phoenix - SecureWorld
Transcription
phoenix - SecureWorld
is your world secure? PHOENIX Phoenix Convention Center DECEMBER 7 - 8, 2010 Inside SecureWorld: Featured Keynotes Industry Expert Panels Conference Sessions Case Studies SecureWorld+ Training December 7, 2010 December 8, 2010 OPENING KEYNOTE INFRAGARD KEYNOTE James Beeson Joseph Dittmar CISO, GE Capital Commercial Finance “Social Networking and the Consumer Cloud-Are You Ready?” World Trade Center Survivor “Lessons Learned from a Date with Destiny; A Historic and Inspirational View of 9/11/01” And More! .................................... Security demands are rapidly growing while security training budgets are not. SecureWorld delivers the most affordable, highest quality security education, training and networking right to your doorstep. LUNCHEON KEYNOTE LUNCHEON KEYNOTE Thomas R. Peltier Patrick T. Beggs Security Sage “Selling Information Security” Director of Operations (Acting) Office of Cybersecurity and Communications U.S. Department of Homeland Security “Cyber Resilience Review” secureworldexpo.com Check us out on the web at Gold Sponsor: This Event Hosted by: INTEGRATION FORENSICS BOTNETS VIRTUALIZATION APPLICATION SECU UALIZATION APPLICATION SECURITYSYSTEMS ENCRYPTION VoIP DATA LEAKAGE COMPLIANCE WIRELESS BIOMETRICS ACCESS CONTROL RISK MANAGEMENT DATA LEAKAGE COMPLI HIGHLIGHTS December 7, 2010 9:30 am OPENING KEYNOTE James Beeson CISO, GE Capital Commercial Finance “Social Networking and the Consumer Cloud-Are You Ready?” 12:30 pm LUNCHEON KEYNOTE Thomas R. Peltier Security Sage “Selling Information Security” December 8, 2010 9:30 am INFRAGARD KEYNOTE Joseph Dittmar 12:15 pm LUNCHEON KEYNOTE Patrick T. Beggs “Lessons Learned from a Date with Destiny; A Historic and Inspirational View of 9/11/01” “Cyber Resilience Review” World Trade Center Survivor SecureWorld+ Training Director of Operations (Acting) Office of Cybersecurity and Communications U.S. Department of Homeland Security (Earn 16 CPE CREDITS) Assessing Your Current Security How good is your security program? Is there an effective way to measure the current state of your security program and compare it against some industry-accepted criteria? This session will present key methods to conduct just such an assessment using your current staff members. The session will begin with a brief discussion of what is meant by risk analysis, risk assessment, security assessment and vulnerability assessment, then analyze how these processes interact with one another. We will also examine how penetration testing and audits fit into the overall assessment methodologies. Defense Against Social Engineering Despite media reports, hackers are not always technological geniuses. Some can’t even read the scripts they unleash against our networks. However, while computer crime grows increasingly organized, focused and specialized, even the greenest script kiddie can be an outstanding social engineer. This class details various psychological workings of social engineering and presents scenarios and role-playing excercises to help us fully comprehend the threat. We also give suggestions for constucting a realstic defense program, emphasizing effects on the business. Includes SWE Conference Pass: Conference Sessions, Keynotes, Exhibits, Open Sessions and Lunch Each Day This Event Hosted by: TWO DAY CONFERENCE - $265 SECUREWORLD+ - $695 Conference Sessions, Conference Keynotes, Exhibits, Open Sessions, Lunch and 12 CPE Certficate of Attendence. Extended Training Opportunities - Conference Sessions, Keynotes, Exhibits, Open Sessions, Lunch and a 16 CPE Certificate of Attendence EXHIBITS/OPEN SESSIONS - FREE INVITE ONLY Exhibits, Keynotes and Open Sessions Day 1 - December 7, 2010 TIME CONFERENCE ROOM # SPEAKER(S) 7:00am - 3:00pm Registration 8:00am - 9:15am Executive Steering Council Breakfast: (Invitation Only) 160 Philip Alexander 8:00am - 9:30am • SecureWorld+ Assessing Your Current Security Program (Part 1) • SecureWorld+ Defense Against Social Engineering (Part 1) 166 167 Thomas R. Peltier John G. O’Leary 8:30am - 9:15am • The Human Nature of Security • Security in Times of Tight Budgets • Apples and Oranges • Avoid Data Breaches and Enhance Security: Adopt Privacy By Design 162 163 165 164 Kim L. Jones Neal Puff Rich Owen Dr. Ann Cavoukian Dr. Marilyn Prosch 9:00am - 3:00pm Exhibit Floor Open 9:30am - 10:15am Opening Keynote: Social Networking and the Consumer Cloud-Are You Ready? 