News

Information Security Decisions Session Downloads

@27809 Security practitioners today wear many hats. No longer are they just mitigating security vulnerabilities: they're also on the front lines, working with auditors to ensure regulatory demands are met; and in the boardroom, reviewing the budget with upper management. Where do information security professionals turn for the definitive security intelligence required to make those decisions?

Information Security Decisions 2006 in Chicago, Oct. 18-20, delivered essential strategies required to gain control over today's ever-changing corporate environment. For those who could not attend the event or would like additional information, below is a full listing of sessions featured at the show and the slide presentations that correspond to these topics.

As in the past, Information Security Decisions 2006 was a multi-track event. This year, the tracks were:

   Proven Tactics to Repel Emerging Threats
   Enhanced Identity and Access Management
   Achieving Compliance: A Real-World Roadmap
   Snyder on Security: An Insider's Guide to the Essentials

PROVEN TACTICS TO REPEL EMERGING THREATS

Today's targeted attacks rob organizations of their most valuable resources. These sessions identify ways to protect your business by detailing how to combat evolving cyberattacks, protect against insider threats, safeguard databases and applications, and fortify the network from perimeter to core.

Sessions included in this track:

Click to download Proven Tactics to Repel Emerging Threats track sessions

ENHANCED IDENTITY AND ACCESS MANAGEMENT

Compliance may have driven many ID and access management projects but long-term cost savings has proven to be a significant benefit too. From consolidating directories to automating provisioning and rolling out single sign-on, This track examines how leading organizations are strengthening authorization and enforcing access controls.

Sessions included in this track:

  • Making the Business Case for Strong Authentication

  • Presented by Michael Cobb, founder and managing director, Cobweb Applications, Ltd
  • Identity Management for the Masses

  • Presented by Mark Diodati, analyst, The Burton Group
  • Solving Identity Crises: A Citizens Financial Group Case Study

  • Presented by David J. Sherry, VP of enterprise information security, Citizens Financial Group.
  • Smart Shopper: IAM products

  • Presented by Richard E. Mackey, principal, SystemExperts, ISACA/CISM

Click to download Enhanced Identity and Access Management track sessions

ACHIEVING COMPLIANCE: A REAL-WORLD ROADMAP

A security manager's responsibilities extend beyond the technical aspects of the job. These days, effective governance and compliance are just as essential. This track, explains how to build an effective compliance program, and defines metrics to measure security's success and ensure business continuity should the unexpected occur.

Sessions included in this track:

  • Metrics for Security Investment

  • Presented by Dr. Shawn Butler, cyLab's risk management interest group.
  • Making Information Security a Business Issue

  • Presented by Eric Holmquist, VP and director of risk management, Advanta Bank Corp.
  • Lessons in Disaster Recovery: A 9/11 Survivor's Story

  • Presented by Donna Childs, founder and CEO, Childs Capital LLC.
  • Strategic Compliance: Continuous Process Improvement

  • Presented by Diana Kelley, VP and service director, security and risk management strategies service, Burton Group.

Click to download Achieving Compliance: A Real-World Roadmap track sessions

SNYDER ON SECURITY: AN INSIDER'S GUIDE TO THE ESSENTIALS

These track sessions feature hands-on advice from one of the brightest minds in the industry and the highest rated speaker at our previous Information Security Decisions. You asked for him, and we've brought him back for an entire track. Benefit from the first-hand advice of Dr. Joel Snyder, senior partner with consultancy Opus One and technical editor for Information Security magazine.

Sessions included in this track:

Click to download Snyder On Security: An Insider's Guide to the Essentials track sessions


Email Alerts

Register now to receive ComputerWeekly.com IT-related news, guides and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
 

COMMENTS powered by Disqus  //  Commenting policy