Contact Us   |   Print Page   |   Sign In   |   Register
November 2018 ISSA Web Conference




ISSA International Series: Security Professionals Dilemma

Recorded (2 Hour Event) on Tuesday, November 27, 2018

Click here to view the recording.
Click here for the presentation.
Click here to take the CPE quiz.


Overview:

We as security professionals are faced with a multitude of dilemma’s in the performance of our duties. These dilemmas range in nature including the following questions;

•What new technology do we need to protect against the latest threats?
•How much security do we put into our infrastructures and yet still not be obtrusive?
•Should we or can we hack back to stop an attack?
•How often do we test?
•How do we harmoniously integrate our operational processes with those of our enterprise?
•How much time do we need to spend tracking laws and regulations?

This webinar will attempt to provide insight into these issues and others as we move forward.


 

Moderator:

Mark Kadrich, Principal, Kadrich InfoSec Consulting Services

For the past 30+ years, Mark Kadrich has worked in the security community, building knowledge, and contributing solutions. His strengths are in architecture level design and review, solution design and efficacy, policy generation, endpoint security, and risk management. Mr. Kadrich is the author of the book Endpoint Security published by Addison Wesley. Mr Kadrich holds degrees in Management Information Systems, Computer Engineering and Electrical Engineering. He was a contributing author in publications such as Healthcare Technology Online, Health IT Outcomes, TCP Unleashed, ISSA Journal, Publish Magazine, Planet IT, RSA, CSI, SANS and The Black Hat Briefings. Mark Kadrich is a well- known speaker and evangelist on network security matters at technical conferences and security events. He was the program manager and chair for Cornerstones of Trust for 3 years.

Mr. Kadrich has been a CISO, CSO, CEO, Chief Scientist, Corporate Minion, and Security Slave. He is presently a Free Range CISO helping customers create and manage security IT environments.



Speakers:

Geoff Horne, Distinguished Engineer and Senior Manager of SMEs, Infoblox Inc.

Geoff is an Architect, Systems Analyst, and Threat Intelligence Consultant. He has been involved in the design and integration of next generation computing and communications systems for more than two decades and is currently a Distinguished Engineer and Senior Manager of SMEs for Infoblox Inc. There he is responsible for design, development, and securing of systems for large scale network intelligence infrastructures for fortune 500 companies.

Geoff draws on a diverse background that began with a Masters degree in physics, a post graduate career in research computing at the University of Sydney, digital film production including visual effects for such films as 'The Matrix', and the Technology Director for News Corporation's News Interactive where he managed the design and development of five of Australia's top ten websites.

Geoff was then convinced to become the Senior Engineer for the InteropNet Network (eNet and iLabs) where he was responsible for the design and delivery of the world's largest state-of-the-art temporary network. He has since spent more than 15 years as World Wide Principal Architect, Professional Services Consultant, Sales Engineer, SME Manager, and part time Product Superintendent for Infoblox.

 

Karen Worstell, CEO, W Risk Group

Karen Worstell is the CEO of W Risk Group and founder of MOJO Maker for Women in Tech. Ms. Worstell has over 30 years of information security experience including tenure as the Chief Information Security Officer (CISO) at Microsoft Corporation, AT&T Wireless and Russell Investments. As leader of the W Risk Group Ms. Worstell provides customized guidance to help companies develop their information security programs demonstrate due diligence to a defensible standard of care (D4SC) and via the MOJO Maker program Ms. Worstell provides leadership development for mid-career women in tech. Her experience as a chaplain in regional medical centers and the VA led her to recognize the issues of moral distress and burnout in the workplace and she returned to the workplace to address this need. She is the author of "Governance and Internal Controls for Cutting Edge IT” published by ITG Publishing, contributing author to the 6th Edition of the Information Security Handbook by Wiley on "The Role of the CISO” and co-author of “Evaluating the Electronic Discovery Capabilities of Outside Law Firms” by Pike and Fisher. Her newest publication is "Your Amazing Itty Bitty® Personal Data Protection Book: 15 Keys to Minimize Your Exposure to Cybercrime Using These Essential Steps". She holds Bachelor of Science degrees in Chemistry and Molecular Biology from the University of Washington, and a Master of Science in Computer Science from Pacific Lutheran University. Her theology MA degree is from MJTI.

 

Community Search
Sign In


Calendar

12/12/2018
ISSA Thought Leadership Series: 2018 User Risk Report

1/9/2019
ISSA Thought Leadership Series: Is Your Organization Ready for Automation?

3/2/2019 » 3/3/2019
March CISO Forum San Francisco, CA

3/5/2019
Member Reception Party at RSA Conference 2019




Copyright © 2016, Information Systems Security Association, All Rights Reserved
Privacy PolicyCopyright Information