10:15am - 11:30am Conference Break/Product Demonstrations - Exhibit Floor 11:15am - 12:15pm Executive Roundtable: Social Media-The Challenges (Invitation Only) 160 Jonathan Harber 11:30am - 12:15pm • Customer Service for the Information Security Professional • Integrating Security into the SDLC Process-Reducing both Risks & Costs • The Up’s and Down’s of DLP (Data Leakage Prevention) 162 163 165 John G. O’Leary Philip Alexander James Beeson 11:30am - 12:15pm Alcatel-Lucent Presents - Securing the Virtualized Enterprise, a Blueprint for Enterprise Security 164 David Fortini 12:15pm - 1:15pm Executive Roundtable: Cloud Computing; Lessons Learned (Invitation Only) 160 Randell Smith Keynote Theater James Beeson 12:30pm - 1:00pm Luncheon Keynote: Selling Information Security Keynote Theater Thomas R. Peltier 1:15pm - 2:00pm • Industry Expert Panel: Data Protection-Walking the Thin Line Between Employee Productivity and Security • Industry Expert Panel: Network Security-Finding the Right Management Program • Industry Expert Panel: Effective Compliance Management in Today’s Workplace Keynote Theater John G. O’Leary 163 Thomas R. Peltier 164 Lance Turcato 2:00pm - 3:00pm Conference Dessert Break/Product Demonstration 3:00pm - 3:45pm • Which Part of the Prickly Pear is the End Point? • Computer Forensics and Emerging Technologies • Panel Discussion: End User Security Awareness • Often Overlooked Vulnerabilities in ERP Systems: Example SAP Exhibit Floor 163 162 164 165 Jeff Debrosse Kristy Westphal Jonathan Harber Bill Curd, PhD 3:00pm - 4:30pm • SecureWorld+ Assessing Your Current Security Program (Part 2) • SecureWorld+ Defense Against Social Engineering (Part 2) 166 167 Thomas R. Peltier John G. O’Leary 3:00pm-5:30pm Pub Crawl Foyer Check us out on the web: secureworldexpo.com Day 1 - December 7, 2010 7:00am - Registration Opens 8:00am - 9:15am - Room 160 Executive Steering Council Breakfast (Invitation Only) 8:00am - 9:30am - Room 166 SecureWorld+ Training Assessing Your Current Security Program (Part 1) Thomas R. Peltier, Security Sage How good is your security program? Is there an effective way to measure the current state of your security program and compare it against some industry-accepted criteria? This session will present key methods to conduct just such an assessment using your current staff members. The session will begin with a brief discussion of what is meant by risk analysis, risk assessment, security assessment and vulnerability assessment, then analyze how these processes interact with one another. We will also examine how penetration testing and audits fit into the overall assessment methodologies. 8:00am - 9:30am - Room 167 SecureWorld+ Training Defense Against Social Engineering (Part 1) John G. O’Leary, President, O’Leary Management Education Despite media reports, hackers are not always technological geniuses. Some can’t even read the scripts they unleash against our networks. However, while computer crime grows increasingly organized, focused and specialized, even the greenest script kiddie can be an outstanding social engineer. 8:30am - 9:15am - Room 162 The Human Nature of Security Kim L. Jones, Information Risk Manager General Dynamics C4 Systems Over the past 20 years security professionals have made tremendous strides in improving security technologies, implementing security processes, and relating security to the needs of the business. In this presentation, we will explore the profession’s mixed track record in addressing the human element of security as well as recommend strategies to improve the acceptance levels of your security program. 8:30am - 9:15am - Room 163 Security in Times of Tight Budgets Neal Puff, CIO, Yuma County, AZ There never seems to be sufficient funding to do everything we want in terms of security. Things are even worse when budgets are cut. This positive session will focus on what we CAN do to improve the security in our organization, even when resources are scarce. 8:30am - 9:15am - Room 165 Apples and Oranges Rich Owen, CISSP, CPP, CRISC, IAM/IEM, MBCI This session is a discussion around the problem of ensuring that your data is protected when outsourced (like in the cloud). It is also the counter discussion of how you, as a service provider, can demonstrate good security to the data owner. We will explore the necessary steps and methods of improving streamlining the discussion between data owner and service provider. Conference Details 8:30am - 9:15am - Room 164 Avoid Data Breaches and Enhance Security: Adopt Privacy By Design Dr. Ann Cavoukian Ph.D., Information and Privacy Commissioner Of Ontario, Canada Dr. Marilyn Prosch In the future, we will need to adopt a different paradigm – while legislation will remain a powerful tool, it will no longer be sustainable as the sole model for preventing data breaches and ensuring the future of privacy. We must increasingly turn to positive-sum paradigms such as Privacy by Design (PbD): Proactively embedding privacy into emerging technologies, accountable business practices and networked infrastructures that intersect with personally identifiable information. 9:00am - 3:00pm - Exhibit Floor Open 9:30am - 10:15am - Keynote Theater Opening Keynote - Social Networking and the Consumer Cloud-Are You Ready? James Beeson, CISO, GE Capital - Commercial Finance As the younger generation comes into the workforce heavily dependent on social networking and the consumer cloud as their tools of choice for communications and productivity, how should we, as security leaders, be thinking about the associated risks? This discussion will focus on critical things security and data privacy leaders should be thinking about as Net Gen’ers grow in population and power. 10:15am - 11:30am Conference Break/Exhibitor Product Demonstrations 11:15am - 12:15pm - Room 160 Executive Roundtable: Social Media-The Challenges (Invitation Only) 11:30am - 12:15pm - Room 162 Customer Service for the Information Security Professional John G. O’Leary, President, O’Leary Management Education Security Professionals do not have it easy. We must serve our internal and external customers well while providing appropriate security. But don’t even think of slowing down crucial business processes. And isn’t the customer always right? We’ll analyze the situation on both the service provider (that’s us) and customer sides from a security perspective, emphasizing the need to understand the viewpoints of those we must deal with. We will also analyze complications and particular difficulties inherent in doing anything that provokes as many potential conflicts as IT security. Customers want what they want, they want it now, and they don’t want to hear that what they want represents a significant risk to the organization. We have to remember the function of the business, and we want to serve our customers well, but we also understand that our responsibilities as security professionals are to safeguard organizational assets. We all know that sometimes that means protecting users from themselves. In this session we’ll provide specific recommendations for actions that will help IT Security fit customer service principles and resolve conflicts. 11:30am - 12:15pm - Room 163 Integrating Security into the SDLC Process - Reducing both Risks & Costs Philip Alexander, ISO, Wells Fargo Lowering risks, reducing your time to market, while at the same time decreasing your IT security costs. It is in fact possible when you position security to be a partner to business rather than a road block. TWO DAY CONFERENCE SECUREWORLD+ EXHIBITS/OPEN SESSIONS 11:30am - 12:15pm - Room 165 2:00pm - 3:00pm - Exhibit Hall James Beeson, CISO, GE Capital - Commercial Finance 3:00pm - 3:45pm - Room 163 The Up’s and Down’s of DLP (Data Leakage Prevention) DLP is on the radar screen for most businesses, but do companies really understand the complexities involved? Do the benefits outweigh the costs? This presentation is a review and discussion of best practices and challenges faced when implementing a global Data Leakage Prevention program. James Beeson, a Chief Information Security Officer at General Electric will talk about the advantages and the complications associated with implementing and managing DLP in a complex and ever-changing environment. 11:30am - 12:15pm - Room 164 Alcatel-Lucent Presents - Securing the Virtualized Enterprise, a Blueprint for Enterprise Security David Fortini, Director of Business Development for North America (West), Alcatel-Lucent Securing communications for voice, data, and video applications on a converged network is the key to supporting new business models and enabling a virtualized enterprise that competes effectively in today’s business environment. The transformation to a converged network has been accompanied by an equally rapid multiplication in security threats, the growth of cybercrime, and the introduction of new security regulations. To take advantage of the latest business models and ensure they are still protected, enterprises must change how they view security to include a strategy for network embedded security capabilities. Learn about application converged networks and how they can be a security instrument delivering embedded security to protect your corporation. 