Information Security Decisions Spring 2004: Speaker presentations
View the speaker presentations from Information Security Decisions Spring 2004, hosted by SearchSecurity.com and sister publication Information Security magazine. If you like what you see, consider joining us for our next show Oct.
6-8 in Chicago.
Security measures and metrics, by Pete Lindstrom, CISSP, Research Director, Spire Security
Six strategies to secure wireless LANs, by Joel Snyder, Senior Partner, Opus One
The real deal with SIM/SEM: The promise of security information/event management, by Scott Sidel, Senior Security Manager, Computer Sciences Corp.
Trustworthy yet? An examination of Microsoft's Trustworthy Computing Initiative and what it means to enterprise security practitioners, a panel led by Lawrence Walsh, Executive Editor, Information Security magazine
Benefits and pitfalls of outsourcing security, by Stan Kiyota, CISSP and CISM, Senior Information Security Manager, Booz Allen Hamilton, Inc.
Cyber crime's new era: Protecting your company from the criminal exploitation of the Internet, by John Frazzini, Secure Systems Integration Corp.
Advanced intrusion defense, by Joel Snyder, Senior Partner, Opus One
Turning the network inside out, by Joel Snyder, Senior Partner, Opus One
Defending the digital frontier: An overview, by Mark Doll, Americas Director, Digital Security Services, Ernst & Young LLP
Buyer beware: 2004 vendor report card, by Andrew Briney, Information Security magazine and David Taylor, TheInfoPro
Spending smart: Enforce security and achieve ROI, by G. Mark Hardy, CISSP, CISM, President, National Security Corp.
A framework for addressing security and managing business risk: The Information Security Program at Prudential Financial, by Ken Tyminksi, Vice President and Chief Information Security Officer, The Prudential Insurance Company of America
Advanced virus protection: A strategic blueprint to repel the next attack, by Paul Schmehl, Information Security Officer, University of Texas at Dallas
The year in review: An intelligent summary, by William Hugh Murray, Executive Consultant, TruSecure Corp.
Web services security, by Pete Lindstrom, CISSP, Research Director, Spire Security
Security and the law: How to decipher new legislation and minimize corporate risk, by Marc J. Zwillinger, Sonnenschein Nath & Rosenthal
Thin ice in the cyber world, by Bill Hancock, CISSP, CISSM, Vice President and Chief Security Officer
This was first published in April 2004
Our Tips Exchange is a forum for you to share technical advice and expertise with your peers and to learn from other enterprise IT professionals. TechTarget provides the infrastructure to facilitate this sharing of information. However, we cannot guarantee the accuracy or validity of the material submitted. You agree that your use of the Ask The Expert services and your reliance on any questions, answers, information or other materials received through this Web site is at your own risk.