Cyber Security Strategies Summit

Monday, February 28, 2011

Ben Zvaifler

84e08063452899ef6bda9d1e459bcdcd

Cyber Security Strategies Summit

Education and Data Protection in a Digital World

Geared towards enterprise and government security officers, the Cyber Security Strategies Summit presents case studies that will build on your knowledge in the industry as well as open your eyes to changes and innovations in the space. Topics being covered will include:

  • Risk management techniques
  • Information protection and privacy
  • Employee compliance and standards
  • Operation and security in the cloud
  • Mobile evolution and impact
  • Law enforcement and forensics

image

ENTERPRISE: The enterprise security track is driven by industry case studies. Security experts from major companies will be presenting best practices in Cyber Security and Data Protection. Delegates that work in the private sector and would like to bring home new techniques and programs that are being implemented by other corporations should attend the enterprise track.

GOVERNMENT: Cyber security has become one of the most crucial issues facing the stability of our nation. Government agencies need to be equipped with the most up to date information available in the security environment. The Government track will discuss data protection, legislation, privacy and defending our nation against internal, international and terrorist threats.

MOBILE: The influx of smartphones is not just a convenient advancement in our daily lives; it is paradigm shift in our corporate and government security initiatives. The Mobile revolution is in full swing and integration is imperative. The mobile track will address delegates in both enterprise and government, with educational presentations of strategies and risks that will enable your organization to securely adapt to the changing tide.

CLOUD: The risks vs rewards of cloud computing is an imperative conversation to have, and at the center of it all is security. Is the cloud secure? Should we trust it? And how do we make the move safely? The hot button subject will be thoroughly addressed, with discussions that prove to be pertinent for both enterprise and government security officers.

image image image

image

image

Bill Boni - CISO, VP Enterprise Information Security T-Mobile


image

Patricia Titus - VP and Global Chief Information Security Officer Unisys


image

Jim Christy - Special Agent, Director of Future Exploration Department of Defense Cyber Crime Center


image

Bob Samson - Director of Information Protection and Privacy Marriott


image

Patrick Howard - Chief Information Security Officer Nuclear Regulatory Commission


image

Stacy Arruda - Supervisory Special Agent FBI Cyber Crime Unit


image

Wade Baker - Director of Risk Intelligence Verizon Business


image

John Johnson - Security Program Manager John Deere


image

Rick Harris - -Chief of Future Operations US-CERT, National Cyber Security Division, DHS


image

Richard H.L. Marshall - Director of Global Cyber Security Management National Cyber Security Division, DHS


image

Sol Bermann - Lead Privacy Policy Development, Business Continuity, User Advocacy University of Michigan


image

Eric S. Green - President ELG Consulting


image

Adam Meyers - Director of Cyber Security Intelligence SRA International

image
Possibly Related Articles:
11838
Enterprise Security
Cloud Security Enterprise Security Government Training Mobile Devices Conferences Cyber Security Strategies Summit CSSS
Post Rating I Like this!
The views expressed in this post are the opinions of the Infosec Island member that posted this content. Infosec Island is not responsible for the content or messaging of this post.

Unauthorized reproduction of this article (in part or in whole) is prohibited without the express written permission of Infosec Island and the Infosec Island member that posted this content--this includes using our RSS feed for any purpose other than personal use.