Information Security Decisions Spring 2004: Speaker presentations

View the speaker presentations from Information Security Decisions Spring 2004.

This Content Component encountered an error

View the speaker presentations from Information Security Decisions Spring 2004, hosted by and sister publication Information Security magazine. If you like what you see, consider joining us for our next show Oct. 6-8 in Chicago.

  • Security measures and metrics, by Pete Lindstrom, CISSP, Research Director, Spire Security

  • Six strategies to secure wireless LANs, by Joel Snyder, Senior Partner, Opus One

  • The real deal with SIM/SEM: The promise of security information/event management, by Scott Sidel, Senior Security Manager, Computer Sciences Corp.

  • Trustworthy yet? An examination of Microsoft's Trustworthy Computing Initiative and what it means to enterprise security practitioners, a panel led by Lawrence Walsh, Executive Editor, Information Security magazine

  • Benefits and pitfalls of outsourcing security, by Stan Kiyota, CISSP and CISM, Senior Information Security Manager, Booz Allen Hamilton, Inc.

  • Cyber crime's new era: Protecting your company from the criminal exploitation of the Internet, by John Frazzini, Secure Systems Integration Corp.

  • Advanced intrusion defense, by Joel Snyder, Senior Partner, Opus One

  • Turning the network inside out, by Joel Snyder, Senior Partner, Opus One

  • Defending the digital frontier: An overview, by Mark Doll, Americas Director, Digital Security Services, Ernst & Young LLP

  • Buyer beware: 2004 vendor report card, by Andrew Briney, Information Security magazine and David Taylor, TheInfoPro

  • Spending smart: Enforce security and achieve ROI, by G. Mark Hardy, CISSP, CISM, President, National Security Corp.

  • A framework for addressing security and managing business risk: The Information Security Program at Prudential Financial, by Ken Tyminksi, Vice President and Chief Information Security Officer, The Prudential Insurance Company of America

  • Advanced virus protection: A strategic blueprint to repel the next attack, by Paul Schmehl, Information Security Officer, University of Texas at Dallas

  • The year in review: An intelligent summary, by William Hugh Murray, Executive Consultant, TruSecure Corp.

  • Web services security, by Pete Lindstrom, CISSP, Research Director, Spire Security

  • Security and the law: How to decipher new legislation and minimize corporate risk, by Marc J. Zwillinger, Sonnenschein Nath & Rosenthal

  • Thin ice in the cyber world, by Bill Hancock, CISSP, CISSM, Vice President and Chief Security Officer

  • This was first published in April 2004

    Dig deeper on Security Industry Market Trends, Predictions and Forecasts



    Enjoy the benefits of Pro+ membership, learn more and join.



    Forgot Password?

    No problem! Submit your e-mail address below. We'll send you an email containing your password.

    Your password has been sent to: