Web Conference Overview:
Over the past year we have been deluged with breach reports. Each report comes with staggering numbers detailing the PII which was compromised. The experts have been saying the only solution is to use encryption, but is it really as simple as that… Or are we missing something. This session will cover the issues around encryption technology that one might run into when they try to deploy it.
Join the conversation: #ISSAWebCon
Generously supported by:
Mathieu Gorge, CEO and Founder, VigiTrust
ISSA Web Conference Committee, Session Moderator
Mathieu is an international authority on IT security, an expert on key legal aspects of corporate security, their laws and frameworks.
His company, VigiTrust, designs cloud based educational programs, provides security assessments, credit card security compliance packages and corporate governance solutions. VigiTrust operates in Europe, US and Ireland and services clients including financial services, banking, merchant aggregators, government and health care.
Mathieu is a regular speaker at international security conferences across Europe and works closely with the PCI Council, East West Institute and ANSI, ISACA, ISSA, and ENISA.
Chief Technology Officer, White Badger Group
Paul has thirty-five years of breakthrough innovation in cyber security, artificial intelligence, high speed databases, professional software development, software quality test engineering, electronics, communications, mechanical engineering, weapons development and defense related technologies.
Paul has extensive experience developing effective security solutions and conducting security risk assessments for large commercial and government customers, including the energy industry. Paul is also an expert in rapidly solving complex cybercrime investigations through use of innovative techniques.
Paul is an active national and international public who speaks at many high profile cyber-security speaking engagements every year for prestigious organizations such as the United States Secret Service, U.S. Department of Justice, InfraGard, ACP, ASIS, IIA, ISACA, ISSA, as well as at universities and colleges across the nation and abroad.
As a result of Paul’s long time personal interest in malware, he has collected a wide assortment of hacking tools, worms, Trojan Horses, and computer viruses. He maintains his collection of 24,000 major computer viruses and 1,700 Trojan Horses for advanced research purposes to this day.
VP of Research and Development, DigiCert
In this position at DigiCert, Jason develops innovative products using digital certificate management, PKI technologies, and implementing strong authentication and security within companies. He is widely recognized for his thought leadership in cloud computing, identity, authentication, and security best practices. His innovation and engineering has resulted in over 50 patents, recently earning him the “Utah Genius” award.
EPSRC Leadership Fellow and Professor of Information Security at Royal Holloway, University of London.
Prior to joining Royal Holloway in 2001, Kenny worked at Hewlett-Packard's European Research Laboratories as a technical staff member and project manager (1996-2001). Kenny received his PhD in the area of discrete mathematics in 1993. He worked extensively in coding and communications in the 1990s an switched research areas to cryptography and network security around 2000. A particular research interest in recent years has been applied cryptography, including the design and analysis of real-world protocols using cryptography. This latter area is the focus of his EPSRC-funded Leadership Fellowship, the research output of which is having a significant impact on the security of Internet protocols such as IPsec, SSL/TLS and SSH. He was awarded an Applied Networking Research Prize by the Internet Research Task Force (IRTF) for his work on SSL/TLS. He was appointed co-chair of the Crypto Forum Research Group (CFRG) of the IRTF in June 2014. Kenny was program chair of EUROCRYPT 2011. He serves on the editorial board of the Journal of Cryptology and is co-editor in chief of Springer's Information Security and Cryptography book series. He has published more than 130 refereed articles in conferences and journals. He will be an invited speaker at Asiacrypt 2014.
Required: Windows® 8, 7, Vista, XP or 2003 Server
Required: Mac OS® X 10.6 or newer
Required: iPhone®, iPad®, Android™ phone or Android tablet