Print Page   |   Contact Us   |   Report Abuse   |   Sign In   |   Register
November 2013

Incidental Security Leaks: Are You an Insider Threat?

Recorded Live: November 26, 2013

Start Time: 9:00 a.m. US Pacific/ 12:00 p.m. US Eastern/ 5:00 p.m. London

Click here to view presentation slides.
Click here to view the recorded web conference.

Generously supported by:

Web Conference Overview:

In today’s world we have all become very security conscious; however, we often miss the issue of Incidental Security Leaks (ISL). What is an Incidental Security Leak?

An ISL occurs when information is released or exposed without an explicit intent to release it. For example,
back in the 70s the KGB would know when the people at the NSA or CIA were working on a hot issue, by the number of cars going into the parking facilities as opposed to the number of cars leaving the facilities.

ISLs can also occur in our private lives. For example, how many people post pictures on Facebook, while they are on vacation, or "check-in" from various places around town? These bits of trivial information can be used to track and target individuals for everything from social engineering to theft.

Incidental security leaks also occur from within our computer systems, whether they are simple things like your login, photo, phone number, title, attached to an email message or metadata stored in a document.

This webinar will discuss the issues with ISLs and offer up strategies and directions on how to prevent and mitigate them.


Daniel J. Lohrmann
Chief Security Officer, State of Michigan

Daniel J. Lohrmann (Dan) is an internationally recognized security leader, technologist and author. He is best known for his refreshingly practical commentary on technology and clear advice on computer security and ethics for home and work. When people want to know how cybersecurity or technology infrastructure really works within state and local governments, they turn to Dan Lohrmann.

Over the past twenty-five years, he has served public and private sector organizations which span the globe in a diverse set of technology and security leadership roles. He currently serves as Chief Security Officer (CSO) over both physical and cybersecurity in Michigan government.

Mr. Lohrmann's new book is "BYOD for You: The Guide to Bring Your Own Device to Work.”

Dan's first book was: "Virtual Integrity: Faithfully Navigating the Brave New Web." He has published articles and papers on security, infrastructure, customer service, cloud computing, bring your own device to work (BYOD), and social media in major technology and business magazines. Dan is also a global conference speaker on many security and technology topics, and he has been a keynote speaker at conferences from South Africa to Moscow and all over the USA.

Lohrmann has received numerous professional awards including CSO of the Year, Public Official of the Year and Computerworld Premier 100 Leader. As Michigan CSO & Deputy Director for Cybersecurity & Infrastructure Protection (CIP), he leads the Michigan Cyber Initiative, which was launched by Governor Snyder at the 2011 Michigan Cyber Summit. Dan is also a lead on several federal Department of Homeland Security (DHS) committees and National Governors Association (NGA) efforts in cybersecurity. Dan began his career as a computer systems analyst at the National Security Agency (NSA), and he served in England for seven years in a variety of private sector leadership roles. He is a Certified Chief Information Security Officer (C/CISO).

Samantha Manke
Executive Vice President, Secure Mentem

Samantha Manke is Executive Vice President and Chief Knowledge Officer of Secure Mentem, where she leads the development of customized security awareness programs. Previously, she co-designed and implemented highly acclaimed security awareness programs at several Fortune 500 companies.

Samantha was awarded a Master’s degree in Security Technologies from the University of Minnesota. She has become known for her groundbreaking security awareness research conducted during her time at the University of Minnesota.

Her breakthrough approach included an extensive comparison of security awareness programs at Fortune 500 companies, determining critical success factors and the effectiveness of the programs. Samantha is a noted speaker, media contributor, and facilitator having addressed audiences around the globe. In addition to her graduate work, Manke also holds a Bachelor's Degree in Sociology and Anthropology from St. Olaf College.

Jeff Scheepers
Product Marketing, Data Security and Privacy, IBM

In his current role at IBM, Jeff Scheepers is responsible for driving the product marketing activities for InfoSphere Guardium and Optim product lines, with a focus on data security and privacy. Prior to joining IBM, Jeff held a variety of positions in software product marketing and management, supporting data management, information governance and big data solutions.

Jeff lives and works out of Toronto, Canada and holds a Bachelor of Business Administration degree from Wilfrid Laurier University.

Kim L. Jones - Phoenix, USA Chapter
Session Moderator

Kim L. Jones is SVP, Chief Security Officer at Vantiv and has been an intelligence, security, and risk professional for over 25 years. A sought-after speaker and industry thought leader, Jones has built, refined, and/or managed security programs in the financial services, healthcare, manufacturing, outsourcing, and defense industries.

Jones has a bachelor’s degree in computer science from the U.S. Military Academy at West Point, a master’s degree in information assurance from Norwich University and holds the CISM, CISSP, and CRISC certifications. In addition, Jones is a member of the CISO Advisory Council for ISSA International.

Community Search
Sign In

Forgot your password?

Haven't registered yet?



ISSA International Conference Preview: Computer Science Curricula’s Failure

ISSA Web Conference: How to Recruit and Retain Cyber-Security Professionals

Chapter Leaders Summit

11/2/2016 » 11/3/2016
2016 ISSA International Conference Registration

Copyright © 2016, Information Systems Security Association, All Rights Reserved
Privacy PolicyCopyright Information