Print Page   |   Contact Us   |   Report Abuse   |   Sign In   |   Register
February 2013


Cyber Attacks: Past, Present and Future


Recorded Live: February 19, 2013
Start Time: 9:00 a.m. US Pacific/ 12:00 p.m. US Eastern/ 5:00 p.m. London


Click here for presentation slides.

Click here
to view recorded web conference.

Generously supported by:



Web Conference Overview:

Over the past 30 years security attacks have continued to evolve and so have the driving forces behind them. Recent attacks against core infrastructure components such as SSL (the renegotiate issue) as well as the Stuxnet attack have shaken some organizations’ faith in computer security technology. This webinar will attempt to tackle the question of "What is next?” Will it be an attack of BYOD Zombies, a Cloud of Death, governmental Czarist intervention, or something worse…

Speakers:


Kim L. Jones - Phoenix, USA Chapter
Senior Vice President & Chief Security Officer, Vantiv

Kim L. Jones is SVP, Chief Security Officer at Vantiv and has been an intelligence, security, and risk professional for over 25 years. A sought-after speaker and industry thought leader, Jones has built, refined, and/or managed security programs in the financial services, healthcare, manufacturing, outsourcing, and defense industries.

Jones has a bachelor’s degree in computer science from the U.S. Military Academy at West Point, a master’s degree in information assurance from Norwich University and holds the CISM, CISSP, and CRISC certifications. Jones is a member of the CISO Advisory Council for ISSA International and currently sits on the board of directors for the Phoenix Chapter of ISACA.


Ira Winkler - Baltimore, Northern Virginia, USA Chapters and ISSA International President
President, Secure Mentem

Ira Winkler, CISSP, is President of Secure Mentem. He is considered one of the world’s most influential security professionals, and has been named a "Modern Day James Bond” by the media. He did this by performing espionage simulations, where he physically and technically "broke into” some of the largest companies in the World and investigated crimes against them, telling them how to cost effectively protect their information and computer infrastructure. He continues to perform these espionage simulations, as well as assist organizations in developing cost effective security programs. Ira also won the Hall of Fame award from the Information Systems Security Association, as well as several other prestigious industry awards.

Ira is also author of the riveting, entertaining, and educational books, Spies Among Us and Zen and the Art of Information Security. He is also a columnist for ComputerWorld and writes for several other industry publications.

Mr. Winkler began his career at the National Security Agency, where he served as an Intelligence and Computer Systems Analyst. He moved on to support other US and overseas government military and intelligence agencies. After leaving government service, he went on to serve as President of the Internet Security Advisors Group, Chief Security Strategist at HP Consulting, and Director of Technology of the National Computer Security Association. He was also on the Graduate and Undergraduate faculties of the Johns Hopkins University and the University of Maryland.

Mr. Winkler has also written the book Corporate Espionage, which has been described as the bible of the Information Security field, and the bestselling Through the Eyes of the Enemy. Both books address the threats that companies face protecting their information. He has also written hundreds of professional and trade articles. He has been featured and frequently appears on TV on every continent. He has also been featured in magazines and newspapers including Forbes, USA Today, Wall Street Journal, San Francisco Chronicle, Washington Post, Planet Internet, and Business 2.0.

Jason Hong
CTO and Co-Founder, Wombat Security Technologies

Jason joined the School of Computer Science at Carnegie Mellon University in 2004 as an assistant professor in the Human Computer Interaction Institute. He works in the areas of ubiquitous computing and usable privacy and security, focusing on location-based services, anti-phishing, mobile social computing and end-user programming.

He is also an author of the book "The Design of Sites” (Addison-Wesley, 2001), a pattern-based approach to designing customer-centered web sites. He received his Ph.D. from the University of California, Berkeley, and his undergraduate degrees from Georgia Institute of Technology.

Mathieu Gorge - New York Metro, USA Chapter
ISSA Web Conference Committee, Session Moderator

Mathieu Gorge is an international authority on IT security, an expert on key legal aspects of corporate security, their laws and frameworks. His company, VigiTrust, designs cloud based educational programs, provides security assessments, credit card security compliance packages and corporate governance solutions. VigiTrust operates in Europe, US and Ireland and services clients including financial services, banking, merchant aggregators, government & health care. Mathieu is a regular speaker at international security conferences across Europe and works closely with the PCI Council, East West Institute and ANSI, ISACA, ISSA, and ENISA.

Community Search
Sign In


Forgot your password?

Haven't registered yet?

Calendar

12/6/2016 » 12/7/2016
Threat Intelligence Summit 2016

12/6/2016
ISSA Pre-Professional Virtual Meet-Up: What Should your Toolbox Look Like?

12/8/2016
December 2016 CISO Mentoring Webinar Series

12/9/2016
Financial SIG Quarterly Webinar

12/10/2016
SecureMiami




Copyright © 2016, Information Systems Security Association, All Rights Reserved
Privacy PolicyCopyright Information