Evaluate Weigh the pros and cons of technologies, products and projects you are considering.

Information Security Decisions Session Downloads

Session Downloads from Information Security Decisions 2006 Conference.

Information Security Decisions
Security practitioners today wear many hats. No longer are they just mitigating security vulnerabilities: they're also on the front lines, working with auditors to ensure regulatory demands are met; and in the boardroom, reviewing the budget with upper management. Where do information security professionals turn for the definitive security intelligence required to make those decisions?

Information Security Decisions 2006 in Chicago, Oct. 18-20, delivered essential strategies required to gain control over today's ever-changing corporate environment. For those who could not attend the event or would like additional information, below is a full listing of sessions featured at the show and the slide presentations that correspond to these topics.

As in the past, Information Security Decisions 2006 was a multi-track event. This year, the tracks were:

   Proven Tactics to Repel Emerging Threats
   Enhanced Identity and Access Management
   Achieving Compliance: A Real-World Roadmap
   Snyder on Security: An Insider's Guide to the Essentials


Today's targeted attacks rob organizations of their most valuable resources. These sessions identify ways to protect your business by detailing how to combat evolving cyberattacks, protect against insider threats, safeguard databases and applications, and fortify the network from perimeter to core.

Sessions included in this track:

Click to download Proven Tactics to Repel Emerging Threats track sessions


Compliance may have driven many ID and access management projects but long-term cost savings has proven to be a significant benefit too. From consolidating directories to automating provisioning and rolling out single sign-on, This track examines how leading organizations are strengthening authorization and enforcing access controls.

Sessions included in this track:

  • Making the Business Case for Strong Authentication

  • Presented by Michael Cobb, founder and managing director, Cobweb Applications, Ltd
  • Identity Management for the Masses

  • Presented by Mark Diodati, analyst, The Burton Group
  • Solving Identity Crises: A Citizens Financial Group Case Study

  • Presented by David J. Sherry, VP of enterprise information security, Citizens Financial Group.
  • Smart Shopper: IAM products

  • Presented by Richard E. Mackey, principal, SystemExperts, ISACA/CISM

Click to download Enhanced Identity and Access Management track sessions


A security manager's responsibilities extend beyond the technical aspects of the job. These days, effective governance and compliance are just as essential. This track, explains how to build an effective compliance program, and defines metrics to measure security's success and ensure business continuity should the unexpected occur.

Sessions included in this track:

  • Metrics for Security Investment

  • Presented by Dr. Shawn Butler, cyLab's risk management interest group.
  • Making Information Security a Business Issue

  • Presented by Eric Holmquist, VP and director of risk management, Advanta Bank Corp.
  • Lessons in Disaster Recovery: A 9/11 Survivor's Story

  • Presented by Donna Childs, founder and CEO, Childs Capital LLC.
  • Strategic Compliance: Continuous Process Improvement

  • Presented by Diana Kelley, VP and service director, security and risk management strategies service, Burton Group.

Click to download Achieving Compliance: A Real-World Roadmap track sessions


These track sessions feature hands-on advice from one of the brightest minds in the industry and the highest rated speaker at our previous Information Security Decisions. You asked for him, and we've brought him back for an entire track. Benefit from the first-hand advice of Dr. Joel Snyder, senior partner with consultancy Opus One and technical editor for Information Security magazine.

Sessions included in this track:

Click to download Snyder On Security: An Insider's Guide to the Essentials track sessions

This was last published in October 2006

Dig Deeper on Emerging cyberattacks and threats



Find more PRO+ content and other member only offers, here.

Start the conversation

Send me notifications when other members comment.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Please create a username to comment.








  • CIO Trends #6: Nordics

    In this e-guide, read how the High North and Baltic Sea collaboration is about to undergo a serious and redefining makeover to ...

  • CIO Trends #6: Middle East

    In this e-guide we look at the role of information technology as the Arabian Gulf commits billions of dollars to building more ...

  • CIO Trends #6: Benelux

    In this e-guide, read about the Netherlands' coalition government's four year plan which includes the term 'cyber' no fewer than ...