Problem solve Get help with specific problems with your technologies, process and projects.

Information Security Decisions Spring 2004: Speaker presentations

View the speaker presentations from Information Security Decisions Spring 2004.

View the speaker presentations from Information Security Decisions Spring 2004, hosted by and...

sister publication Information Security magazine. If you like what you see, consider joining us for our next show Oct. 6-8 in Chicago.

  • Security measures and metrics, by Pete Lindstrom, CISSP, Research Director, Spire Security

  • Six strategies to secure wireless LANs, by Joel Snyder, Senior Partner, Opus One

  • The real deal with SIM/SEM: The promise of security information/event management, by Scott Sidel, Senior Security Manager, Computer Sciences Corp.

  • Trustworthy yet? An examination of Microsoft's Trustworthy Computing Initiative and what it means to enterprise security practitioners, a panel led by Lawrence Walsh, Executive Editor, Information Security magazine

  • Benefits and pitfalls of outsourcing security, by Stan Kiyota, CISSP and CISM, Senior Information Security Manager, Booz Allen Hamilton, Inc.

  • Cyber crime's new era: Protecting your company from the criminal exploitation of the Internet, by John Frazzini, Secure Systems Integration Corp.

  • Advanced intrusion defense, by Joel Snyder, Senior Partner, Opus One

  • Turning the network inside out, by Joel Snyder, Senior Partner, Opus One

  • Defending the digital frontier: An overview, by Mark Doll, Americas Director, Digital Security Services, Ernst & Young LLP

  • Buyer beware: 2004 vendor report card, by Andrew Briney, Information Security magazine and David Taylor, TheInfoPro

  • Spending smart: Enforce security and achieve ROI, by G. Mark Hardy, CISSP, CISM, President, National Security Corp.

  • A framework for addressing security and managing business risk: The Information Security Program at Prudential Financial, by Ken Tyminksi, Vice President and Chief Information Security Officer, The Prudential Insurance Company of America

  • Advanced virus protection: A strategic blueprint to repel the next attack, by Paul Schmehl, Information Security Officer, University of Texas at Dallas

  • The year in review: An intelligent summary, by William Hugh Murray, Executive Consultant, TruSecure Corp.

  • Web services security, by Pete Lindstrom, CISSP, Research Director, Spire Security

  • Security and the law: How to decipher new legislation and minimize corporate risk, by Marc J. Zwillinger, Sonnenschein Nath & Rosenthal

  • Thin ice in the cyber world, by Bill Hancock, CISSP, CISSM, Vice President and Chief Security Officer

  • This was last published in April 2004

    Dig Deeper on Security industry market trends, predictions and forecasts

    Start the conversation

    Send me notifications when other members comment.

    By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

    Please create a username to comment.