2009 BAY AREA

September 16 - 17, 2009

Santa Clara Convention Center

September 16, 2009

TimeConferenceSpeaker(s)
07:00 AM - 03:00 PMRegistration
 
08:00 AM - 09:00 AMExecutive Steering Council Breakfast:The Use of Certification Within Your Organization (Invitation Only)
Michael J. Corby
08:00 AM - 09:30 AMSecureWorld+ Practical Application of Key Risk Management Concepts
Thomas R. Peltier
08:00 AM - 09:30 AMSecureWorld+ Information Risk Leadership Strategy: Putting All the Pieces Together (Part 1)
Leslie Lambert
08:00 AM - 09:30 AMSecureWorld+ Root Cause Analysis - Tips and Techniques (Part 1)
Ernie Hayden
08:30 AM - 09:15 AMImproving Useability by Adding Security
Alan Karp
08:30 AM - 09:15 AMCybercrime: Today and Tomorrow's Threats
Alex Stamos
08:30 AM - 09:15 AMSecurity - Corporate Nets and Wireless Usage. Thoughts on Threats, Management, and Tools
Rick Ellinger
08:30 AM - 09:15 AMUsing Nipper to Audit Your Firewall Policy
Paul Keser
09:00 AM - 03:00 PMExhibits Floor Open
 
09:30 AM - 10:15 AMOpening Keynote: Cloud Security Alliance: Securing the Present and Future of Cloud Computing
 
10:15 AM - 11:30 AMConference Break/ Exhibitor Product Demonstrations
 
11:15 AM - 12:15 PMExecutive Roundtable: Securing the Enterprise After Opening All of the Doors (Invitation Only)
 
11:30 AM - 12:15 PMCrime and Punishment in the High Tech Era
Ralph Sivilla
11:30 AM - 12:15 PMPanel Discussion:IT Security in California State Governments: The Inside Perspective
Mark Weatherford
11:30 AM - 12:15 PMData-Centric Strategy and Policy Management
Nasrin Rezai
11:30 AM - 12:15 PMThe Process to Achieve Business Alignment with Security
Leslie Lambert
11:30 AM - 12:15 PMUnderstanding the Psychology of Social Engineering
Thomas R. Peltier
11:30 AM - 12:15 PMA User Centric Approach to Enterprise-Wide Data Protection
 
12:30 PM - 01:00 PMLuncheon Keynote: InfoSec in 2009
Dave Cullinane
01:15 PM - 02:00 PMIndustry Expert Panel: PCI Ensuring Compliance with Regulations
Thomas R. Peltier
01:15 PM - 02:00 PMIndustry Expert Panel: Endpoint Security
Paul Keser
01:15 PM - 02:00 PMIndustry Expert Panel: Data Privacy
Eric L. Nakagawa
02:00 PM - 03:00 PMConference Break/ Exhibitor Product Demonstrations
 
02:30 PM - 03:30 PMPanel Discussion: Security Challenges with Cloud Computing
Shahed Latif
Subra Kumaraswamy
Tim Mather
Gary Terrell
Izak Mutlu
03:00 PM - 03:45 PMEnsuring Performance, Security and Resiliency of Network Infrastructure through Realistic Testing
 
03:00 PM - 03:45 PMInverting Risk Management for Ethical Hacking
Kris Kahn
03:00 PM - 03:45 PMKey Considerations for Developing Effective Information Security Awareness and Training Programs
Pamela Mitchell
03:00 PM - 03:45 PMRaising the Bar: Outsourcing Security for Operational Maturity
Dan Ritari
03:00 PM - 04:30 PMSecureWorld+ Practical Application of Key Risk Management Concepts (Part 2)
Thomas R. Peltier
03:00 PM - 04:30 PMSecureWorld+ Information Risk Leadership Strategy: Putting All the Pieces Together (Part 2)
Leslie Lambert
03:00 PM - 04:30 PMSecureWorld+ Root Cause Analysis - Tips and Techniques (Part 2)
Ernie Hayden
03:30 PM - 05:00 PMCSO Roundtable: PII (Personally Identifiable Information) Protection Risks and Best Practices (Invitation Only)
 

September 17, 2009

TimeConferenceSpeaker(s)
07:00 AM - 02:30 PMRegistration
 
08:00 AM - 09:30 AMSecureWorld+ Practical Application of Key Risk Management Concepts (Part 3)
Thomas R. Peltier
08:00 AM - 09:30 AMSecureWorld+ Information Risk Leadership Strategy: Putting All the Pieces Together (Part 3)
Leslie Lambert
08:00 AM - 09:30 AMSecureWorld+ Root Cause Analysis - Tips and Techniques (Part 3)
Ernie Hayden
08:30 AM - 09:15 AMInformation Security Survival Guide: How to Get Out Alive
?Jim Reiner
08:30 AM - 09:15 AMTrends in Privacy and Security Laws
David Keating
08:30 AM - 09:15 AMCloud Computing as a Strategy: Enabling ITs Evolutionary Change
Tim Crawford
08:30 AM - 09:15 AMSecuring the Virtual Desktop - A Proposal for Best Practices
Ken Baker
09:00 AM - 02:30 PMExhibits Floor Open
 
09:30 AM - 10:15 AMKeynote: Information Security: Where We've Been, Where We Are, Where We're Headed
Thomas R. Peltier
10:15 AM - 11:15 AMConference Break/ Exhibitor Product Demonstrations
 
10:45 AM - 11:45 AMExecutive Roundtable: Web 2.0; Security in a Connected World (Invitation Only)
Connie Sadler
11:15 AM - 12:00 PMNERC 101: An Overview of Electric Grid Security Rules for Utilities
Ernie Hayden
11:15 AM - 12:00 PMRealizing End-to-End Encryption in the Payments Industry
Steven Elefant
11:15 AM - 12:00 PMBusiness Continuity and Disaster Recovery - Past, Present and Future
?Beth Epstein
Keith Erwood
11:15 AM - 12:00 PMInformation Security - More Battlefield than Business
Paul Poteete
11:15 AM - 12:00 PMMotorola AirDefense Presentation: What Hackers Know that You Don't
 
11:15 AM - 01:00 PMISSA Member Luncheon (Invitation Only)
 
12:00 PM - 01:00 PMExecutive Roundtable: Security and Your Organization; Ways to Connect and Collaborate (Invitation Only)
Nils Puhlmann
12:15 PM - 12:45 PMLuncheon Keynote: A Look at Data Privacy Laws and Their Impact
Michael J. Corby
01:00 PM - 01:45 PMIndustry Expert Panel: Network Security
Paul Poteete
01:00 PM - 01:45 PMIndustry Expert Panel: Data Protection
Ernie Hayden
01:45 PM - 02:30 PMConference Break/Exhibitor Product Demonstrations
 
02:00 PM - 02:30 PMSecureWorld Expo: Dash for Prizes
 
02:30 PM - 03:15 PMData Breaches - Where are the Biggest Risks?
Suzanne Widup
02:30 PM - 03:15 PMA FBI Cyber Crime Briefing
 
02:30 PM - 03:15 PMBuilding a Large Enterprise Security Policy Collaboratively: A Win-Win Approach that Enables Business
Jeff Fenton
02:30 PM - 03:15 PMPCI-DSS, Maintaining Data Security Standards for Level IV Merchants
Mike Kachline