September 10 - 11, 2008


September 10, 2008

TimeConferenceSpeaker(s)
07:00 AM - 03:00 PMRegistration
 
08:00 AM - 09:00 AMExecutive Steering Council Breakfast: Connecting the CSO and PR in Times of Crisis (Invitation Only)
Steve Collins
08:00 AM - 09:30 AMSecureWorld+ Conducting a Risk Assessment in Five Days or Less
Thomas R. Peltier
08:00 AM - 09:30 AMSecureWorld+ Forensics as an Investigative Tool
Brian Gawne
08:00 AM - 09:30 AMSecureWorld+ Information Risk Leadership Strategy: Putting All the Pieces Together
David Meunier
08:00 AM - 09:30 AMSecureWorld+ Practical Techniques for Reducing the Impact of Office POLITICS
Ron Collette
Mike Gentile
08:00 AM - 09:30 AMSecureWorld + It's Blown-Up: Incident Response Management
Justin Peltier
08:00 AM - 09:30 AMWindows Server 2008 Security Deep Dive-Presented by Microsoft
Manjnath Ajjampur
08:30 AM - 09:15 AMUnderstanding PCI Standards and Their Applications
William Cook
08:30 AM - 09:15 AMHacking Culture: Who They are, The Techniques, and How to Respond to the Threat
Paul Poteete
08:30 AM - 09:15 AMPlanning Enterprise Physical and Logical Access Through Smart Card Applications
Ted Barron
08:30 AM - 09:15 AMShould Companies be Anti-Social Towards Social Software
Dennis Kavanaugh
08:30 AM - 09:15 AMCompTIA's Security Trustmark Overview
CompTIA
09:00 AM - 03:00 PMExhibits
 
09:30 AM - 10:15 AMOpening Keynote: Optimizing and Securing Your Core Infrastructure
Bret Arsenault
10:15 AM - 11:30 AMBreak/Exhibitor Product Demonstrations
 
11:00 AM - 12:00 PMExecutive Roundtable: Virtualization Security Considerations (Invitation Only)
Gary Terrell
11:30 AM - 12:15 PMVirtualization and Enterprise Security-Configuresoft
Dave Shackleford
11:30 AM - 12:15 PMEmail Archiving for e-Discovery, Compliance, and Disaster Recovery-Presented by Microsoft
Adam Bresson
11:30 AM - 12:15 PMPanel Discussion: Today's Trends in Security Awareness
Paul Poteete
11:30 AM - 12:15 PMThe Process to Achieve Business Alignment with Security
David Meunier
11:30 AM - 12:15 PMCommunication 101: Just Having the Right Message is Not All You Need
Ron Collette
Mike Gentile
11:30 AM - 12:15 PMSecurity in Government-One Bite at a Time!
Mark Weatherford
11:30 AM - 12:15 PMThe Challenges of Anti-Forensics Technology IT Investigations
Brian Gawne
12:30 PM - 01:00 PMLuncheon Keynote: How to Become a Counter-Spy in Three Easy Steps
Dr. Gordon Mitchell
12:30 PM - 01:30 PMExecutive Roundtable: Security vs. Compliance (Invitation Only)
Thomas R. Peltier
12:30 PM - 02:00 PMCSO Council Roundtable: Current Security Concerns (Invitation Only)
Izak Mutlu
01:15 PM - 02:00 PMIndustry Expert Panel: Network Security-Leveraging NAC and IPS
Brian Gawne
01:15 PM - 02:00 PMIndustry Expert Panel: The Endpoint's Worst Enemy-The User
Ron Collette
01:15 PM - 02:00 PMIndustry Expert Panel: PCI Compliance-It's Good Information Security Fundamentals
William Cook
01:15 PM - 02:00 PMIndustry Expert Panel: Regulatory Compliance-How Technology Helps Companies Achieve Compliance
Paul Poteete
02:00 PM - 03:00 PMBreak/Exhibitor Product Demonstrations
 
03:00 PM - 03:45 PMWar Of The Airwaves: Next-Generation Risks & Defenses - What Hackers Know That You Don't-AirDefense
AirDefense
03:00 PM - 03:45 PMPanel Discussion: Computing in the Cloud
Jacques Francoeur
03:00 PM - 03:45 PMPrepare For Next-Generation Security Architectures
Chenxi Wang, Ph.D.
03:00 PM - 03:45 PMThe Zen of Full-Disk Encryption
Selim Aissi
03:00 PM - 03:45 PMCurrent Trends in Electronic Crimes
Charles White
03:00 PM - 04:30 PMUnderstanding Enterprise Information Protection and Access Management-Presented by Microsoft
Steven Wilder
03:00 PM - 04:30 PMSecureWorld+ Conducting a Risk Assessment in Five Days or Less (Part 2)
Thomas R. Peltier
03:00 PM - 04:30 PMSecureWorld+ Forensics as an Investigative Tool (Part 2)
Brian Gawne
03:00 PM - 04:30 PMSecureWorld+ Information Risk Leadership Strategy: Putting All the Pieces Together (Part 2)
David Meunier
03:00 PM - 04:30 PMSecureWorld+ Practical Techniques for Reducing the Impact of Office POLITICS: A Class for Any Member of a Security Team (Part 2)
Ron Collette
Mike Gentile
03:00 PM - 04:30 PMSecureWorld + It's Blown-Up: Incident Response Management (Part 2)
Justin Peltier
03:00 PM - 05:30 PMConference Reception (Open to Attendees)
 

