ISC Education


Have a Question?

You can pose a question to the speaker by clicking on the "Suggest a Question" icon at the end of the session title. Appropriate questions will be answered during the session as time permits (not all questions will be answered).

Quick Search

You can use the search box below to locate specific speakers or sessions.



View Track: End-User - IT Related Issues

End-User - IT Related Issues

Publication Endorser:
Sponsored By: Security Technology Executive
Wednesday, April 6, 2011
Suggest A Question for this Session
IT01: Advanced Persistent Threats: Ramifications for the Financial Sector
Room: 304 ~ 10:15 am - 11:15 am (Wednesday, April 6, 2011)
Platinum Sponsor:

Sponsored By: Axis Communications

The days of viruses being your biggest security worry are over. The days of teenage script kiddies being your biggest intrusion threat are over. The days of someone stumbling across a vulnerability in your firewall are over. Today, your enemy is professional, patient, and persistent: He wants your data, has been trained by the best minds in the industry, and his tools are virtually undetectable. He uses social engineering to bypass all of the traditional security measures, and his malicious code doesn't wreak havoc like a virus. Instead, it looks for certain types of data, assembles it, encrypts it, then sends it back home. And you never knew it was there. In this session, security expert Tom Patterson discusses this newest, and most insidious information security threat, and how it specifically targets the financial industry. Using examples from the private and public sector, Tom shows how cooperation between multiple industries is moving to block these threats, and how technology professionals can minimize their own risks.
Learning Objectives:
1. Describe what constitutes an Advanced Persistent Threat (APT)
2. Assess the newest APT threats in your organization.
3. Examine the limitations of mainstream security products, such as a firewalls, intrusion detection systems, and anti-virus software, in protecting against are helpless in protecting against APTs
Speaker:
Thomas Patterson - Executive Director, Security Consulting Group, Dell
Suggest A Question for this Session
IT02: Convergence: The Key to the Future of Risk Management
Room: 304 ~ 11:30 am - 12:30 pm (Wednesday, April 6, 2011)
Platinum Sponsor:

Sponsored By: Axis Communications

Effective risk management has become a top consideration for every company, government & organization in the world. Yet the risks and the capabilities for dealing with them are becoming more complex every day. The Key to the future of Risk Management lies in our ability to converge our resources, partners, capabilities, processes, & technology solutions in a way that scales to these challenges.

Technology is shifting from point solutions to integrated risk solutions that can further integrate with other disciplines such as facility and IT management. This discussion will focus on several integration opportunities and case studies that support the business need and the need for an integrated solution set.
Learning Objectives:
In this session you will see how convergence of:

Physical Security & Business Resiliency
Functional & Geographic Resiliency
Physical and Logical Security
Technology & Business processes
Security with other disciplines (i.e. facilities)

…can enable a more resilient enterprise.

Speaker:
Deon Chatterton - Sr. Manager, Integrated Risk Technologies, Cisco Systems
Edward Erickson - Director, Global Safety, Secuirty & Business Resiliency, Cisco
Suggest A Question for this Session
IT03: Integrated, Networked Solutions: Unified vs. Open Platforms
Room: 304 ~ 1:30 pm - 2:30 pm (Wednesday, April 6, 2011)
Platinum Sponsor:

Sponsored By: Axis Communications

There are a number of unified platforms and open systems software options on the security market today. At first glance, it can be difficult to understand the respective benefits and capabilities of these products. Open platform software is a powerful and advanced yet easy-to-use and reliable way to manage IP-based video surveillance. The open platform approach allows best-of-breed solutions to ‘video enable' business: reducing costs, optimizing processes, protecting people and assets, and ultimately increasing value in an organization's products and services. Unified, networked security platforms combine essential elements of a physical security solution, including video management, access control, video analytics and two-way audio, to provide seamless communication between these various physical security devices. These solutions are integrated from the ground up, limiting the need for complex and time-consuming integration.
Learning Objectives:
1. Differentiate unified and open platforms
2. Assess the applications for which each is ideal and how users can best take advantage of their advanced capabilities
3. Determine how integrators can choose a platform that best meets customer needs while streamlining the installation process.
Speaker:
Jay Hauhn - Chief Technology Officer, ADT Security Services
Jumbi Edulbehram - Vice President of Business Development, Next Level Security Systems
Eric Fullerton - Chief Sales and Marketing Officer, Milestone Systems
Geoff Kohl - Editor-in-Chief, SecurityInfoWatch.com
Suggest A Question for this Session
IT04: Everything There Is To Know About IPv6
Room: 304 ~ 2:45 pm - 3:45 pm (Wednesday, April 6, 2011)
Platinum Sponsor:

Sponsored By: Axis Communications

Did you know Stanford University has more IPv4 addresses than India, and at one point, China? With the growth of the Internet, exhaustion of IPv4 addresses, and sheer volume of single-points-of-access to the Web in the U.S., it's no surprise other countries are ahead of the US in migrating to the IPv6 protocol. Given the supply of IPv4 addresses is projected to be depleted by 2012, businesses and organizations have made transitioning to IPv6 a top priority, and are discovering benefits as well as costs, risks, and complexities associated with the movement. In this workshop, Vince Ricco, senior network consultant at Allied Telesis, and James Marcella, director of technical services for Axis Communications, will lead an in-depth discussion identifying and providing insight on the pertinent issues around migrating to the IPv6 protocol and, specifically, the impact it has on the IP surveillance industry.
Learning Objectives:
1. Identify the essential elements of transitioning to IPv6.
2. Discuss the security issues and concerns driving the transition to IPv6
3. Address those security issues via IPv6
Speaker:
James Marcella - Director of Technical Services, Axis Communications
Suggest A Question for this Session
IT05: Security Trends: How the last 20 years and the next 20 months will change the security profession forever
Room: 304 ~ 4:00 pm - 5:00 pm (Wednesday, April 6, 2011)
Platinum Sponsor:

Sponsored By: Axis Communications

Cloud computing and cyber security have emerged simultaneously as major trends impacting the global business community, and will have a lasting effect on security professionals across the board. System Integrators, software developers, distribution channels and end users are adjusting business models to leverage cost effective computing architectures and address cyber security concerns. This presentation will review “how and why” these two trends emerged at this time and what the business landscape is likely to look like over the next twenty months. Cloud computing and cyber security will be explored with a focus on how the changing nature of securing overall business operations determines the current and future requirements for our industry.
Learning Objectives:
1. Develop historical timeline of emerging security threats and potential solutions.
2. Introduce cloud computing and cyber security trends and investment initiatives.
3. Explain how global, enterprise and social networks are accelerating the pace of security change and creating new requirements.
Speaker:
Dan Dunkel - President, New Era Associates, LLC

Quick Search

You can use the search box below to locate specific speakers or sessions.



View Options

View By Track

View By Day

View All

Follow ISC West

Join the ISC West LinkedIn Group!Follow ISC West on Twitterfacebook ISC WestJoin TheSecuritySpace
ConferencePath System © 2004 - 2014 ConferencePath & MasseyMedia. All Rights Reserved.