Print Page   |   Contact Us   |   Report Abuse   |   Sign In   |   Register
Breach Report: Lessons Learned

Breach Report: Lessons Learned

Recorded Live: April 24, 2012
Start Time: 9:00 a.m. US Pacific/ 12:00 p.m. US Eastern/ 5:00 p.m. London

Click here to view this web conference on-demand

Presentation Slides

Generously supported by:


Web Conference Overview:

Once again, the new data breach reports are published. Are we, as security professionals, succeeding in protecting our assets? This session will review the latest breach reports, provide insight into current trends, and evaluate potential solutions.

Larry Ponemon, Ph.D., Chairman and Founder, CIPP – Ponemon Institute

Dr. Larry Ponemon is the Chairman and Founder of the Ponemon Institute, a research "think tank” dedicated to advancing privacy, data protection and information security practices. He is considered a pioneer in privacy auditing and the Responsible Information Management or RIM framework. Security Magazine recently named Dr. Ponemon "Most Influential for Security”.

Dr. Ponemon consults with leading multinational organizations on global information security and privacy management programs. He was appointed to the Advisory Committee for Online Access & Security for the United States Federal Trade Commission and was appointed by the White House to the Data Privacy and Integrity Advisory Committee for the Department of Homeland Security.

Dr. Ponemon was a senior partner of PricewaterhouseCoopers, where he founded the firm’s global compliance risk management group. Prior to joining Price Waterhouse, Dr. Ponemon served as the National Director of Business Ethics Services for KPMG Peat Marwick, and was appointed Executive Director of the KPMG Business Ethics Institute.

Dr. Ponemon is a veteran (Vietnam War era) of the United States Navy. He is married and has two sons. Dr. Ponemon is an instrument rated private pilot.

Shannon Lietz, CISSP, CISA, CISM - Senior Security Manager, ServiceNow

Shannon Lietz currently works for ServiceNow, a software company that produces a Software as a Service ITSM platform, as the Sr. Manager of Security. Previously, Ms. Lietz worked for Sony, a leading Fortune 500 electronics and entertainment company, helping to develop plans for a new secure data center and to crisis manage a large-scale security breach. She has previously founded a metrics company, developed custom security software, and consulted for many Fortune 500 organizations. Prior to this, she was a Master Security Architect working for the Chief Security Officer, a member of the Chief Security Officer’s Staff and Global Security Services Centre of Excellence for Savvis, the leading provider of outsourcing solutions for complex, critical Internet operations.

Ms. Lietz has lectured throughout the world and has published numerous papers. She has spoken for FCC NRIC, ISSA, WCAI, ANSI, Credit Unions, and at BlackHat on a variety of topics.

Presentation Overview:

The unexpected should be expected in today’s business environment. In this session, Shannon Lietz will share her vast experience in incident response and lessons learned from her key role during the restoration of the Sony outage.

Eric Naiburg, Program Director, Information Governance Solutions Product Marketing Strategy – IBM

Eric is co-author of UML for Database Design and UML for Mere Mortal both published by Addison Wesley. He rejoined IBM in 2008 after 2 years away from IBM and currently is responsible for InfoSphere Optim, InfoSphere Guardium and IBM Information Governance solutions marketing. Prior to rejoining IBM, he worked for Ivar Jacobson Consulting as VP of Sales and Marketing. Previously working for IBM, Eric held several roles within the Rational Software group including program director for business, industry and technical solutions, product manager for Rational Rose and team market manager for Rational Desktop Product. He also spent several years with Logic Works Inc. (Acquired by Platinum Technologies and CA), as product manager for ERwin. Before moving into the field of Information Technology, Eric owned a small construction company where he built and worked on more than 50 homes.

Presentation Overview:

Database breaches continue to top the morning news headlines. In the first month of 2012, www.privacyrights.org already reported 33 breaches in the United States and those are just the ones that have been identified and reported.

Why aren’t the numbers of breaches slowing down? Organizations continue to struggle with budgets, processes and technology to thoroughly protect their data. True data protection requires depth in defense. In this session, we will discuss why we can no longer only rely on a single point of protection and how monitoring database activities are required to ensure a separation of duties and real-time protection.

Moderated By:

Faith Heikkila, Ph.D., CIPP-US, CISM - ISSA Web Conference Committee

Faith Heikkila, Ph.D., CIPP-US, CISM is CISO for Greenleaf Capital, Inc. She is responsible for overall information security governance and compliance, and oversees the protection of personal and financial information for clients. Dr. Heikkila is the InfraGard Michigan Members Alliance Chairman. Dr. Heikkila earned her Ph.D. in Information Systems from Nova Southeastern University specializing in Information Assurance. Dr. Heikkila has published numerous information security articles and is widely recognized as a subject matter expert in e-discovery, data privacy, information security policies and procedures, computer security breaches, financial regulatory compliance laws, PCI DSS compliance, and state data breach notification laws.

Community Search
Sign In


Forgot your password?

Haven't registered yet?

Calendar

9/29/2016
Healthcare SIG Webinar: Use of Cloud Services in the Healthcare Industry

10/6/2016
WOMEN CYBER SECURITY PROFESSIONALS LUNCH AND LEARN

10/7/2016
2016 Cyber Security Conference - Cyber Threat Intelligence

10/11/2016
SANS/ISSA Women's CONNECT Event

10/12/2016 » 10/13/2016
Hawaii's 23rd Annual Discover Security Conference 2016




Copyright © 2016, Information Systems Security Association, All Rights Reserved
Privacy PolicyCopyright Information