compliance, and oversees the protection of personal and financial
information for clients. Dr. Heikkila is the InfraGard Michigan Members
Alliance Chairman. Dr. Heikkila earned her Ph.D. in Information Systems
from Nova Southeastern University specializing in Information Assurance.
Dr. Heikkila has published numerous information security articles and
is widely recognized as a subject matter expert in e-discovery, data
privacy, information security policies and procedures, computer security
breaches, financial regulatory compliance laws, PCI DSS compliance, and
state data breach notification laws.