Print Page   |   Contact Us   |   Report Abuse   |   Sign In   |   Register
ISSA International Conference 2010

September 16, 2010

7:30am

Conference Registration & Exhibit   Pavilion Opens

8:00am - 8:30am

Welcoming Address

8:30am - 9:15am

KEYNOTE: Howard Schmidt, US White House Cybersecurity Coordinator - the first six months...   Cybersecurity Coordinator, is scheduled to present the Opening   Keynote Address.

Please join our former ISSA International   President as he updates us on his first six months at the helm   of the White House's Cybersecurity efforts.

 

Morning Keynote Sponsored By: Kaspersky

9:15am - 10:10am

KEYNOTE PANEL:Threat Updates from the Front Lines
Leading security   executives will share their experiences and defenses to the   biggest threats to information security.

Panelists to include:

  • Bret Arsenault: Chief Information Security Officer, Microsoft IT
  • Thomas P. Madden: Chief Information Security Officer, US Centers for Disease Control and Prevention (CDC)
  • Tony Spinelli: Senior Vice President, Chief Security Officer - Corporate Security and Compliance, Equifax, Inc.

 

Moderated By: Pete Lindstrom, CISSP - Chief   Operating Officer, ISSA International Board & Research Director, Spire   Security

10:10am - 10:40am

Session Break - Exhibit Pavilion

10:20am – 10:35am

Sponsor Presentation

Operationally Efficient Controls for Identifying and   Protecting Sensitive Data

Joel Ferman - Director of Programs, PacketMotion, Inc.

Room: Exhibit Floor Presentation Theater

10:40am - 11:30am

Data Protection Track

Evil Employees & the Nefarious Competitors &   Nation-States Who Love Them

Brian Contos - Director Global Security Strategy &   Risk Management, McAfee

Room: Italian Suite One

10:40am - 11:30am

Governance, Risk & Compliance Track

COLLABORATing in the boardroom - CISO lessons learned   in presenting security to non-security peers

Panelists Include:
Eric Cowperthwaite - CSO, Providence   Health Services
Candy Alexander - CISO, Long Term Care   Partners LLC

Room: Italian Suite Two

10:40am - 11:30am

Incident Response Track

Incident Response in Increasingly Complex Environments

Russ McRee - Manager, Incident Response, Microsoft   Online Services Security & Compliance, Microsoft

Room: Kenyan Suite One

10:40am - 11:30am

Featured Presentation

Security in a CONNECTed World: Social Networking,   Privacy & the Law

Moderator: Lynn Goodendorf, CIPP, CISSP – CEO, Good   Security Consulting LLC

Salon Five - Keynote Stage

10:40am - 11:30am

Information Security Law: Forensics,   eDiscovery and Defensibility Track

Best Practices in Managing eDiscovery, Retention, and   Investigation Risks

Johnny Lee - Director and Practice Leader, Forensic   Technology Services, Grant Thornton LLP

Room: Swiss Suite One

11:30am - 11:50am

Session Break - Exhibit Pavilion

11:50am - 12:40pm

Data Protection Track

Industry Expert Round Table Discussion - Data Privacy

Moderated By: Beth A. Kost-Woodrow - Vice President   & Chief Privacy Officer, WellStar Health System

Room: Italian Suite One

11:50am - 12:40pm

Sponsor Presentation

End to End Trust: Creating A Safer, More Trusted   Internet

Atul Shah: End-to-End Trust Team, Microsoft Corporation

Room: Italian Suite Two

11:50am - 12:40pm

Information Security Law: Forensics,   eDiscovery and Defensibility Track

Emerging Threats in the Area of Cyber Crime, Data   Breach Response and Digital Forensics

John Reed Stark - Managing Director, Stroz Friedberg

Room: Swiss Suite One

11:50am - 12:40pm

Incident Response Track

So You Are Infected … Now What?

John Oswald - Technical Lead Cyber Security Branch,   Honeywell Technology Solutions Inc.(HTSI)

Room: Kenyan Suite One

11:50am - 12:40pm

Application Security Track

Run x.509 Environments in a Smarter Way

Lutz Hipper- Senior Consultant Security Consulting,   Glueck & Kanja Consulting AG

Room: Kenyan Suite Two

12:40pm - 1:50pm

Luncheon Keynote:
Eran   Feigenbaum - Director of Security, Google Apps

Cloud Computing - A Brave New   World for Information Security

1:50pm - 2:20pm

Session Break - Exhibit Pavilion

2:00pm – 2:15pm

Sponsor Presentation

Case Study: Outsourcing Identity Management in the   Cloud

Dennis McDermott - Vice President of Sales &   Marketing, Fischer International Identity