September 11, 2008

TimeConferenceSpeaker(s)
07:00 AM - 02:30 PMRegistration
 
08:00 AM - 09:30 AMSecureWorld+ Forensics as an Investigative Tool (Part 3)
Brian Gawne
08:00 AM - 09:30 AMSecureWorld+ Conducting a Risk Assessment in Five Days or Less (Part 3)
Thomas R. Peltier
08:00 AM - 09:30 AMSecureWorld+ Information Risk Leadership Strategy: Putting All the Pieces Together (Part 3)
David Meunier
08:00 AM - 09:30 AMSecureWorld+ Practical Techniques for Reducing the Impact of Office POLITICS: A Class for Any Member of a Security Team
Ron Collette
Mike Gentile
08:00 AM - 09:30 AMSecureWorld + It's Blown-Up: Incident Response Management (Part 3)
Justin Peltier
08:00 AM - 09:30 AMForefront Security Deep Dive-Presented by Microsoft
Sean Lewis
08:30 AM - 09:15 AMData Lifecycle Security-More than Bookshelves
Ernie Hayden
08:30 AM - 09:15 AMFive Ways to Energize Your Information Security Program
Jim Reiner
08:30 AM - 09:15 AMBuilding Your Very Own Robot Army: Practical Audit Cost Savings Through Compliance Automation
J.J. Thompson
Brandon Dunlap
08:30 AM - 09:15 AMSecuring Data and Databases, Inside and Outside Your Network
Juan Walker
08:30 AM - 09:15 AMSecurity Made Smarter: A New Approach to Anti-Malware as Cybercrime Goes Mainstream- Trend Micro
Bob Hansmann
09:00 AM - 02:30 PMExhibits
 
09:30 AM - 10:15 AMInfraGard Keynote: Rage of the Random Actor
Dan Korem
11:00 AM - 12:00 PMExecutive Roundtable: Where Does the Security Organization Fit? (Invitation Only)
Samantha Thomas
11:15 AM - 12:00 PMFive Reasons Your Business Needs NAC-ForeScout
ForeScout
11:15 AM - 12:00 PMVirtualization from the Data Center to the Desktop-Presented by Microsoft
Mike Wolfe
11:15 AM - 12:00 PMPanel Discussion: Security Leadership-The Evolution from Securing Technology to Securing Information
David Meunier
11:15 AM - 12:00 PMLearn How to Write Policies in One Session
Thomas R. Peltier
11:15 AM - 12:00 PMPreparing Your Organization for E-Discovery
Brian Gawne
11:15 AM - 12:00 PMThe People Factor: Strategies to Trump the Information Security Wildcard
Kimberly McCloud
11:15 AM - 12:00 PMWeb Hacking Part II: It's Back!
Justin Peltier
12:00 PM - 12:45 PMISSA Member Luncheon: The State of Compliance (Invitation Only)
 
12:15 PM - 12:45 PMLuncheon Keynote: From Bugs to Boxing, a Message of Hope
Termite Watkins
12:30 PM - 01:30 PMExecutive Roundtable: The L in Management Stands for Leadership (Invitation Only)
Ernie Hayden
01:00 PM - 01:45 PMIndustry Expert Panel: Data Protection-It's All About the Data
David Meunier
01:00 PM - 01:45 PMIndustry Expert Panel: Current Strategies in ID Management
Thomas R. Peltier
01:00 PM - 01:45 PMIndustry Expert Panel: Virtualization and Thin Client Applications
Mike Gentile
01:45 PM - 02:30 PMBreak/Exhibitor Product Demonstrations
 
02:00 PM - 02:30 PMSecureWorld: Dash for Prizes
 
02:30 PM - 03:15 PMOptimizing Your Desktop Infrastructure with Windows Vista-Presented by Microsoft
Jeffrey Asis
02:30 PM - 03:15 PMPanel Discussion: Compliance with PCI for InfoSec
Ken Baylor
02:30 PM - 03:15 PMInside Out FireWalls: Protecting a Large University
Paul Keser
02:30 PM - 03:15 PMTrends in Information Security: Findings from the Sixth Annual CompTIA IT Security Study
CompTIA