2011 SEATTLE

November 16 - 17, 2011

Meydenbauer Convention Center


November 16, 2011

TimeConferenceSpeaker(s)
07:00 AM - 03:00 PMREGISTRATION
 
08:00 AM - 09:15 AMRoom 403: INVITATION ONLY: Steering Council Breakfast
 
08:00 AM - 09:30 AMRoom: 409: SecureWorld Plus: Writing and Implementing Effective Policies (Part 1)
Thomas R. Peltier
08:00 AM - 09:30 AMRoom 401: SecureWorld Plus: Mergers, Reorgs, Downsizing and Security (Part 1)
John G. O'Leary
08:30 AM - 09:15 AMPRESENTATION AVAILABLE: A Framework for Data Governance for Privacy, Confidentiality, and Compliance
Aaron Weller
Javier Salido
08:30 AM - 09:15 AMPRESENTATION AVAILABLE: Emerging Threats & Best Practices to Protect Your Data, Customers & Employees
Craig Spiezle
08:30 AM - 09:15 AMPRESENTATION AVAILABLE: Security or Compliance: Which is More Important?
Bruce Lobree
Peter Gregory
08:30 AM - 09:15 AMPRESENTATION AVAILABLE: Lessons Learned: A Craft Union/Trade School Approach to Security Practitioner Training
James Lindley
08:30 AM - 09:15 AMPRESENTATION AVAILABLE: Presented by Sourcefire: Agile Security Manifesto - Core Principles of Effective Security for the Real World
Mark Marquiss
09:00 AM - 03:00 PMEXHIBIT FLOOR OPEN
 
09:30 AM - 10:15 AMKEYNOTE THEATER: OPENING KEYNOTE: Presented by Oracle - Think Your Data is Secure? Think Again!
Mary Ann Davidson
10:15 AM - 11:00 AMRoom 404: INVITATION ONLY: CTIN Chapter Meeting
 
10:15 AM - 11:15 AMEXHIBIT FLOOR: CONFERENCE BREAK/Exhibitor Product Demonstrations
 
11:00 AM - 12:00 PMRoom 402: INVITATION ONLY: Mobile Device Security Round-table discussion
 
11:15 AM - 12:00 PMPRESENTATION AVAILABLE: Corporate Security Concerns for Social Networking
Thomas R. Peltier
11:15 AM - 12:00 PMPRESENTATION AVAILABLE: PANEL DISCUSSION: Bridging the Business Divide: Success Stories of Security Marketing
Kate Wakefield
Peter Jekel
LJ Johnson
Deanna Locke
11:15 AM - 12:00 PMPRESENTATION AVAILABLE: Presented by CTIN - A Quick Intro to Computer Forensics for IT Professionals
David Matthews
11:15 AM - 12:00 PMPRESENTATION AVAILABLE: Customer Service for the Information Security Professional
John G. O'Leary
11:15 AM - 12:00 PMPRESENTATION AVAILABLE: Presented by Core Security - Replicating the Gonzalez Attack through Penetration Testing
Jan Pocozobutt
12:00 PM - 01:00 PMLUNCH
 
12:00 PM - 01:00 PMRoom 402: INVITATION ONLY: Risk Management Round-table Discussion
 
12:15 PM - 01:00 PMKEYNOTE THEATER: LUNCH KEYNOTE: Presented by Fishnet Security: Enterprise Mobility: Securing the Mobile Workforce
Joey Peloquin
Dan Thormodsgaard
01:15 PM - 02:15 PMKEYNOTE THEATER: INDUSTRY EXPERT PANEL: Mobility - The Age of Consumerization
 
01:15 PM - 02:15 PMRoom 405: INDUSTRY EXPERT PANEL: Security Virtualization – Who is Securing the Cloud?
 
01:15 PM - 02:15 PMRoom 406: INDUSTRY EXPERT PANEL: Advanced Persistent Threat - Got Hacked?
 
02:00 PM - 03:00 PMEXHIBIT FLOOR: Casino Break Session #1
 
02:15 PM - 03:00 PMEXHIBIT FLOOR: CONFERENCE DESSERT BREAK/Exhibitor Product Demonstrations
 
03:00 PM - 03:45 PMPRESENTATION CURRENTLY UNAVAILABLE: Presented by Venafi: Cloud and Enterprise Security Depends on Effective Key and Certificate Management
Jonathan Goldberger
03:00 PM - 03:45 PMPRESENTATION AVAILABLE: Digital Search & Seizure Issues
Robert Apgood
03:00 PM - 03:45 PMPRESENTATION CURRENTLY UNAVAILABLE: Presented by Oracle - Database Firewall: Blocking SQL Injection Attacks and Other Threats.
Steve Enevold
03:00 PM - 03:45 PMPRESENTATION AVAILABLE: Presented by F5: Dynamic Attack Protection and Access Control
Jonathan George
03:00 PM - 03:45 PMPRESENTATION CURRENTLY UNAVAILABLE: Child Internet Safety Information Overview
Ron Conlin
03:00 PM - 04:30 PMRoom 409: SecureWorld Plus: Writing and Implementing Effective Policies (Part 2)
Thomas R. Peltier
03:00 PM - 04:30 PMRoom 401: SecureWorld Plus: Mergers, Reorgs, Downsizing and Security (Part 2)
John G. O'Leary
04:00 PM - 05:00 PMEXHIBIT FLOOR: Casino Break Session #2
 

November 17, 2011

TimeConferenceSpeaker(s)
07:00 AM - 02:30 PMREGISTRATION
 
08:00 AM - 09:30 AMRoom 409: SecureWorld Plus: Writing and Implementing Effective Policies (Part 3)
Thomas R. Peltier
08:00 AM - 09:30 AMRoom 401: SecureWorld Plus: Mergers, Reorgs, Downsizing and Security (Part 3)
John G. O'Leary
08:30 AM - 09:15 AMPRESENTATION AVAILABLE: Shady RATs, Topiaries, and Other Curious Creatures: A Lawyer's Look at InfoSec 2011
Melissa Markey
08:30 AM - 09:15 AMPRESENTATION AVAILABLE: APT attacks are more dangerous than most people realize
Kevin Murphy
08:30 AM - 09:15 AMPRESENTATION AVAILABLE: New Issues in Electronic Evidence
David Matthews
08:30 AM - 09:15 AMPRESENTATION AVAILABLE: OWASP Top 10 Tools and Tactics
Russ McRee
08:30 AM - 09:15 AMKEYNOTE THEATER: INVITATION ONLY: Seattle InfraGard Chapter Meeting - Attribution
Nick Multari
08:30 AM - 09:15 AMPRESENTATION AVAILABLE: Presented by Centrify: Centralizing Data Center Security to Simplify Compliance
Paul Moore
09:00 AM - 03:00 PMEXHIBIT FLOOR OPEN
 
09:30 AM - 10:15 AMKEYNOTE THEATER: OPENING KEYNOTE: The Evolving Cybersecurity Threat Matrix and Legal Landscape
Dr. Christopher Pierson
10:15 AM - 11:15 AMEXHIBIT FLOOR: CONFERENCE BREAK/Exhibitor Product Demonstrations
 
11:00 AM - 12:00 PMRoom 402: INVITATION ONLY: Social Media Round-table discussion
 
11:15 AM - 12:00 PMPRESENTATION THEATER: Presented by Checkpoint - Virtually Safe
Kellman Meghu
11:15 AM - 12:00 PMPRESENTATION AVAILABLE: Presented by Wave Systems - Trusted Computing: The Industry’s Answer to Rapidly Changing Cyber Security Threats
Bill Morrow
11:15 AM - 12:00 PMPRESENTATION CURRENTLY UNAVAILABLE: Privacy v. Security: The Current Legal Environment for Europe
Stewart Room
11:15 AM - 12:00 PMPRESENTATION AVAILABLE: Presented by Allgress: Business Risk Intelligence
Chris Armstrong
11:15 AM - 12:00 PMPRESENTATION AVAILABLE: Presented by Gigamon: Situational Awareness Through Continuous Monitoring
Mike Walsh
12:00 PM - 01:00 PMLUNCH
 
12:00 PM - 01:00 PMRoom 402: INVITATION ONLY: Cloud Security Round-table Discussion
 
12:15 PM - 01:00 PMKEYNOTE THEATER: LUNCH KEYNOTE: Presented by NSS Labs -The Importance of Real World Testing: How testing it like a hacker can save your company time and money on security products.
Rick Moy
01:15 PM - 02:15 PMKEYNOTE THEATER: INDUSTRY EXPERT PANEL: Securing the Endpoint - The Battle Continues
 
01:15 PM - 02:15 PMRoom 406: INDUSTRY EXPERT PANEL: Compliance – Navigating a Tangled Web
 
02:15 PM - 03:00 PMCONFERENCE DESSERT BREAK/Exhibitor Product Demonstrations
 
02:30 PM - 02:45 PMDASH FOR PRIZES: CLICK HERE FOR MORE DETAILS!
 
03:00 PM - 03:45 PMPRESENTATION AVAILABLE: Identity at Enterprise and Internet Scale
Mark Hahn
03:00 PM - 03:45 PMPRESENTATION AVAILABLE: E-Discovery Security Concerns
Lance Semer
03:00 PM - 03:45 PMPRESENTATION AVAILABLE: Privacy and Cyberliability Exposures in Healthcare: Landscape, Legislation and Risk Management
Seth Shapiro
03:00 PM - 03:45 PMPRESENTATION AVAILABLE: End to End Security Management with ISO 27001
Peter Gregory
03:00 PM - 03:45 PMPRESENTATION AVAILABLE: The Hacker: Myths, Meaning, and Social Pathology. A Review of the Literature
Carla Hough