2011 DETROIT

October 5 - 6, 2011

Ford Company Conference & Event Center

October 05, 2011

TimeConferenceSpeaker(s)
07:00 AM - 03:00 PMREGISTRATION
 
08:00 AM - 09:00 AMINVITATION ONLY: Steering Council
 
08:00 AM - 09:30 AMSecureWorld Plus: Writing and Implementing Effective Policies (Part 1)
Thomas R. Peltier
08:30 AM - 09:15 AMPRESENTATION AVAILABLE: BYOD to Work?
Nanette Poulios
08:30 AM - 09:15 AMPRESENTATION CURRENTLY UNAVAILABLE: Social Engineering Forensics
Barbara L. Ciaramitaro
08:30 AM - 09:15 AMPRESENTATION CURRENTLY UNAVAILABLE: How to Totally Suck at Information Security
Christopher Payne
Doug Nibbelink
08:30 AM - 09:15 AMPRESENTATION AVAILABLE: HIPAA “Safe Harbor” Requirement with Encryption - Lessons Learned From the Real World
Larry Yob
09:00 AM - 03:00 PMEXHIBIT FLOOR OPEN
 
09:30 AM - 10:15 AMOPENING KEYNOTE: Securing the Mobile Workforce
Dan Thormodsgaard
10:15 AM - 11:15 AMCONFERENCE BREAK/Exhibitor Product Demonstrations
 
11:00 AM - 12:00 PMINVITATION ONLY: Round-table Discussion - Cloud Security
 
11:30 AM - 12:15 PMPRESENTATION AVAILABLE: Corporate Security Concerns for Social Networking
Thomas R. Peltier
11:30 AM - 12:15 PMPRESENTATION AVAILABLE: The Challenges and Rewards of Bring-Your-Own-Computing
Shane Harsch
11:30 AM - 12:15 PMPRESENTATION AVAILABLE: Hunting Hackers
Tim Crothers
11:30 AM - 12:15 PMPRESENTATION AVAILABLE: Cloud Computing: Identifying and Managing Legal Risks
Kathryn Ossian
12:00 PM - 01:00 PMLUNCH
 
12:00 PM - 01:00 PMINVITATION ONLY: Round-table discussion - Risk Management
 
12:15 PM - 01:00 PMLUNCH KEYNOTE: Presented by Peter Lindstrom
Peter Lindstrom
01:15 PM - 02:15 PMINDUSTRY EXPERT PANEL: Mobility - The Age of Consumerization
 
01:15 PM - 02:15 PMINDUSTRY EXPERT PANEL: Advanced Persistent Threat - Got Hacked?
 
02:15 PM - 03:00 PMCONFERENCE DESSERT BREAK/Exhibitor Product Demonstrations
 
03:00 PM - 03:45 PMPRESENTATION AVAILABLE: Risk Management Basics - ISO 31000
Louis Kunimatsu
03:00 PM - 03:45 PMPRESENTATION AVAILABLE: Protecting Your Data While Doing Business Globally
Stephanie Scheuermann
03:00 PM - 03:45 PMPRESENTATION AVAILABLE: Telecommunication Managed Security Solutions
Bill Lehrer
03:00 PM - 03:45 PMPRESENTATION AVAILABLE: Presented by Venafi: Cloud and Enterprise Security Depends on Effective Key and Certificate Management
Jonathan Goldberger
03:00 PM - 04:30 PMSecureWorld Plus: Writing and Implementing Effective Policies (Part 2)
Thomas R. Peltier

October 06, 2011

TimeConferenceSpeaker(s)
07:00 AM - 02:30 PMREGISTRATION
 
08:00 AM - 09:15 AMINVITATION ONLY: InfraGard Chapter Meeting
 
08:00 AM - 09:30 AMSecureWorld Plus: Writing and Implementing Effective Policies (Part 3)
Thomas R. Peltier
08:30 AM - 09:15 AMPRESENTATION AVAILABLE: Network Security Monitoring
Ian Burke
08:30 AM - 09:15 AMPRESENTATION AVAILABLE: Architecture of an Information Security Policy
Stephen Yelick
08:30 AM - 09:15 AMPRESENTATION AVAILABLE: Hacking Trust: Using Social Media to Compromise the Human Machine
Steven Fox
08:30 AM - 09:15 AMPRESENTATION AVAILABLE: Software Assurance Education Information Security – DHS
Dan Shoemaker
09:00 AM - 03:00 PMEXHIBIT FLOOR OPEN
 
09:30 AM - 10:15 AMOPENING KEYNOTE: Meeting Privacy Challenges At The Speed of Technology and Business
Rebecca Herold
10:15 AM - 11:15 AMCONFERENCE BREAK/Exhibitor Demonstration
 
11:00 AM - 12:00 PMINVITATION ONLY: Round-table discussion - Business Continuity
 
11:15 AM - 12:00 PMPRESENTATION AVAILABLE: Presented by Allgress: Business Risk Intelligence
Chris Armstrong
11:15 AM - 12:00 PMPRESENTATION AVAILABLE: The Internet as an Investigative Tool
Thomas Kolpacki
11:15 AM - 12:00 PMPRESENTATION AVAILABLE: Privacy Rights and Data Security Compliance: Legal and Business Best Practices
Brian Balow
Tatiana Melnik
11:15 AM - 12:00 PMPRESENTATION AVAILABLE: 19th Critical Infrastructure Key Resource: People
Ann Coss
12:00 PM - 01:00 PMLUNCH
 
12:00 PM - 01:00 PMINVITATION ONLY: ISSA Chapter Meeting
 
12:00 PM - 01:00 PMINVITATION ONLY: Round-table Discussion - Mobile Device Security
 
12:15 PM - 12:45 PMLUNCH KEYNOTE: Codes and Ciphers of the Civil War
Donald Markle
01:00 PM - 02:00 PMINDUSTRY EXPERT PANEL: Securing the Endpoint - The Battle Continues
 
01:00 PM - 02:00 PMINDUSTRY EXPERT PANEL: Compliance – Navigating a Tangled Web
 
02:00 PM - 02:45 PMCONFERENCE DESSERT BREAK/Exhibitor Product Demonstrations
 
02:15 PM - 02:30 PMDASH FOR PRIZES: Click here for more info!
 
02:45 PM - 03:30 PMPRESENTATION CURRENTLY UNAVAILABLE: Are You Prepared for eDiscovery and Corporate Investigations
Duane Hopkins
02:45 PM - 03:30 PMPRESENTATION AVAILABLE: The Ugly Side of Data Breaches - Legal Issues
Carol Romej
02:45 PM - 03:30 PMPRESENTATION AVAILABLE: Data Centric Security for Personal Information
Chad Childers
02:45 PM - 03:30 PMPRESENTATION AVAILABLE: Shady RATs, Topiaries, and Other Curious Creatures: A Lawyer's Look at InfoSec 2011
Melissa Markey