Contact Us   |   Print Page   |   Sign In   |   Register
Year in Review: How Last Year's Trends Help Us Plan for the Future

Year in Review: How Last Year’s Trends Help Us Plan for the Future

Live Event: January 25, 2012
Start Time: 9:00 a.m. US Pacific/ 12:00 p.m. US Eastern/ 5:00 p.m. London

Generously supported by:

Click here to register

Web Conference Overview:

2011 was the year of security relevant issues and events. This is inclusive of changes in security legislation proposals, protective technology, and even cyber-attacks. This session will explore the challenges that security professionals confronted this past year. Based on these challenges, we will explore the lessons learned as we move into 2012.

Kevin L. Richards, CISSP - President, ISSA International Board

Kevin Richards is an information risk management advisor with over 20 years of experience in information and cybersecurity, business continuity, and enterprise risk management. His expertise ranges from risk analysis and program design to information security and business continuity program development and leading practices. Working with large multi-national corporations, as well as the United States Department of Defense (DoD), Richards provides an array of technical and practical perspectives on building and protecting an organization’s critical information assets.

Ashar Aziz- Founder, CEO & CTO, FireEye

Ashar Aziz founded FireEye in 2004 and leads both the technical and business strategies of FireEye as CTO and CEO. Aziz is the original inventor of the core set of technologies behind FireEye's ground breaking Malware Protection Systems and has received over 20 patents in the areas of networking, cryptography, network security, and data center virtualization for work done prior to FireEye. Before FireEye, Aziz founded Terraspring, a company focused on datacenter automation and virtualization. Terraspring was successfully acquired by Sun Microsystems in 2002, where Aziz then served as CTO of the company's N1 program. Before Terraspring, he spent twelve years at Sun as a distinguished engineer focused on networking and network security. He holds an S.B. (Scientiae Baccalaureus) in Electrical Engineering and Computer Science from the Massachusetts Institute of Technology and an M.S. in Computer Science from the University of California, Berkeley, where he received the UC Regents Fellowship.

Presentation Overview: Breaking the Cycle of Cyber Insecurity

With the APT attacks in 2011, we've seen cyber criminals penetrate networks seemingly at will. This has been possible because of zero-day, targeted APT attacks utilizing sophisticated malware that infiltrates over multiple stages and multiple vectors like Web and Email.

Ashar Aziz will discuss the cycle of cyber insecurity and provide key criteria as attendees investigate next-generation threat protection.

  • Real-time defenses beyond signatures
  • Dynamic analysis of all phases of the attack lifecycle
  • Inbound and outbound filtering across protocols
  • Accurate, low false positive rates
  • Global intelligence to protect the local network

Boris Segalis, Partner, InfoLawGroup LLP.

Boris Segalis is a Partner of the law firm of InfoLawGroup LLP. His practice focuses on technology, privacy, information security and information management law. Segalis serves as Co-Chair of the American Bar Association Information Security Committee Smart Grid Privacy & Information Security Working Group. He also co-chairs the Committee’s Social Networking Group. He has extensive experience advising clients in myriad industries on the legal issues associated with the collection, use, maintenance, and disclosure of personal information. Frequently, he writes and speaks on privacy and information management topics including on the InfoLawGroup blog. Segalis also co-authored the Privacy and Data Security Law Deskbook published by Aspen. He received his law degree from the New York University School of Law. Additionally, he holds a degree in Mechanical Engineering from Georgia Tech.

Community Search
Sign In


ISSA International Series: Trials & Tribulations of Social Engineering

8/4/2018 » 8/9/2018
Black Hat USA 2018

ISSA Thought Leadership Series: The Definitive Need for Crypto-Agility

10/17/2018 » 10/18/2018
2018 ISSA International Conference

Copyright © 2016, Information Systems Security Association, All Rights Reserved
Privacy PolicyCopyright Information