Print Page   |   Contact Us   |   Report Abuse   |   Sign In   |   Register
May 2016 ISSA Web Conference - Breach Report Analysis






Breach Report Analysis--SWOT or SWAT?

Recorded Event: Tuesday, May 24, 2016



Click here to view the recording.
Click here to take the CPE quiz.
Click here to view the slides.

Overview:

Once again, the new data breach reports are published. Are we, as security professionals, succeeding in protecting our assets? This session will review the latest breach reports, provide insight into current trends, and evaluate potential solutions.


Moderator

Jorge Orchilles

Author of Microsoft Windows 7 Administrator's Reference, Jorge Orchilles holds a Master's of Science in Management Information Systems from Florida International University. Jorge leads the Advanced Penetration Testing & Vulnerability Assessment Quality Control teams in a large financial institution and serves as Director of the ISSA South Florida Chapter.


Speakers

Kevin Haley

Director, Symantec Security Response

Kevin Haley is Director of Product Management for Symantec Security Technology And Response where he is responsible for ensuring the security content gathered from Symantec’s Global Intelligence Network is actionable for its customers.  He is the technical advisor and main spokesperson for Symantec Internet Security Threat Report.  He served as a technical advisor for Anthony E. Zuiker's digital crime thriller, “Cybergeddon” and appeared in the documentary “Most Dangerous Town”. He also frequently appears as a security expert for media including The Today Show, NBC Nightly News, Good Morning America, MSNBC, USA Today, New York Times, Forbes, Dow Jones and many others.  During his sixteen years at Symantec, Haley has also acted as the Group Product Manager for Symantec Endpoint Protection and our mail security products.  


Bhavesh Chauhan

Principal Client Partner - Verizon

Bhavesh Chauhan is a Principal Client Partner - Security Evangelist within the Verizon CTO organization. Previously a Principal in Financial Services and lea the Security Engineering and Professional services for the North East Region of America, which includes Enterprise, Government and Education customers for Verizon. Bhavesh has over 15 plus years in Cyber Security and Business Continuity Solutions. Bhavesh has served as an Information Security officer, Accreditor for Government Classified systems, Security Principal, Engineer and Architect on security engagements; and has delivered various information security engagements to assist customers mitigate risks and improve security maturity across the enterprise. Bhavesh routinely represents Verizon at information security forums and has delivered various public speaking engagements. He is a board member of the ISACA local chapter.

Along with his experience, Bhavesh holds a Master’s of Science Degree in Physics and a number of professional security certifications such as CISSP, CISA, and CISM. Furthermore, he has been a CESG certified Information Assurance advisor to UK public sector from 2001 to 2010.


Pete Lindstrom

Research Vice President for Security Strategies - IDC

Pete Lindstrom is Research Vice President for Security Strategies. His research is focused on digital security measurement and metrics, digital security economics, and digital security at scale. Mr. Lindstrom is responsible for driving the vision of enabling digital transformation through proper technology risk management that makes efficient and effective economic decisions supported by evidence and outcome analysis leading to a security model that aligns with the 3d platform.

Prior to joining IDC in 2014, Mr. Lindstrom accumulated 25 years of industry experience as an IT auditor, IT security practitioner, and industry analyst. He has extensive and broad expertise with a variety of information security products, but is best known as an authority on cybersecurity economics issues, such as strategic security metrics, estimating risk and return, and measuring security programs. He has also focused on applying core risk management principles to new technologies, architectures, and systems, focusing on the use of virtualization, cloud security, and big data. He has developed the "Four Disciplines of Security Management" (a security operations model), and the "5 Immutable Laws of Virtualization Security," which was integrated into guidance from the PCI Council.

Mr. Lindstrom is a frequent contributor to popular business and trade publications. He is often quoted in USA Today, WSJ Online, Information Security Magazine, VAR Business, Searchsecurity.com, and CSO Magazine. His columns and articles have appeared in Information Security Magazine, Searchsecurity.com, ISSA Journal, and CSO Online. Additionally, Mr. Lindstrom is a popular speaker at the RSA Security Conference, InfoSec World, ISSA International Conference, and many regional conferences.

In addition, to his extensive industry experience, Mr. Lindstrom served as an officer in the U.S. Marine Corps and received a bachelor's degree in Business Administration (Finance) from the University of Notre Dame.



The May 2016 ISSA International Web Conference is generously sponsored by

Click here to read Symantec's recently released 2016 Internet Security Threat Report




Community Search
Sign In


Forgot your password?

Haven't registered yet?

Calendar

9/29/2016
Healthcare SIG Webinar: Use of Cloud Services in the Healthcare Industry

10/6/2016
WOMEN CYBER SECURITY PROFESSIONALS LUNCH AND LEARN

10/7/2016
2016 Cyber Security Conference - Cyber Threat Intelligence

10/11/2016
SANS/ISSA Women's CONNECT Event




Copyright © 2016, Information Systems Security Association, All Rights Reserved
Privacy PolicyCopyright Information