12:15pm - 1:15pm - Room 160 INVITE ONLY Conference Dessert Break/ Exhibitor Product Demonstrations Which Part of the Prickly Pear is the End Point? Jeff Debrosse, Senior Research Director ESET For the IT professional trying to secure “the end point” their job has become a game of catch with a prickly pear. The proper use of technology, policy, and education can be the defense you need to survive the game. 3:00pm - 3:45pm - Room 162 Computer Forensics and Emerging Technologies Kristy Westphal, Information Security Consultant, TSYS Acquiring Solutions The newest technologies implemented in your organizations are wonderful for moving the business forward, but can move your computer forensics efforts backwards...if you aren’t careful! In this session, we’ll take a look at how you can stay one step ahead of these new trends, including virtualization, Web 2.0, encryption and Windows 7. Attendees will leave with a solid understanding of how the latest in technology can impact their own forensic programs. 3:00pm - 3:45pm - Room 164 Panel Discussion: End User Security Awareness Jonathan Harber, CIO & Vice President, Information Technology Blood Systems, Inc. 12:30pm - 1:00pm - Keynote Theater Clearly, there are many security questions facing organizations today. This panel will gather some key IT and security practice leaders who will share from their work history and current organization how they answered these questions. The panel will focus on practical solutions in the real world. Thomas R. Peltier, Security Sage 3:00pm - 3:45pm - Room 165 Executive Roundtable: Cloud Computing; Lessons Learned (Invitation Only) Luncheon Keynote: Selling Information Security To have a successful information security program, you must first visualize the successful program. The first person you must sell the program to is you. This session will examine methods to be used to prepare your message. We will discuss establishing a short-term goal, achieving it, reviewing the results, and setting the next objective. We will then examine how to use short-term objectives to develop a long-term plan and how to adjust the plan after each incremental objective is met. Most importantly, we will examine how we can best reach management and employees with our message. 1:15pm - 2:00pm - Keynote Theater Industry Panel: Data Protection-Walking the Thin Line Between Employee Productivity and Security Managing and securing your data is becoming more complicated each day with the demands of today’s fast-paced world. How can you adequately protect it and at the same time allow for your employees to access it for work related use? This panel will discuss possible data protection issues and steps to take to help you secure one of your most important company assets; your data. 1:15pm - 2:00pm - Room 163 Industry Panel: Network Security-Finding the Right Management Program With all of the recent threats and security breach scenarios, it is necessary to create a network that is secure and manageable. This panel discussion will examine the important steps and tools required for increased network security and manageability. 1:15pm - 2:00pm - Room 164 Industry Panel: Effective Compliance Management in Today’s Workplace Often Overlooked Vulnerabilities in ERP Systems: Example SAP Bill Curd, PhD, Cyber Security Leader You implement a big, expensive ERP (Enterprise Resource Planning) system to automate much of your business. You follow the vendor’s instructions, hire consultants, and meticulously adhere to a security framework. What might you be overlooking? Using SAP as an example, we’ll look at security in context (of architecture and requirements) and in depth (how authorizations are really enforced) to identify some frequent blind spots and propose solutions, so you don’t learn them the hard way. 3:00pm - 4:30pm - Room 166 SecureWorld+ Training Assessing Your Current Security Program (Part 2) Thomas R. Peltier, Security Sage 3:00pm - 4:30pm - Room 167 SecureWorld+ Training Defense Against Social Engineering (Part 2) John G. O’Leary, President, O’Leary Management Education 3:00pm - 5:30pm - SecureWorld Expo Pub Crawl PCI, SOX, HIPAA, GLBA; these acronyms can cause a lot of stress for today’s IT professional. Join this panel for a look at the recent developments in compliance regulations and what you should be doing to ensure you are meeting them and have effective plans in place. Check us out on the web: secureworldexpo.com Day 2 - December 8, 2010 TIME CONFERENCE ROOM # SPEAKER(S) 7:00am - 2:30pm Registration 8:30am - 9:15am InfraGard Information Meeting 8:00 am - 9:30am • SecureWorld+ Assessing Your Current Security Program (Part 3) • SecureWorld+ Defense Against Social Engineering (Part 3) 166 167 Thomas R. Peltier John G. O’Leary 8:30am - 9:15am • Know Thy Enemy: Assessing Agents of Threat for Better Risk Management • Building an Effective Security Program (on the fly) • How to Create a Security Awareness Program • Peering into the Darkness: Implementing SIEM 162 Tim Casey 163 164 165 Cristy Schaan Mike Ste. Marie Brian Basgen Keynote Theater Joseph Dittmar Keynote Theater 9:00am - 3:00pm Exhibit Floor Open 9:30am - 10:15am InfraGard Keynote: Lessons Learned from a Date with Destiny; A Historic and Inspirational View of 9/11/01 10:15am - 11:15am Conference Break/ Product Demonstrations-Exhibit Floor 10:45am - 11:45am Executive Roundtable: Disaster Recovery/Business Continuity Planning (Invitation Only) 160 11:15am - 12:00pm • Resolving the Conflict Over Workplace Privacy and Employee Monitoring • Managing Security Risk for the Executive Level • Cryptography for Managers • Got Governance? 162 163 164 165 160 Steve Porter Thomas R. Peltier Debbie Christofferson David Schlesinger Leah Core 11:45am - 12:45pm Executive Roundtable: Risk Management Concepts (Invitation Only) 12:15pm - 1:00pm Luncheon Keynote: Cyber Resilience Review Keynote Theater Andy Nold Patrick T. Beggs 1:15pm - 2:00pm • Industry Panel: Protecting Your Endpoint Security Assets • Industry Panel: Directing Managed Services: Look Before You Leap into the Cloud Keynote Theater 163 William Bell Fawn Medesha 2:00pm - 2:45pm Conference Dessert Break/Product Demonstration 2:15pm - 2:45pm SecureWorld Expo: Dash for Prizes 2:45pm - 3:30pm • Internet Profiling and Intelligence Gathering • An FBI Cyber Crime Briefing • Managing Enterprise Forensic Investigations • Not Every Cloud Has a Silver Lining Exhibit Floor 162 163 164 165 Michele Stuart Michael McAndrews Diane Barrett Erik Graham 8:30am - 9:15am - Keynote Theater 8:30am - 9:15am - Room 163 8:30am - 9:15am - Room 165 8:00am - 9:30am - Room 166 SecureWorld+ Training (Part 3) Christy Schaan, Information Security Officer, State of Arizona Brian Basgen, Information Security Officer Pima Community College Considering the unprecedented growth in IT demand combined with growing system complexities, our data centers and networks have become increasingly opaque. This discussion will focus on a real-world implementation of a Security Information and Event Management device (SIEM) and the practical ways it assisted our organization in improving security and raising awareness. InfraGard information Meeting Assessing Your Current Security Program Thomas R. Peltier, Security Sage 8:00am - 9:30am - Room 167 SecureWorld+ Training (Part 3) Defense Against Social Engineering John O’Leary, President, O’Leary Management Education 8:30am - 9:15am - Room 162 Know Thy Enemy: Assessing Agents of Threat For Better Risk Management Tim Casey, Senior Information Risk Analyst, Intel For risk managers to prepare for threats to their information assets, we must first understand the human threat, the classes of people who can harm those assets. Essentially, we need a “competitive analysis” of our security opponents, just as we analyze our business rivals. However, useful analysis of the threat agents is difficult to come by because of the lack of industry standards or reference definitions of the agents themselves. We formed a skunkworks team of senior analysts to address this problem, resulting our Threat Agent Library of 23 agent archetypes, each uniquely and uniformly defined. Building an Effective Security Program (on the fly) All organizations are not created equal. Their maturity level, culture, and mission can often determine their ability to understand and embrace information security. This ability has a direct impact on program build-out success. Because each organization has its own threats, risks, business drivers and compliance requirements, the first step involves cultural understanding of Security Awareness. This session will provide a walk-through of laying the foundation and then building an effective InfoSec Program on the fly. 8:30am - 9:15am - Room 164 How to Create a Security Awareness Program Mike Ste. Marie Information Security Analyst, Kronos, Inc. Security awareness training is becoming more of a requirement than a nice-to-have for corporations. This presentation will discuss why a security program is needed, how it can be built and supported. It will show some of the free tools you can use to get people “excited” about security (ok…mildly interested) and will detail how the speaker set up a program at a previous company. Peering into the Darkness: Implementing SIEM 9:00am - 2:30pm Exhibit Floor Open 9:30am - 10:15am Keynote Theater InfraGard Keynote-Lessons Learned from a Date with Destiny; A Historic and Inspirational View of 9/11/01 Joseph Dittmar, WTC Survivor Joe Dittmar’s eyewitness account of the 9/11/01 attack on the World Trade Center is steeped with facts and observations of historic proportions. This presentation also imparts concepts and ideas on what was learned that day and what lessons we can continue to teach. Conference Details 10:45am - 11:45am - Room 160 11:45am - 12:45pm - Room 160 2:45pm - 3:30pm - Room 162 12:15pm - 1:00pm - Keynote Theater Michele Stuart, Owner and President of JAG Investigations, Inc. Executive Roundtable: Risk Management Concepts (Invitation Only) Executive Roundtable: Disaster Recovery /Business Continuity Planning (Invitation Only) 11:15am - 12:00pm - Room 162 Luncheon Keynote: Cyber Resilience Review Resolving the Conflict Over Workplace Privacy and Employee Monitoring Thomas R. Peltier Security Sage Employers want to be sure their employees are doing a good job, but employees don’t want their every move or message logged. That’s the essential conflict of workplace monitoring. In this session we will examine what an employer can do and what they should do to make the workplace safe and the employees secure in the knowledge that there is really little expectation of privacy. 11:15am - 12:00pm - Room 163 Managing Security Risk for the Executive Level Debbie Christofferson, CISSP, CISM President, Phoenix Chapter ISSA Patrick T. Beggs, CISM Director of Operations (Acting) Office of Cybersecurity and Communications U.S. Department of Homeland Security This presentation will provide the audience with an overview of the evaluative method, called a Cyber Resiliency Review, review lessons-learned and field experiences from the past two years. The audience should come away with an understanding of meaningful evaluation and understand the method applied, likely span of results and focus of improvement activities. 1:15pm - 2:00pm - Keynote Theater Industry Panel: Protecting Your Endpoint Security Assets Do your senior management and executives care about security? Business universally runs on IT Infrastructures and both IT risks and costs have continued to grow. Security is a major component of risk, but how much security is too much? What do executives and our boards expect regarding enterprise security risk? 11:15am - 12:00pm - Room 164 Cryptography for Managers The equipment that your employees rely on can be one of the most vulnerable points of attack and intrusion. What can you do to help protect them? What requirements and systems should you put in place to prevent a security disruption? This panel will take a look at some elements that should be implemented to create and maintain endpoint security. 1:15pm - 2:00pm - Room 163 Industry Panel: Directing Managed Services: Look Before you Leap David Schlesinger, CISSP Vice President, Phoenix Chapter ISSA This talk is aimed at non-technical managers who will be involved in implementing cryptographic information protection. It covers the business and security requirements for cryptography, principles of certificates and key management, secure protocols, and the capabilities and limits of cryptography. It also provides an overview of the key areas of interest when selecting a cryptographic solution. 11:15am - 12:00pm - Room 165 Got Governance? Leah Core, MBCP Director of IT Governance Governance is gaining ground as the next big buzzword but how can it actually advance your program. We will explore how governance initiatives incorporate security, businesses continuity and compliance into a secure foundation of availability and can help professionals in these areas collaborate to create a strong framework for risk mitigation and advancing their programs. There has been a lot of discussion surrounding the cloud and managed services. But do you have the facts? This panel will take a look at the components of managed services programs such as cloud computing, SaaS and Virtualization and highlight what you should be looking for and how to sift through and determine the best program for your needs. 