Contact Us   |   Print Page   |   Sign In   |   Join Now
April 2013

Life's a Breach Report: Making Lemonade Out of Lemons

2-Hour Live Event: April 23, 2013
Start Time: 9:00 a.m. US Pacific/ 12:00 p.m. US Eastern/ 5:00 p.m. London

Click here
for presentation slides.

Click here to view recorded web conference.

Generously supported by:

Web Conference Overview:

Once again, the new data breach reports are published. Are we, as security professionals, succeeding in protecting our assets? This session will review the latest breach reports, provide insight into current trends, and evaluate potential solutions.


Pete Lindstrom - Delaware Valley, USA Chapter
Principal, Spire Security, LLC

Pete Lindstrom is Principal of Spire Security, an industry analyst firm focused on information security. In his 20+ year career, Pete has held other industry analyst positions at Burton Group and Hurwitz Group as well as industry positions as a security architect for Wyeth Pharmaceuticals and an IT auditor for PwC and GMAC Mortgage. Pete honed his finance and technology skills in the United States Marine Corps.

Pete is a frequent speaker and writer on information security topics and is a Director of the International Systems Security Association (ISSA). He has a finance degree from the University of Notre Dame.

Michael A. Panico - Puget Sound (Seattle), USA Chapter
Vice President, Seattle Office, Stroz Friedberg, LLC

Michael A. Panico is a Vice President in the Seattle Office of Stroz Friedberg, LLC. In this practice, he assists some of America's most prominent companies with all aspects of digital risk management and forensics, specializing in incident response, data-breach investigations and in security risk consulting. Michael has over 12 years of information security and IR experience, most notably as a Supervisory Special Agent in the Cyber Division of the FBI. Prior to joining Stroz Friedberg, he created and led the Incident Response team for Microsoft's Online Services Security and Compliance organization, and eventually managed all of the teams responsible for security engineering, security operations, and vulnerability management for Microsoft’s cloud infrastructure. Michael holds the CISSP, CISM, CISA and GCFA certifications.

Robert Freeman

Manager, X-Force Research, IBM

Robert Freeman manages the X-Force Advanced Research team at IBM, which is a premiere applied security research organization with a strong emphasis on reverse engineering, vulnerability analysis, malware research, bug hunting, advanced protection technology research and new protection engine development. An increasingly global operation, X-Force Advanced Research stretches five countries in different areas of the world. Our team has presented at various top conferences such as Blackhat USA and Virus Bulletin, and continues to develop new material for external consumption at various technical and abstracted levels.

Robert has previously held various technical roles during his ten year career with the X-Force organization and worked for various start-up companies during his overall career in computer security. His experience spans close to fifteen years in the same areas as X-Force Research as well as other areas such as digital rights management and copy protection development.

Presentation Overview:

IBM X-Force 2012 Trend Report: Cyber vs. Insider Data Breaches

Attackers and unscrupulous users constantly adapt their techniques to evade new security measures, easily bypassing traditional perimeter defenses. Join Robert Freeman, Manager, IBM X-Force® Advanced Research as he presents the results of the "IBM X-Force 2012 Trend and Risk Report," an in-depth analysis of public vulnerability disclosures findings.

In this webcast, you will learn why data attacks continue to be pervasive and why we are seeing more than ever how systems interconnectedness, poor policy enforcement, and human error, is far more influential than any singles security vulnerability. A holistic approach to data security approach is essential for the protection of the entire ecosystem.

Anne M. Rogers - South Texas, USA Chapter
Principal Consultant, PM Tech-Pro, LLC, Session Moderator

As a Principal Consultant, Ms. Rogers provides clients with technical and management consulting in Information Systems and Network management, Information security, solutions and compliance planning and design, performance, capacity management, computer forensics and eDiscovery.

From 2002 through early 2012, she served as Director, Information Safeguards for Waste Management responsible for company-wide information security and privacy protection strategy and compliance programs, information protection policies, procedures, and guidelines, and the company’s formal security awareness program. Prior to Waste Management, Rogers held positions as Principal Consultant with PMTech-Pro, LLC., Technical Program Manager with IBM, Technical Staff consultant for MITRE Corp, Director of Information Systems for Warren King Companies, and Deputy Director of Data Automation, USAF Alaskan Air Command.

Ms. Rogers is a long-time member of ISSA and an ISSA Fellow. She has served multiple terms as President of the ISSA South Texas chapter, was a founding member of the ISSA CISO Executive Forum, and has served nine years on the CISO Advisory Committee. Ms. Rogers was a founding member and currently serves on the Board of the Corporate eDiscovery Forum. She is also a long-time member of InfraGard and on the Board of the Houston InfraGard Chapter.

Ms. Rogers holds a B.S. in Physics from U.T. El Paso and an MBA from the University of Utah, Salt Lake. She holds CISSP, IAM and IEM Security certifications, the Project Management Institute’s PMP certification, and the CCE and EnCE forensics certifications.

Community Search
Sign In


ISSA International Series: Breach Response - Humans in Security

ISSA Thought Leadership Series: Security-as-a-Service for Small and Medium Sized Businesses

ISSA International Series: Passwordless Authentication

ISSA International Series: Privacy - GDPR a Year Later

ISSA International Series: Security Standards Organizations - The good, the bad, and the ugly?

Copyright © 2016, Information Systems Security Association, All Rights Reserved
Privacy PolicyCopyright Information