Print Page   |   Contact Us   |   Report Abuse   |   Sign In   |   Register
October 2014



Cybersecurity and Other Horror Stories

2-Hour Live Event: Tuesday, October 28, 2014
Start Time: 9:00 a.m. US-Pacific/ 12:00 p.m. US-Eastern/ 5:00 p.m. London

Web Conference Overview:

In keeping with the traditional Halloween things that go bump in the night theme, this month we will talk about security that has not worked as advertised. In some cases security has become the impediment, but didn’t have to be.

Click here to listen to the recording, CPE quiz link at the end of the recording.

Click here to view the slide presentation, CPE quiz link at the end of the slides.

A passing message is a "Certificate of Attendance" can be printed and used as verification of your participation.
Please PRINT this page and use it to submit CPE (continuing professional education) credit in accordance
with the guidelines of the certifying organization.

Generously supported by:

Join the conversation: #ISSAWebConf


Moderator and Speakers:

Moderator:

Phillip Griffin
ISSA Educational Advisory Council Member

Phillip is a CISM and ISSA Fellow with over 20 years of information assurance experience. Phil has served as a trusted security adviser, security architect, and consultant with leading corporations. He has acted as committee chair, editor, and head of delegation in the development of US national and international security standards, and he currently serves on the ISSA Educational Advisory Council. His current work encompasses encryption technologies, access control, and biometric information security management policy. Phil has nine U.S. patents at the intersection of biometrics, RFID, and information security, a number of academic and professional technical publications, and he has spoken at leading security conferences around the world
.

Speakers:

Gavin Hill
Director, Product Marketing and Threat Research, Venafi

Gavin Hill is Director of Product Marketing and Threat Research at Venafi. With over a 15 years of experience in product development and market research in the cyber security space, he is particularly adept at identifying where enterprises are at risk and developing products that mitigate those risks related to evolving cyber threats. At Venafi he is responsible for the Venafi Threat Research Center, focusing on Next-Generation Trust Protection.

Pete Lindstrom
Research Director, Security Products, IDC

Pete is an industry expert and thought leader in the areas of IAM (Identity & Access Management), cloud security, and IoT (Internet of Things) security. Additionally, Mr. Lindstrom is responsible for IDC's BuyerPulse Analysis: Identity and Access Management program. He provides focused research and intelligence to help clarify how IT buyers make purchasing decisions about IAM products.

Prior to joining IDC in 2014, Pete accumulated 25 years of industry experience as an IT auditor, IT security practitioner, and industry analyst. He has extensive and broad expertise with a variety of information security products, but is best known as an authority on cybersecurity economics issues, such as strategic security metrics, estimating risk and return, and measuring security programs. He has also focused on applying core risk management principles to new technologies, architectures, and systems, focusing on the use of virtualization, cloud security, and big data. He has developed the "Four Disciplines of Security Management" (a security operations model), and the "5 Immutable Laws of Virtualization Security," which was integrated into guidance from the PCI Council.

Mr. Lindstrom served as an officer in the U.S. Marine Corps and received a bachelor's degree in Business Administration (Finance) from the University of Notre Dame.

Araceli Treu Gomes
Cybersecurity Strategist and Subject Matter Expert, Verizon

Araceli has enjoyed a 15-year career in Information Security, advancing security technologies and programs across the organizational continuum in financial services, defense and aerospace, telecommunications, and other Critical Infrastructure and Key Resources (CIKR) arenas. She currently serves as a cybersecurity strategist and subject matter expert for Verizon, providing strategic security expertise to leadership teams within the Verizon constituency, and counseling global security organizations on best practices in the prevention of advanced attacks and data theft.

 Araceli has held a range of technical and leadership positions prior to joining Verizon, as Strategic Security Advisor for a Fortune 100 software company, Platform Engineering Director at a fortune 500 defense contractor, Deputy Chief Security Officer for a multinational financial services and payment card processing organization, and Chief Security and Privacy Officer at a market-leading content delivery network. Her security career began in Internet security architecture where she designed early-adoption DDoS, extrusion prevention, and network forensics solutions for Internet backbone and peering providers.

Araceli has experience working with technical teams up to the C-Suite, focusing her background in cyber security strategy, mergers and acquisitions, investigations, network and computer forensics, and privacy on the evangelism of information security concepts across diverse enterprise and industry groups. Araceli holds professional information security certifications in privacy, leadership, and computer forensics, and serves on IEEE Cybersecurity SIGs and ISSA boards locally and nationally.


 

Community Search
Sign In


Forgot your password?

Haven't registered yet?

Calendar

9/26/2016
Secure360-Wisconsin

9/29/2016
Healthcare SIG Webinar: Use of Cloud Services in the Healthcare Industry

10/6/2016
WOMEN CYBER SECURITY PROFESSIONALS LUNCH AND LEARN

10/7/2016
2016 Cyber Security Conference - Cyber Threat Intelligence




Copyright © 2016, Information Systems Security Association, All Rights Reserved
Privacy PolicyCopyright Information