Information Security Decisions 2006 in Chicago, Oct. 18-20, delivered essential strategies required to gain control over today's ever-changing corporate environment. For those who could not attend the event or would like additional information, below is a full listing of sessions featured at the show and the slide presentations that correspond to these topics.
As in the past, Information Security Decisions 2006 was a multi-track event. This year, the tracks were:
Proven Tactics to Repel Emerging Threats
Enhanced Identity and Access Management
Achieving Compliance: A Real-World Roadmap
Snyder on Security: An Insider's Guide to the Essentials
PROVEN TACTICS TO REPEL EMERGING THREATS Sessions included in this track: Sessions included in this track: Sessions included in this track:
SNYDER ON SECURITY: AN INSIDER'S GUIDE TO THE ESSENTIALS Sessions included in this track: 23 Oct 2006
Today's targeted attacks rob organizations of their most valuable resources. These sessions identify ways to protect your business by detailing how to combat evolving cyberattacks, protect against insider threats, safeguard databases and applications, and fortify the network from perimeter to core.
Presented by Tom Bowers, technical editor, Information Security magazine, security director, Net4NZIX
Presented by Lenny Zeltser, information security practice leader at Gemini Systems
Presented by Michael Cobb, founder and managing director, Cobweb Applications, Ltd.
Presented by Tom Bowers, technical editor, Information Security magazine, security director, Net4NZIX.
Click to download Proven Tactics to Repel Emerging Threats track sessions
Compliance may have driven many ID and access management projects but long-term cost savings has proven to be a significant benefit too. From consolidating directories to automating provisioning and rolling out single sign-on, This track examines how leading organizations are strengthening authorization and enforcing access controls.
Presented by Michael Cobb, founder and managing director, Cobweb Applications, Ltd
Presented by Mark Diodati, analyst, The Burton Group
Presented by David J. Sherry, VP of enterprise information security, Citizens Financial Group.
Presented by Richard E. Mackey, principal, SystemExperts, ISACA/CISM
Click to download Enhanced Identity and Access Management track sessions
A security manager's responsibilities extend beyond the technical aspects of the job. These days, effective governance and compliance are just as essential. This track, explains how to build an effective compliance program, and defines metrics to measure security's success and ensure business continuity should the unexpected occur.
Presented by Dr. Shawn Butler, cyLab's risk management interest group.
Presented by Eric Holmquist, VP and director of risk management, Advanta Bank Corp.
Presented by Donna Childs, founder and CEO, Childs Capital LLC.
Presented by Diana Kelley, VP and service director, security and risk management strategies service, Burton Group.
Click to download Achieving Compliance: A Real-World Roadmap track sessions
These track sessions feature hands-on advice from one of the brightest minds in the industry and the highest rated speaker at our previous Information Security Decisions. You asked for him, and we've brought him back for an entire track. Benefit from the first-hand advice of Dr. Joel Snyder, senior partner with consultancy Opus One and technical editor for Information Security magazine.
Presented by Dr. Joel Snyder, senior partner, Opus One
Presented by Dr. Joel Snyder, senior partner, Opus One.
Presented by Dr. Joel Snyder, senior partner, Opus One.
Presented by Dr. Joel Snyder, senior partner, Opus One.
Click to download Snyder On Security: An Insider's Guide to the Essentials track sessions