Tip

Information Security Decisions Spring 2004: Speaker presentations

Information Security Decisions

View the speaker presentations from Information Security Decisions Spring 2004, hosted by SearchSecurity.com and sister publication Information Security magazine. If you like what you see, consider joining us for our next show Oct.

    Requires Free Membership to View

6-8 in Chicago.

  • Security measures and metrics, by Pete Lindstrom, CISSP, Research Director, Spire Security

  • Six strategies to secure wireless LANs, by Joel Snyder, Senior Partner, Opus One

  • The real deal with SIM/SEM: The promise of security information/event management, by Scott Sidel, Senior Security Manager, Computer Sciences Corp.

  • Trustworthy yet? An examination of Microsoft's Trustworthy Computing Initiative and what it means to enterprise security practitioners, a panel led by Lawrence Walsh, Executive Editor, Information Security magazine

  • Benefits and pitfalls of outsourcing security, by Stan Kiyota, CISSP and CISM, Senior Information Security Manager, Booz Allen Hamilton, Inc.

  • Cyber crime's new era: Protecting your company from the criminal exploitation of the Internet, by John Frazzini, Secure Systems Integration Corp.

  • Advanced intrusion defense, by Joel Snyder, Senior Partner, Opus One

  • Turning the network inside out, by Joel Snyder, Senior Partner, Opus One

  • Defending the digital frontier: An overview, by Mark Doll, Americas Director, Digital Security Services, Ernst & Young LLP

  • Buyer beware: 2004 vendor report card, by Andrew Briney, Information Security magazine and David Taylor, TheInfoPro

  • Spending smart: Enforce security and achieve ROI, by G. Mark Hardy, CISSP, CISM, President, National Security Corp.

  • A framework for addressing security and managing business risk: The Information Security Program at Prudential Financial, by Ken Tyminksi, Vice President and Chief Information Security Officer, The Prudential Insurance Company of America

  • Advanced virus protection: A strategic blueprint to repel the next attack, by Paul Schmehl, Information Security Officer, University of Texas at Dallas

  • The year in review: An intelligent summary, by William Hugh Murray, Executive Consultant, TruSecure Corp.

  • Web services security, by Pete Lindstrom, CISSP, Research Director, Spire Security

  • Security and the law: How to decipher new legislation and minimize corporate risk, by Marc J. Zwillinger, Sonnenschein Nath & Rosenthal

  • Thin ice in the cyber world, by Bill Hancock, CISSP, CISSM, Vice President and Chief Security Officer


    This was first published in April 2004

  • There are Comments. Add yours.

     
    TIP: Want to include a code block in your comment? Use <pre> or <code> tags around the desired text. Ex: <code>insert code</code>

    REGISTER or login:

    Forgot Password?
    By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
    Sort by: OldestNewest

    Forgot Password?

    No problem! Submit your e-mail address below. We'll send you an email containing your password.

    Your password has been sent to:

    Disclaimer: Our Tips Exchange is a forum for you to share technical advice and expertise with your peers and to learn from other enterprise IT professionals. TechTarget provides the infrastructure to facilitate this sharing of information. However, we cannot guarantee the accuracy or validity of the material submitted. You agree that your use of the Ask The Expert services and your reliance on any questions, answers, information or other materials received through this Web site is at your own risk.