October 2014 |
![]() Cybersecurity and Other Horror Stories2-Hour Live Event: Tuesday, October 28, 2014 Web Conference Overview: In keeping with the traditional Halloween things that go bump in the night theme, this month we will talk about security that has not worked as advertised. In some cases security has become the impediment, but didn’t have to be. Click here to listen to the recording, CPE quiz link at the end of the recording. Click here to view the slide presentation, CPE quiz link at the end of the slides. A passing message is a "Certificate of Attendance" can be printed and used as verification of your participation.
Generously supported by: Join the conversation: #ISSAWebConf Moderator and Speakers: Phillip Griffin Speakers: Gavin Hill Gavin Hill is Director of Product Marketing and Threat Research at Venafi. With over a 15 years of experience in product development and market research in the cyber security space, he is particularly adept at identifying where enterprises are at risk and developing products that mitigate those risks related to evolving cyber threats. At Venafi he is responsible for the Venafi Threat Research Center, focusing on Next-Generation Trust Protection. Pete Lindstrom Pete is an industry expert and thought leader in the areas of IAM (Identity & Access Management), cloud security, and IoT (Internet of Things) security. Additionally, Mr. Lindstrom is responsible for IDC's BuyerPulse Analysis: Identity and Access Management program. He provides focused research and intelligence to help clarify how IT buyers make purchasing decisions about IAM products. Prior to joining IDC in 2014, Pete accumulated 25 years of industry experience as an IT auditor, IT security practitioner, and industry analyst. He has extensive and broad expertise with a variety of information security products, but is best known as an authority on cybersecurity economics issues, such as strategic security metrics, estimating risk and return, and measuring security programs. He has also focused on applying core risk management principles to new technologies, architectures, and systems, focusing on the use of virtualization, cloud security, and big data. He has developed the "Four Disciplines of Security Management" (a security operations model), and the "5 Immutable Laws of Virtualization Security," which was integrated into guidance from the PCI Council. Mr. Lindstrom served as an officer in the U.S. Marine Corps and received a bachelor's degree in Business Administration (Finance) from the University of Notre Dame. Araceli Treu Gomes Araceli has enjoyed a 15-year career in Information Security, advancing security technologies and programs across the organizational continuum in financial services, defense and aerospace, telecommunications, and other Critical Infrastructure and Key Resources (CIKR) arenas. She currently serves as a cybersecurity strategist and subject matter expert for Verizon, providing strategic security expertise to leadership teams within the Verizon constituency, and counseling global security organizations on best practices in the prevention of advanced attacks and data theft. Araceli has held a range of technical and leadership positions prior to joining Verizon, as Strategic Security Advisor for a Fortune 100 software company, Platform Engineering Director at a fortune 500 defense contractor, Deputy Chief Security Officer for a multinational financial services and payment card processing organization, and Chief Security and Privacy Officer at a market-leading content delivery network. Her security career began in Internet security architecture where she designed early-adoption DDoS, extrusion prevention, and network forensics solutions for Internet backbone and peering providers. Araceli has experience working with technical teams up to the C-Suite, focusing her background in cyber security strategy, mergers and acquisitions, investigations, network and computer forensics, and privacy on the evangelism of information security concepts across diverse enterprise and industry groups. Araceli holds professional information security certifications in privacy, leadership, and computer forensics, and serves on IEEE Cybersecurity SIGs and ISSA boards locally and nationally.
|
This feature is restricted to registered members.
If you are already a member of the community,
click here to sign in.
If you have not yet registered,
click here to get connected!