Room: Exhibit Floor Presentation Theater

2:20pm - 3:10pm

Information Security Law: Forensics,   eDiscovery and Defensibility Track

Virtualization, Cloud Computing and Forensics

Gregory Kipper - Investigator and CyberFuturist,   General Dynamics - AIS

Room: Swiss Suite One

2:20pm - 3:10pm

Governance, Risk & Compliance Track

Industry Expert Round Table Discussion - Risk   Management

Moderated By: Rich Owen, CISSP, CPP - Director of   Security, Early Warning Services LLC

Room: Italian Suite Two

2:20pm - 3:10pm

Incident Response Track

Offensive Act or Active Defense: The Debate Over Use of   Force In Cyberspace

Randy V. Sabett, J.D., CISSP - Partner, Sonnenschein   Nath & Rosenthal LLP

Room: Kenyan Suite One

2:20pm - 3:10pm

Data Protection Track

The Changing Face of Mobile Application Security with   Cloud-Based Technologies

Slawek Ligier - Vice President, Engineering-Consumer Authentication,   VeriSign, Inc.

Room: Italian Suite One

3:10pm - 4:10pm

Session Break - Exhibit Pavilion

3:15pm – 3:30pm

Sponsor Presentation

Rogue Radius Servers - Attacking WPA-Enterprise   Wireless Networks

Matt Neely CISSP, CTGA, GCIH and GCWN - Profiling Team   Manager, SecureState

Room: Exhibit Floor Presentation Theater

3:40pm – 3:55pm

Sponsor Presentation

Access Governance & Management for Maximum Business   Impact

Fred Bement - Director of Sales, Aveska, Inc.

Room: Exhibit Floor Presentation Theater

4:10pm - 5:00pm

Governance, Risk & Compliance Track

Cloud Security Alliance Update

Phil Agcaoili - Chief Information Security Officer   (CISO), Cox Communications, Inc.

Room: Italian Suite Two

4:10pm - 5:00pm

Information Security Law: Forensics,   eDiscovery and Defensibility

Legally Defensible, Proactively Protected.

Presented by: Benjamin Tomhave - Sr. Security Analyst,   Gemini Security Solutions & David Navetta, Esq, CIPP - Founding Partner,   Information Law Group

Room: Swiss Suite One

4:10pm - 5:00pm

Incident Response Track

Online Fraud and Identity Theft 2010 and Beyond

James Brooks - Director, Product Management -   Cyveillance,Inc.

Room: Kenyan Suite One

4:10pm - 5:00pm

Featured Presentation

PCI Panel Discussion: Cloud, Token, E2EE, Reasonable   Security or YOU CHOOSE!!

Moderated by: Rob Harvey - Practice Lead for PCI   Assessments, AT&T Consulting

Salon Five - Keynote Stage

4:10pm - 5:00pm

Application Security Track

Fundamental Practices and Tools to Implement a Security Development Lifecycle

Cassio Goldschmidt - Senior Manager, Product Security,   Office of the CTO, Symantec Corporation

Room: Kenyan Suite Two

5:00pm - 7:00pm

ISSA International Awards Reception:
All ISSA   International Conference attendees are invited to join in celebrating the   accomplishments of the information security community. Mix, mingle, and   connect at this evening reception.

Please join us in extending our   congratulations to the outstanding individuals, chapters and organizations   selected by their peers for their exceptional contributions to ISSA and the   information security profession.

Hall of Fame:Steven B. Lipner, Stephen Northcutt
Honor Roll: Marc H. Noble, Northern Virginia Chapter; Kevin L.   Richards, Chicago Chapter; Roger Younglove, Motor City Chapter; Ernest E.   Zernial, Jr., Alamo Chapter
Security Professional of the Year: Howard "Skip” Chapman,   Northern Virginia Chapter
Organization of the Year: ITT Technical Institute
President’s Award for Public Service: George Proeller, Colorado   Springs Chapter
Chapters of the Year: Central Alabama, Fewer than 100 Members;   Phoenix, 100-200 Members; Northern Virginia, More than 200 Members
Chapter Communications Programs of the Year: Poland and UK

Community Search
Sign In


Forgot your password?

Haven't registered yet?

Calendar

9/29/2016
Healthcare SIG Webinar: Use of Cloud Services in the Healthcare Industry

10/6/2016
WOMEN CYBER SECURITY PROFESSIONALS LUNCH AND LEARN

10/7/2016
2016 Cyber Security Conference - Cyber Threat Intelligence

10/11/2016
SANS/ISSA Women's CONNECT Event




Copyright © 2016, Information Systems Security Association, All Rights Reserved
Privacy PolicyCopyright Information