2:00pm - 2:45pm - Exhibits Floor Conference Dessert Break/ Product Demonstrations 2:15pm - 2:45pm - Exhibits Floor SecureWorld Expo: Dash for Prizes Internet Profiling and Intelligence Gathering Michele’s class, nationally renowned, will illustrate to us the most current research techniques using open sources such as public records and the vast amount of information located within ‘open sources’ on the internet. She will demonstrate how to utilize the internet (by manipulating search criteria) to locate and create an entire profile on an individual or company. This class is a thorough ‘how to’ presentation showing us the step by step procedures to conducting research in the most productive and fact finding ways. 2:45pm - 3:30pm - Room 163 An FBI Cyber Crime Briefing Michael McAndrews, Special Agent, FBI Join us for a look at the latest trends in cyber crime and what you should be aware of. 2:45pm - 3:30pm - Room 164 Managing Enterprise Forensic Investigations Diane Barrett, Professor University of Advancing Technology In today’s world, forensic data collection touches every organization. This presentation will begin with the identification of enterprise evidence collection components. From there, how to make intelligent decisions on data collection as the number of handheld network devices increases daily will be discussed. Finally, evidence collection techniques used in real cases such as US v. Madoff will be offered as suggestions for formulating guidelines that pertain to your own organization. 2:45pm - 3:30pm - Room 165 Not Every Cloud Has a Silver Lining Erik Graham, CISSP-ISSAP, Principal Information Security Engineer, General Dynamics C4 Systems Cloud computing. What does it mean to you? Ask 10 people that question and you’ll get 10 different answers. Now ask what does “securing the cloud” or “cloud computing security” mean? Again you will get a wide variety of answers. Does this mean that security within the cloud is unobtainable? No - depending on your implementation / use of cloud computing it may be a challenge but you can provide the necessary security to allow business to leverage the capabilities provided by cloud computing. In this presentation we will examine the key elements within the cloud and what risks and mitigations exist within each element. Check us out on the web: secureworldexpo.com Extends Special Thanks to our 2010 Executive Steering Council: Laura Ploughe Kevin Sauer Director Business Applications & Fiscal Control President Arizona State University Society for Information Management Joanne Goldberg Principal QA Systems Specialist/President Medtronics/Alliance of Technology & Women Leo Hauguel Founder/Chairperson Sonoran Desert Security Users Group Rich Wilson President Arizona Chapter Association of Threat Assessment Professionals Jim Ryan, CISO State of Arizona Andy Nold, CIO Loan Resolution Corp. Gary Nichols, CISO Blue Cross Blue Shield of Arizona Lance Turcato Deputy City Auditor - IT Audit Division / VP City of Phoenix / Phoenix ISACA Chapter Christian Price ISA/Co-Founder PetSmart/Arizona Security Practitioners Forum Todd Therrien Technical Systems Manager City of Phoenix - Phoenix Convention Center Philip Alexander , ISO Wells Fargo Kim Jones Information Risk Manager General Dynamics C4 Systems John Moede Emergency Management Coordinator City of Scottsdale Mary Beth Joublanc Chief Privacy Officer Arizona Government Information Technology Agency Maudy Lockhart Business Technology Integrator President, APS/ARMA Brian Basgen, ISO Information Security Officer Pima Community College Neal Puff, CIO Yuma County, AZ Cary Gielniak Director, Information Technology Services The Biodesign Institute at ASU Susan Silberisen Chief Information Officer Arizona Department of Revenue Randell Smith, CISO City of Phoenix Robert Talbot Vice President, CPO Coventry Health Care, Inc. Michael Tolk CIO & Security Officer NextCare, Inc. Bert Talley Director of Forensics Apollo Group Gina Busby, ISO City of Surprise Lois Folk, President Association of Certified Fraud Examiners Vauda Jordan Senior Security Engineer City of Phoenix Catherine Rando VP of Technology First Credit Union Steven Porter, CIO Touchstone Behavioral Health Fawn Medesha Prior CIO/Executive Board IMH Real Estate/Society for Information Management Jenner Holden IS0/ISM Arizona Department of Education/LifeLock Aaron Carpenter Information Security Manager AZ Dept of Health Services Jillian Testa VP, Information Security Officer Wells Fargo William L Bell II Director of Information Systems PhoenixNAP, LLC Jonathan Harber CIO & Vice President, IT Blood Systems, Inc. Mark Williams Information Security Officer Salt River Pima-Maricopa Indian Community Terri Aguilar Information Systems Security Manager Raytheon Missile Systems Saul Morse CIO/COO Interactive McMurry Keith Stocks Senior Manager, Information Security Services Blue Cross Blue Shield of Arizona Trisha Lowry Security Engineer Safeway Thank You to Our Sponsors INTEGRATION FORENSICS BOTNETS VIRTUALIZATION APPLICATION SECU UALIZATION APPLICATION SECURITYSYSTEMS ENCRYPTION DATA LEAKAGE COMPLIANCE WIRELESS BIOMETRICS ACCESS CONTROL RISK MANAGEMENT DATA LEAKAGE COMPLI